Skip to the main content.
Government Programs
Integrated technology, solutions, and services that support rapid innovation within the DoD ecosystem.

CMMC Preparation & Assessment
Cybersecurity Assurance Readiness (CSAR/RMF Pro)
ATO/RMF Support

Book GP Demo

Professional Services
Expertise in security strategy, incident response readiness, policy development, and risk assessments.

Risk Assessments
vCISO
Penetration Testing

Book ProServ Demo

Digital Forensics & Incident Response
Are You Under Attack?

If you are concerned about a potential threat or are experiencing a breach, contact our 24/7/365 emergency hotline at 888-860-0452.

CONTACT US

Subscribe-to-NetSec-News-v4Subscribe to NetSec News

Sign up to receive our biweekly newsletter that covers what's happening in cybersecurity including news, trends, and thought leadership.

SIGN UP

Ingalls Information Security

At our core, Ingalls is a company that strives to be helpful to our clients while continuously innovating and evolving our technology and solutions. Since 2010, we have been dedicated to building a team and product that can stay steps ahead of threats, attacks, and vulnerabilities in an ever-changing landscape.

Meet The Leadership Team

1 min read

Articles of interest from the week of October 14, 2019

Hepatitis Patients' Data Exposed

The Philadelphia Department of Public Health inadvertently exposed on its website the records of thousands of hepatitis patients, according to a local news report. (By Marianne Kolbasuk McGee, Healthcare Info Security) Ingalls: This is an example of what catastrophic consequences can come about when cybersecurity isn’t taken seriously. Don’t let your customers’ sensitive data get leaked, mitigate the risk of cyber-attackers with our extensive knowledge of the threats to your data.

Mississippi Shows Flagrant Disregard for Cybersecurity

An audit of Mississippi government institutions has revealed an alarming lack of compliance with standard cybersecurity practices and with the state's own enterprise security program. (By Sarah Coble, Info-Security Magazine) Ingalls: Is your cybersecurity compliant with industry standards? Let Ingalls help you manage your Governance Risk & Compliance with a risk assessment personalized to your business and industry.


Critical Security Issue Identified in iTerm2 as Part of Mozilla Open Source Audit

A security audit funded by the Mozilla Open Source Support Program (MOSS) has discovered a critical security vulnerability in the widely used macOS terminal emulator iTerm2. After finding the vulnerability, Mozilla, Radically Open Security (ROS, the firm that conducted the audit), and iTerm2’s developer George Nachman worked closely together to develop and release a patch to ensure users were no longer subject to this security threat. All users of iTerm2 should update immediately to the latest version (3.3.6) which has been published concurrent with this blog post. (By Tom Ritter, Mozilla Security Blog) Ingalls: Keeping up with all every patch and update can be difficult and overwhelming on your own, but it’s one of the most important security measures you can take. Let Ingalls help your Vulnerability Management Program by making us your cybersecurity consultants!

 

Ransomware: Prepare for Hackers Launching Even More Destructive Malware Attacks

The 'wiper' ransomware used in state-backed attacks like NotPetya is gaining ground among cyber criminals, warns EU law enforcement annual cybercrime report. (By Danny Palmer, ZDnet) Ingalls: New forms of Malware are being exposed daily, and it takes a continuous, comprehensive method of security to protect yourself from it. Ingalls Endpoint Detection and Response is designed to monitor your network and stop malicious code before it gets the chance to execute, designed for protection against the continuously changing threat of malware.

 

What is Incident Response?

Six steps for effective incident response. (By Nate Lord, Digital Guardian) Ingalls: Do you have an Incident Response Plan? Ingalls can help you design an in-depth, effective Plan to minimize the consequences associated with a data breach. Guided by our expertise in data breaches and enhanced by our MDR services, your data is safe with us.

Sign Up For Network Security News

Articles of interest from the week of October 21, 2019

Sudo Bug Opens Root Access on Linux Systems The bug allows users to bypass privilege restrictions to execute commands as root. (By Tara Seals, ...

Read More

Articles of interest from the week of October 7, 2019

FBI warns about attacks that bypass multi-factor authentication (MFA) The US Federal Bureau of Investigation (FBI) has sent a security advisory to...

Read More

Articles of interest from the week of October 28, 2019

10 Steps for Ransomware Protection Here are things you can do right now to shore up your defenses and help your recovery when you get hit. (By Derek...

Read More