Skip to the main content.
Government Programs
Integrated technology, solutions, and services that support rapid innovation within the DoD ecosystem.

CMMC Preparation & Assessment
Cybersecurity Assurance Readiness (CSAR/RMF Pro)
ATO/RMF Support

Book GP Demo

Professional Services
Expertise in security strategy, incident response readiness, policy development, and risk assessments.

Risk Assessments
vCISO
Penetration Testing

Book ProServ Demo

Digital Forensics & Incident Response
Are You Under Attack?

If you are concerned about a potential threat or are experiencing a breach, contact our 24/7/365 emergency hotline at 888-860-0452.

CONTACT US

Subscribe-to-NetSec-News-v4Subscribe to NetSec News

Sign up to receive our biweekly newsletter that covers what's happening in cybersecurity including news, trends, and thought leadership.

SIGN UP

Ingalls Information Security

At our core, Ingalls is a company that strives to be helpful to our clients while continuously innovating and evolving our technology and solutions. Since 2010, we have been dedicated to building a team and product that can stay steps ahead of threats, attacks, and vulnerabilities in an ever-changing landscape.

Meet The Leadership Team

2 min read

Articles of interest from the week of November 18, 2019

Why Cyber-Risk Is a C-Suite Issue

Organizations realize the scale of cyber-risk but lack counter-actions to build resilience. (By Marc Wilczek, DarkReading) Ingalls: Firewalls, anti-virus, and other cybersecurity controls are simply not enough to protect your business anymore. Today's threat landscape requires a more comprehensive approach. Take a look at our 8-point guide for tips on how to develop a cybersecurity risk management plan.

 

New Ransomware-as-a-Service Offered at Deep Discount: Report

Creators of 'Buran' Ask for Smaller Percentage of Ransoms Collected. Ingalls: Ransomware has become a serious threat to businesses of all sizes and industries, and traditional security practices are no longer strong enough to protect your business: early detection and response is key. Are you prepared to defend against ransomware?

 

Compliance Mandates, Cybersecurity Best Practices Dominate 2019 Security Priorities

IDG's Security Priorities Study shows most organizations' security efforts are driven by compliance requirements and efforts to improve security best practices. Ingalls: Blending your business needs with compliance and risk management policies can be tricky. Our three step approach, based on expert understanding of the security your business needs, ensures you meet all corporate compliance requirements when it comes to risk management. Read more about our governance risk and compliance services here.

 

Lateral Phishing Makes for Dangerous Waters, Here’s How You Can Avoid Getting Caught in the Net

As companies and consumers have become more aware of phishing, hackers have refined their techniques and are now launching a more advanced form of attack known as lateral phishing. This technique is highly convincing and, consequently, highly effective. (By Anurag Kahol, Help Net Security) Ingalls: Your organization's security is only as strong as your employees' awareness. Strengthen your defenses against social engineering attacks with our specialized training and testing programs.

 

The Financial Industry just Finished its Annual ‘Doomsday’ Cybersecurity Exercise — Here’s What They Imagined Would Happen

The Securities Industry and Financial Markets Association holds the fifth in a series of exercises meant to simulate a catastrophic cybersecurity event in the banking sector, known as “Quantum Dawn.” The exercise is an important yearly insight into what the financial services industry views as the most contemporary doomsday scenario and how major players are preparing for it. This year, in its first-ever global event, the industry focuses on a fictional, widespread ransomware attack that takes out large financial institutions in Asia, the U.S. and U.K. (By Kate Fazzini, CNBC) Ingalls: Security risk and assessment is a vital first step when it comes to developing a cybersecurity plan for your business. In order to understand vulnerabilities and threats, you need to know your  IT environment and infrastructure. This information allows us to create a personalized set of security controls specifically designed to mitigate risks at your business.

Sign Up For Network Security News