About Us2023-12-13T11:25:57-05:00

Contact us at info[@]compsecdirect.com or via (443)-345-0503

CompSec Direct is a C4ISR firm specialized in Cyber Security. SDVOSB, Buy Maryland Cyber QMCC, & MBE certified company comprised of former network operators from different sectors of the federal government. We are a Maryland CATS+ master contract holder and are looking for new business partnerships to pursue new opportunities.

Use the form below to request additional information about our company and services.



    Case 1

    By |August 27th, 2019|Categories: Attribution, Breach, Case Study, Contracts, Cyber, Defensive Methodology, Disclosure, Forensic, Hacking, Hunting, Incident Response, Laws, Reports|Tags: , , , , |

    Case 1. If you like the case study, hit us [...]

    Comments Off on Case 1

    CompSec Direct now approved Cyber-security vendor in Maryland

    By |August 15th, 2019|Categories: Contracts, Cyber, Defensive Methodology, Forensic, Hunting, News, Pen-testing, Social Engineering|Tags: , , , , , |

    CompSec Direct has been approved as a Qualified Maryland Cybersecurity [...]

    Comments Off on CompSec Direct now approved Cyber-security vendor in Maryland

    White pages are back!: Aeronet Wireless exposes customer info over SNMP

    By |October 12th, 2018|Categories: Disclosure, e-Discovery|Tags: , , |

    Problem CompSec Direct recently became aware of an information disclosure [...]

    Comments Off on White pages are back!: Aeronet Wireless exposes customer info over SNMP

    Data Mining PDF documents; using data conversion to reduce analysis time

    By |May 31st, 2017|Categories: Automation, e-Discovery, Forensic, Scripts, Tesseract|Tags: , , , , , |

    Problem A month ago, we became aware of a way [...]

    Comments Off on Data Mining PDF documents; using data conversion to reduce analysis time

    Hunt-as-a-Service find out It started with #wannacry... How will you respond when the next threat attacks us? Capabilities Windows / Linux / Sun / Unix Penetration and Hardening Cisco / Juniper Penetration and Hardening Vulnerability Assessments Traffic Analysis and Network Penetration Forensic Analysis from Incident Response Digital Evidence Collection and eDiscovery Social Engineering / Physical Penetration Campaigns Ransomware Protection Services Security Analyst / SOC Analysts OCONUS Operations / Radio Frequency Signal Penetration Network Analysis / Sensor Configurations / SIEM Deployments case studies Black SPIN: Systematic Penetration Inside Network Learn what makes this hybrid assessment learn more a better solution for you Insider Advantage How much damage can employees cause in your workplace? learn more FIRM: Forensic Incident Response Management see now See how FIRM is the right answer to all cyber attack questions Proactive-Response Services Learn How You Can Expedite Your Companie's Reaction Time to Any Cyber Breach learn more PsyCo. Edge find out 99% of Cyber-Breaches start with Social Engineering Attacks- How Are You Protecting Yourself? Phishing & Whaling Campaign Threat Models VARS: Vulnerability Assessments Find out how VARS can give you the most distinguishable results learn more & Remediations Service Software Licensing Protect yourself from Piracy and Software Liabilities learn more Ransomware Protection Learn How to Protect Yourself from the Most Profitable Ransom Business of 2017 learn more "$209 million was paid to ransomware criminals in 2016" - CNN
    Go to Top