Skip to the main content.
Government Programs
Integrated technology, solutions, and services that support rapid innovation within the DoD ecosystem.

CMMC Preparation & Assessment
Cybersecurity Assurance Readiness (CSAR®/RMF Pro)
ATO/RMF Support

Book GP Demo

Professional Services
Expertise in security strategy, incident response readiness, policy development, and risk assessments.

Risk Assessments
vCISO
Penetration Testing

Book ProServ Demo

Digital Forensics & Incident Response
Are You Under Attack?

If you are concerned about a potential threat or are experiencing a breach, contact our 24/7/365 emergency hotline at 888-860-0452.

CONTACT US

Subscribe-to-NetSec-News-v4Subscribe to NetSec News

Sign up to receive our biweekly newsletter that covers what's happening in cybersecurity including news, trends, and thought leadership.

SIGN UP

Ingalls Information Security

At our core, Ingalls is a company that strives to be helpful to our clients while continuously innovating and evolving our technology and solutions. Since 2010, we have been dedicated to building a team and product that can stay steps ahead of threats, attacks, and vulnerabilities in an ever-changing landscape.

Meet The Leadership Team

2 min read

Articles of interest from the week of February 3, 2020

Jason Ingalls’ Radio Interview with Bloomberg Baystate Business: Iowa and the App

Jason Ingalls, Founder and CEO of Ingalls Information Security, talks about the failure of the app used in Iowa, and the danger of unsecured technology and elections. (31:04) (Bloomberg) Ingalls: Our consultants, engineers, and analysts have been successfully managing our clients' cyber risk since 2010, fueled by our passion for outstanding cybersecurity risk management and our diverse experience in threat intelligence, network security, and information technology. Learn more about what we can do for your company's cybersecurity by requesting a demo.

 

Coronavirus Phishing Attacks Are Actively Targeting the US

Ongoing phishing campaigns use the recent coronavirus outbreak as bait in attacks targeting individuals from the United States and the United Kingdom, impersonating the US CDC and virologists, warning of new infection cases in their area, and providing 'safety measures.' (By Sergiu Gatlan, Bleeping Computer) Ingalls: Your organization's security is only as strong as your employees' awareness. Strengthen your defenses against social engineering attacks with our specialized training and testing programs.

 

Ransomware Knocks City of Racine Offline

The city of Racine, Wis., was hit with a ransomware attack January 31 that knocked most of its non-emergency computer services offline. (By Doug Olenick, SCMagazine) Ingalls: Ransomware has become a serious threat to businesses of all sizes and industries, and traditional security practices are no longer strong enough to protect your business: early detection and response is key. Are you prepared to defend against ransomware?

 

How CISOs Can Justify Cybersecurity Purchases

Sometimes a disaster strikes: ransomware encrypts critical files, adversaries steal sensitive data, a business application is compromised with a backdoor… This is the stuff that CISOs’ nightmares are made of. As devastating as such incidents can be, for the short time after they occur, the enterprise usually empowers the CISO to implement security measures that he or she didn’t get funding for earlier. (By Lenny Zeltser, Help Net Security) Ingalls: Here at Ingalls, we believe it is important that there are affordable and effective cybersecurity solutions for businesses of every size. We offer best-in-class information security solutions suitable for the largest enterprise companies at a price point that is affordable for SMBs. Request a price for your company today.

 

Google Cuts Chrome 'Patch Gap' in Half, from 33 to 15 Days

Future plans include cutting the patch gap further, which might mean that Google will have to release Chrome security fixes on a weekly basis. (By Catalin Cimpanu, ZDNet) Ingalls: Enhancing your patch management process to include vulnerability scanning, a robust remediation workflow, and metrics-based decision support from data collection can do a lot more for your risk management than simply plugging holes whenever a software vendor produces a patch. In our downloadable “8 Effective Cybersecurity Controls For SMBs” guide, we discuss how to do more with patch management, and the benefits of a mature Vulnerability Lifecycle Management program. If your business or a client needs expert cybersecurity risk management that includes Vulnerability Lifecycle Management, please contact us today to schedule an engagement with Ingalls Information Security!

Sign Up For Network Security News

Articles of interest from the week of February 10, 2020

Hacks on Louisiana Parishes Hint at Nightmare Election Scenario Expert believes November ransomware attacks timed to election, ‘A very dangerous...

Read More

Articles of interest from the week of February 1, 2021

Board Members Aren’t Taking Cybersecurity As Seriously as They Should A recent study reveals systemic challenges with security integration into...

Read More

1 min read

Articles of interest from the week of June 29, 2020

Turn on MFA Before Crooks Do It For You Hundreds of popular websites now offer some form of multi-factor authentication (MFA), which can help users...

Read More