Articles of interest from the week of March 29, 2021
Developing a Risk Management Approach to Cybersecurity By now most CISOs understand that focusing your cybersecurity program on regulatory...
24/7/365 Monitoring & Alerting
Compromise Assessments
Threat Hunting
Vulnerability Management
CMMC Preparation & Assessment
Cybersecurity Assurance Readiness (CSAR®/RMF Pro)
ATO/RMF Support
If you are concerned about a potential threat or are experiencing a breach, contact our 24/7/365 emergency hotline at 888-860-0452.
Sign up to receive our biweekly newsletter that covers what's happening in cybersecurity including news, trends, and thought leadership.
At our core, Ingalls is a company that strives to be helpful to our clients while continuously innovating and evolving our technology and solutions. Since 2010, we have been dedicated to building a team and product that can stay steps ahead of threats, attacks, and vulnerabilities in an ever-changing landscape.
2 min read
John Frasier : Sep 6, 2021 12:00:00 AM
Imagine the United Nations General Assembly with no translators—and people speaking dozens of different languages. That’s what it can be like when security teams share metrics and data with their organization’s board of directors. Metrics that measure tool efficacy, visibility, and team performance are also important to track over time to garner information on trends—another key requirement for giving context to metrics. Ideally, organizations should demonstrate how each investment in people, processes, and technology improved the security program and reduced enterprise risk. (By Colin O'Connor, Security Boulevard) Ingalls: Software or tools alone cannot effectively defend against cyberattacks. People, processes, and technology must all be integrated into any successful cybersecurity risk management strategy. Ingalls helps businesses large and small manage security risks and defend against cyberattacks. If you’d like to learn more please contact us here. One of our cybersecurity experts will be more than happy to assist you and answer any questions you may have.
Collateral damage from DDoS attacks is quite common. ISPs often have to block some legitimate traffic initially to regain the ability to manage their networks. In some cases, filters can also cause additional load issues on routers. (By Reuters) Ingalls: DDoS attacks are becoming more common, with increased bandwidth and decreased duration. Contact us today for a risk assessment to ensure your organization has an adequate DDoS mitigation strategy.
Microsoft Corp. warns that attackers are exploiting a previously unknown vulnerability in Windows 10 and many Windows Server versions to seize control over PCs when users open a malicious document or visit a booby-trapped website. There is currently no official patch for the flaw, but Microsoft has released recommendations for mitigating the threat. (By Brian Krebs, Krebs on Security) Ingalls: Our MDR (Managed Detection and Response) services offer layered cybersecurity controls for effective risk management and rapid response. It was designed to be a method of proactive prevention against security threats to your environment, especially zero-day threats, making it one of the industry's leading cybersecurity tools. MDR is critical when it comes to staying ahead of all kinds of threats, detecting and stopping them before they become breaches.
A large number of Fortigate devices were compromised by threat actors exploiting CVE-2018-13379, which allows the theft of credentials from vulnerable devices. The vulnerability was mitigated by a patch in 2019, but many devices were not patched and remained vulnerable. Fortinet has released several advisories, including as recently as June of this year, reminding customers of the severity of the vulnerability. Now, hackers have posted a list of compromised devices and credentials on a Russian-language hacker forum. (By Ravie Lakshmanan, The Hacker News) Ingalls: Our Managed Detection and Response (MDR) service offers advanced anomaly detection, threat hunting, and sophisticated response guidance utilizing a defense-in-depth approach to cybersecurity. Our cybersecurity experts can also work closely with your team to ensure that robust patch management solutions are in place, a service not offered by most MSSPs.
One of the biggest reasons cited by Smith and other cyber experts for the disconnect between cyber spending and return on investment in the form of better protection comes down to labor. “I think we have a real shortage,” Smith told CNBC. “Many businesses don’t have the people that they need, either to implement the protections they, in some cases, are already paying for.” (By Eric Rosenbaum, CNBC)
Developing a Risk Management Approach to Cybersecurity By now most CISOs understand that focusing your cybersecurity program on regulatory...
Why Cybersecurity Has Become a “Team Sport” At a recent online round-table event, hosted by the New Statesman and sponsored by technology company...
1 min read
Top 5 Cybersecurity Predictions for 2020 When it comes to cybersecurity, staying ahead of threats – rather than reacting to them – is critical. In a...