About Us2021-06-20T23:05:11-04:00

Contact us at info[@]compsecdirect.com or via (443)-345-0503

CompSec Direct is a C4ISR firm specialized in Cyber Security. SDVOSB, Buy Maryland Cyber QMCS, & MBE certified company comprised of former network operators from different sectors of the federal government. We are a Maryland CATS+ master contract holder and are looking for new business partnerships to pursue new opportunities.

Use the form below to request additional information about our company and services.

    Ransomware: Hacienda of Puerto Rico

    By |June 21st, 2021|Categories: Attribution, Breach, Case Study, Contracts, Cyber, Defensive Methodology, Disclosure, Firewall, Forensic, Hacking, Incident Response, Reports|Tags: , , |

    We are publishing a redacted case study related to the [...]

    Comments Off on Ransomware: Hacienda of Puerto Rico

    CompSec Direct wins firmware analysis prototype event held at Dreamport

    By |June 8th, 2020|Categories: Automation, Cyber, Reports|Tags: , , , |

    After placing 5th on a previous challenge, we were happy [...]

    Comments Off on CompSec Direct wins firmware analysis prototype event held at Dreamport

    Kleared4 closed-operation fly-away edge kit

    By |June 7th, 2021|Categories: Automation, Cyber, Defensive Methodology, Design, Forensic, Hacking, Hunting, Incident Response, Networking|

    We have started integrating closed-operation fly-away edge appliances with Kleared4, [...]

    Comments Off on Kleared4 closed-operation fly-away edge kit

    BSides PR 2019 Wrap-Up: It starts with you

    By |October 16th, 2019|Categories: Case Study, Cyber, Defensive Methodology, Disclosure, Forensic, Incident Response, Laws, Legislation, Videos|Tags: , , , , , , , |

    Our President, @jfersec, had the privilege of Keynote during BSides [...]

    Comments Off on BSides PR 2019 Wrap-Up: It starts with you

    Hunt-as-a-Service find out It started with #wannacry... How will you respond when the next threat attacks us? Capabilities Windows / Linux / Sun / Unix Penetration and Hardening Cisco / Juniper Penetration and Hardening Vulnerability Assessments Traffic Analysis and Network Penetration Forensic Analysis from Incident Response Digital Evidence Collection and eDiscovery Social Engineering / Physical Penetration Campaigns Ransomware Protection Services Security Analyst / SOC Analysts OCONUS Operations / Radio Frequency Signal Penetration Network Analysis / Sensor Configurations / SIEM Deployments case studies Black SPIN: Systematic Penetration Inside Network Learn what makes this hybrid assessment learn more a better solution for you Insider Advantage How much damage can employees cause in your workplace? learn more FIRM: Forensic Incident Response Management see now See how FIRM is the right answer to all cyber attack questions Proactive-Response Services Learn How You Can Expedite Your Companie's Reaction Time to Any Cyber Breach learn more PsyCo. Edge find out 99% of Cyber-Breaches start with Social Engineering Attacks- How Are You Protecting Yourself? Phishing & Whaling Campaign Threat Models VARS: Vulnerability Assessments Find out how VARS can give you the most distinguishable results learn more & Remediations Service Software Licensing Protect yourself from Piracy and Software Liabilities learn more Ransomware Protection Learn How to Protect Yourself from the Most Profitable Ransom Business of 2017 learn more "$209 million was paid to ransomware criminals in 2016" - CNN
    Go to Top