Skip to the main content.
Government Programs
Integrated technology, solutions, and services that support rapid innovation within the DoD ecosystem.

CMMC Preparation & Assessment
Cybersecurity Assurance Readiness (CSAR®/RMF Pro)
ATO/RMF Support

Book GP Demo

Professional Services
Expertise in security strategy, incident response readiness, policy development, and risk assessments.

Risk Assessments
vCISO
Penetration Testing

Book ProServ Demo

Digital Forensics & Incident Response
Are You Under Attack?

If you are concerned about a potential threat or are experiencing a breach, contact our 24/7/365 emergency hotline at 888-860-0452.

CONTACT US

Subscribe-to-NetSec-News-v4Subscribe to NetSec News

Sign up to receive our biweekly newsletter that covers what's happening in cybersecurity including news, trends, and thought leadership.

SIGN UP

Ingalls Information Security

At our core, Ingalls is a company that strives to be helpful to our clients while continuously innovating and evolving our technology and solutions. Since 2010, we have been dedicated to building a team and product that can stay steps ahead of threats, attacks, and vulnerabilities in an ever-changing landscape.

Meet The Leadership Team

1 min read

Articles of interest from the week of May 2, 2022

Security Stuff Happens: What Will the Public Hear When You Say You've Been Breached?

A company's response to a breach is more important than almost anything else. But what constitutes a "good" response following a security incident? (By Tyler Farrar, Dark Reading)


Good End User Passwords Begin With a Well-Enforced
Password Policy

This interview with Help Net Security explains what makes passwords vulnerable and suggests some password best practices and policies organizations should implement to keep their systems secure. (By Mirko Zorz, Help Net Security)


U.S Cybersecurity Agency Lists 2021's Top 15 Most Exploited
Software Vulnerabilities

A "Top Routinely Exploited Vulnerabilities" report released by cybersecurity authorities from Australia, Canada, New Zealand, the U.K., and the U.S. reveals the top frequently weaponized software flaws. (By Ravie Lakshmanan, The Hacker News)


Data Security Must Be Prioritized In The Healthcare Industry

With the continued digitization of the healthcare industry, the risk of cyberattacks has increased dramatically as healthcare data breaches hit an all-time high last year. A new report found 45 million individuals were affected by healthcare breaches in 2021 alone, up from 34 million in 2020 and triple the 14 million impacted in 2018. (By Brian Foy, Forbes)


Phishers Taking Advantage of Gmail’s SMTP Relay Service To Impersonate Brands

Since April 2022 phishing emails have been sent to Gmail users from legitimate addresses, making it hard to tell spam from legitimate sources. (By Brian Stone, TechRepublic)

Sign Up For Network Security News

Articles of interest from the week of June 17, 2019

Why Cybersecurity Matters To Your Business You start a business. You grow your company from an idea to a fully functioning and profitable entity....

Read More

1 min read

Articles of interest from the week of August 2, 2021

Security Breaches Where Working From Home Is Involved Are Costlier, Claims IBM Report Firms looking to save money by shifting to more flexible ways...

Read More

Articles of interest from the week of June 15, 2020

Defending Your Budget: How to Show ROI of Cybersecurity Investments Until recently, proving the ROI of security investment has not been a significant...

Read More