It's almost that time of year ... #iitsec2024 is just days away! Stop by our booth #372 to meet our Ingalls Government Programs Team and join a live demo of CSAR/RMF Pro, our ATO software automation tool. See you in Orlando Dec. 2-5!
Ingalls Information Security
计算机和网络安全
Woodworth,Louisiana 3,837 位关注者
Enabling Innovation Through Better Cyber Risk Management
关于我们
Ingalls Information Security is a full-service cybersecurity risk management company based in Woodworth, Louisiana. We are also located in the Cyber Innovation Center in Bossier City, Louisiana. Our company focuses on enabling cybersecurity risk management through innovative technology. We have four business lines: Incident Response, Managed Extended Detection & Response, Professional Services, and Government Programs. At our core, Ingalls is a company that strives to be helpful to our clients while continuously innovating and evolving our technology and solutions. Since 2010, we have been dedicated to building a team and product that can stay steps ahead of threats, attacks, and vulnerabilities in an ever-changing landscape. In Government Programs we focus on supporting the DoD and DoD contractors. Ingalls provides Cybersecurity Maturity Model Certification (CMMC) preparation and consulting services, RMF/ATO services, and has two innovative technologies: Viewpoint, a patented cybersecurity data visualization tool, and CSAR, a cybersecurity assurance readiness tool that supports agile ATO process. Learn more about Ingalls: https://iinfosec.com/about-us/
- 网站
-
https://iinfosec.com
Ingalls Information Security的外部链接
- 所属行业
- 计算机和网络安全
- 规模
- 11-50 人
- 总部
- Woodworth,Louisiana
- 类型
- 私人持股
- 创立
- 2010
- 领域
- Risk-based Audits、Web Application Penetration Testing、Incident Response、Managed Detection and Response、MSSP、Penetration Testing、Cybersecurity Consulting、vCISO、Digital Forensics、Vulnerability Assessment、Social Engineering、Governance, Risk & Compliance、Records Management和Malware Analysis
地点
Ingalls Information Security员工
-
Brad Schrack, CISSP
Sr. Information Security Analyst at Ingalls Information Security- CISSP | Certified CMMC Professional | CMMC - Registered Practitioner
-
Bill Price
Cybersecurity Consultant | MSCSIA | CISSP | CEH | SSCP | ITIL
-
Connie Hernandez, CFCM
DoD and National Security Acquisition Professional, Bringing innovative technology to the warfighter
-
Jason Ingalls
Cybersecurity Executive
动态
-
Oh, the humanity! How to make humans part of cybersecurity design. In this week's edition of Network Security News, you can read more about this top story and get an expert take from our Sr. Cybersecurity Consultant, Scotlyn Clark, MBA, CISSP. What if the missing piece in cybersecurity isn’t a new tool, but people? A new article explores why human-centered design in cybersecurity could be the key to a stronger, more resilient defense. By integrating user needs into security measures, companies can reduce risky behavior and improve overall security culture. This approach shifts focus from simply enforcing rules to empowering employees to make safer choices. Discover how a people-first perspective could transform cybersecurity, making it more intuitive and effective for everyone involved. (Dark Reading) Read more: https://lnkd.in/gsU2DGRG #Cybersecurity #HumanCenteredDesign #SecurityAwareness #Infosec
-
Black Basta ransomware poses as IT support on Microsoft Teams to breach networks. In this week's edition of Network Security News, you can read more about this top story and get an expert take from our Tier 3 SOC Analyst, Andrew Tucker. The BlackBasta ransomware operation has moved its social engineering attacks to Microsoft Teams, posing as corporate help desks contacting employees to assist them with an ongoing spam attack. Black Basta is a ransomware operation active since April 2022 and responsible for hundreds of attacks against corporations worldwide. (BleepingComputer) Read more:?https://lnkd.in/grxF7iX9 #CyberSecurity #Ransomware #NetworkSecurity #ITSecurity #MicrosoftTeams #Phishing #CyberAwareness
Black Basta Ransomware Poses as IT Support on Microsoft Teams to Breach Networks
Ingalls Information Security,发布于领英
-
Good luck to Margaret Merkle, PMP on her Department of the Air Force Spark Tank Challenge pitch for CyberAssess tomorrow! https://hubs.li/Q02WbcgY0 #cyberassess #rmf #ATO #sparktank
-
Exciting things ahead! Our recent Town Hall meeting brought together our Executive Leadership Team and the Government Programs department for a full day of collaborative planning and strategizing. We dove deep into shaping the next iteration of Ingalls, focusing on solutions and strengthening our mission. A great day of teamwork and vision-setting as we prepare to deliver even greater impact for our clients and partners. #Leadership #Innovation #GovernmentPrograms #IngallsNextChapter
-
Chinese researchers break RSA encryption with a quantum computer. In this week's edition of Network Security News, you can read more about this top story and get an expert take from our SOC Manager, Craig Flynn. The research team, led by Wang Chao from Shanghai University, found that D-Wave’s quantum computers can optimize problem-solving in a way that makes it possible to attack encryption methods such as RSA. (CSO) Read more: https://lnkd.in/gGKVKksg #QuantumComputing #RSAEncryption #cybersecurity #EncryptionBreakthrough #DataSecurity #Cryptography #QuantumThreats #CyberRisk #Infosec #ITSecurity #EmergingTech #SecurityInnovation #QuantumEncryption #CSO
Chinese Researchers Break RSA Encryption With a Quantum Computer
Ingalls Information Security,发布于领英
-
1) Require Strong, Unique Passwords Secure your network by enforcing strong password policies 2) Update Business Software Establish ongoing network security/patching procedures to prevent attacks. Enable automatic updates whenever possible and be sure to obtain, test and deploy the latest versions of operating systems and applications. 3) Require Multifactor Authentication Use the strongest level of MFA possible. 4) Teach Staff to Avoid Phishing The most effective strategy an organization can take to protect their data is educating their employees about cyber threats and how their actions can expose or protect critical digital assets from being attacked. 5) Conduct Periodic Reviews Use tools such as cybersecurity risk assessment tools, dark web monitoring tools, leaked data monitoring tools and credential monitoring tools to help with assessing and analyzing the company’s digital footprint and preventing cyberattacks.
-
Understanding compliance between commercial, government, DoD & secret offerings – Sept 2024 update. In this week's edition of Network Security News, you can read more about this top story and get an expert take from our Director of Government Programs, Brandi Pickett. Navigating the complex world of compliance across commercial, government, and Department of Defense (DoD) sectors can be challenging. This article breaks down the key differences and overlaps, providing valuable insights for organizations looking to meet the specific regulatory requirements of each. Whether you're involved in tech, public sector operations, or compliance management, understanding these nuances is crucial for success. Dive in to learn more! (Microsoft) Read more:?https://lnkd.in/gKasxHaa #CUI #CloudCompliance #MicrosoftCloud #FedRAMP #DoDCompliance #ITAR #GovTech #CloudSecurity #PublicSector #ComplianceManagement #Cybersecurity #GovernmentCloud #CloudComputing #RegulatoryCompliance #SecureCloud #DataProtection #CommercialCloud
Understanding Compliance Between Commercial, Government, DoD & Secret Offerings - Sept 2024 Update
Ingalls Information Security,发布于领英
-
Intel firmware vulnerability: Critical update for system security (2024.3 IPU – UEFI Firmware Advisory). In this week's edition of Network Security News, you can read more about this top story and get an expert take from our Senior SOC Analyst, Hunter Landry. Potential security vulnerabilities in UEFI firmware for some Intel? Processors may allow escalation of privilege, denial of service, or information disclosure. Intel is releasing UEFI firmware updates to mitigate these potential vulnerabilities. (Intel) Read more: https://lnkd.in/gpRnjFRZ #cybersecurity #Intel #securityadvisory #vulnerabilitymanagement #dataprotection #ITSecurity #systemsecurity #cyberdefense #infosec #threatmitigation #IntelSecurity #cyberrisk #securityupdate
Intel Firmware Vulnerability: Critical Update for System Security (2024.3 IPU - UEFI Firmware Advisory)
Ingalls Information Security,发布于领英
-
Our team had an incredible experience at the Air, Space & Cyber Conference in National Harbor, MD this week! It was a fantastic opportunity to connect with so many professionals and enthusiasts in the cybersecurity and defense industries. We appreciate everyone who took the time to visit our booth, ask questions, and engage in meaningful conversations about the evolving landscape of cybersecurity. Your interest and enthusiasm inspire us to keep pushing the boundaries of innovation. Thank you once again, and we look forward to staying connected with everyone we met! #Cybersecurity #RMF #ATO #CMMC #AFANational #AirForce #SpaceForce #USAF #Airman #Guardian