Skip to the main content.
Government Programs
Integrated technology, solutions, and services that support rapid innovation within the DoD ecosystem.

CMMC Preparation & Assessment
Cybersecurity Assurance Readiness (CSAR®/RMF Pro)
ATO/RMF Support

Book GP Demo

Professional Services
Expertise in security strategy, incident response readiness, policy development, and risk assessments.

Risk Assessments
vCISO
Penetration Testing

Book ProServ Demo

Digital Forensics & Incident Response
Are You Under Attack?

If you are concerned about a potential threat or are experiencing a breach, contact our 24/7/365 emergency hotline at 888-860-0452.

CONTACT US

Subscribe-to-NetSec-News-v4Subscribe to NetSec News

Sign up to receive our biweekly newsletter that covers what's happening in cybersecurity including news, trends, and thought leadership.

SIGN UP

Ingalls Information Security

At our core, Ingalls is a company that strives to be helpful to our clients while continuously innovating and evolving our technology and solutions. Since 2010, we have been dedicated to building a team and product that can stay steps ahead of threats, attacks, and vulnerabilities in an ever-changing landscape.

Meet The Leadership Team

Cybersecurity Blog

Insights and perspectives on cybersecurity, risk management, and safeguarding your digital assets

Cybersecurity Blog
Okta IAM Platform Cybersecurity Advisory

2 min read

Okta IAM Platform Cybersecurity Advisory

On March 22, 2022, the Lapsus$ threat group (aka DEV-0537), who recently gained notoriety for compromises including Microsoft, Samsung, Nvidia, and others, announced that they had compromised Identity Access Management (IAM) platform, Okta. Further,...

Read More
Veeam Server RCE Cybersecurity Advisory

3 min read

Veeam Server RCE Cybersecurity Advisory

The Veeam Distribution Service installed on Veeam Backup & Replication servers runs on TCP 9380 with default settings, and allows unauthenticated...

Read More
3 Things to Consider When Picking Antivirus Software for Home Use

3 min read

3 Things to Consider When Picking Antivirus Software for Home Use

Today, with ever-increasing frequency, we see news stories about companies getting breached and personal data being stolen. New malware continues to...

Read More
Attackers Don't Break-in. They Log in.

2 min read

Attackers Don't Break-in. They Log in.

Cybersecurity used to involve a fairly straightforward set of technical controls that kept networks secure and data backed up in the event of a...

Read More
Log4Shell - Log4j Vulnerability (CVE-2021-44228)

3 min read

Log4Shell - Log4j Vulnerability (CVE-2021-44228)

Apache Log4j2 <=2.14.1 JNDI features used in the configuration, log messages, and parameters do not protect against attacker-controlled LDAP and...

Read More
The Phishing Adventures of Huck Phinn, Casting Wide Nets

5 min read

The Phishing Adventures of Huck Phinn, Casting Wide Nets

Chapter 6 In the previous chapter, all seemed well with Huckleberry “Huck” Phinn and the St. Petersburg Wildlife Foundation. Huck and the gang at St....

Read More
The Top 5 2021 Holiday Scams to be Aware of

1 min read

The Top 5 2021 Holiday Scams to be Aware of

These tips will show your users what to watch out for in emails as well as on mobile devices. We recommend printing these out, they are great at-desk...

Read More
 

Subscribe to NetSec News

Sign up to receive our biweekly newsletter that covers what's happening in cybersecurity including news, trends, and thought leadership.

SIGN UP

Subscribe-to-NetSec-News-v4-1