Articles of interest from the week of February 7, 2022
MFA Still Offers the Best Chance of Keeping Data Secure These best practices explain why MFA remains one of the best defenses for mitigating password...
24/7/365 Monitoring & Alerting
Compromise Assessments
Threat Hunting
Vulnerability Management
CMMC Preparation & Assessment
Cybersecurity Assurance Readiness (CSAR®/RMF Pro)
ATO/RMF Support
If you are concerned about a potential threat or are experiencing a breach, contact our 24/7/365 emergency hotline at 888-860-0452.
Sign up to receive our biweekly newsletter that covers what's happening in cybersecurity including news, trends, and thought leadership.
At our core, Ingalls is a company that strives to be helpful to our clients while continuously innovating and evolving our technology and solutions. Since 2010, we have been dedicated to building a team and product that can stay steps ahead of threats, attacks, and vulnerabilities in an ever-changing landscape.
1 min read
John Frasier : May 16, 2022 12:00:00 AM
The U.S. Cybersecurity and Infrastructure Agency issues an emergency security directive over VMware vulnerabilities CVE-2022-22972 and CVE-2022-22973, which threat actors are likely to exploit. (By Zeljka Zorz, Help Net Security)
Here at Ingalls, we are committed to the evolution and continual improvement of all our service offerings and are proud to announce the release of our Phalanx MDR Add-on designed to stop cyber threats at the human layer. Visit our blog for details.
For the first time in a year, security incidents involving email compromises surpassed ransomware incidents, a new analysis shows. (By Jai Vijayan, Dark Reading)
46% of IT, security, and cybersecurity leaders say they still store passwords in shared office documents. That’s despite an overwhelming 93% of respondents that require password management training, with 63% holding training more than once per year, according to a survey conducted by Pulse on behalf of Hitachi ID. (By Help Net Security)
Security researchers are warning that along with phishing and exploiting vulnerabilities in a public-facing application, these are the primary methods of compromise that ultimately lead to threat actors stealing data and encrypting systems. (By Ionut Ilascu, Bleeping Computer)
MFA Still Offers the Best Chance of Keeping Data Secure These best practices explain why MFA remains one of the best defenses for mitigating password...
Board Members Aren’t Taking Cybersecurity As Seriously as They Should A recent study reveals systemic challenges with security integration into...
Consumers Pay the Price as Data Breach Costs Reach All-Time High Last week IBM Security released the annual Cost of a Data Breach Report, revealing...