About Us2023-12-13T11:25:57-05:00

Contact us at info[@]compsecdirect.com or via (443)-345-0503

CompSec Direct is a C4ISR firm specialized in Cyber Security. SDVOSB, Buy Maryland Cyber QMCC, & MBE certified company comprised of former network operators from different sectors of the federal government. We are a Maryland CATS+ master contract holder and are looking for new business partnerships to pursue new opportunities.

Use the form below to request additional information about our company and services.



    Stepson of Stuxnet stalked Kaspersky for months, tapped Iran nuke talks – ArsTechnica

    By |June 13th, 2015|Categories: Breach, Hacking, Reports|Tags: , |

    Excellent report by Kaspersky that unmasks a breach inside their [...]

    Comments Off on Stepson of Stuxnet stalked Kaspersky for months, tapped Iran nuke talks – ArsTechnica

    Bsides PR 2015 – Fun with Tor : How anonymity services complicate actor attribution CompSec Direct

    By |May 29th, 2015|Categories: Attribution, Defensive Methodology, Demo, Hacking, Tor|Tags: , , , , , , , |

    Hello from Puerto Rico. Here are our slides from Jose [...]

    Comments Off on Bsides PR 2015 – Fun with Tor : How anonymity services complicate actor attribution CompSec Direct

    BSides Charm 2015 – Mass Hunting and Exploitation with PowerShell Slides CompSec Direct

    By |April 12th, 2015|Categories: Cyber, Defensive Methodology, Demo, Hunting, Powershell|Tags: , , , , , |

    Hello Everyone, Here are the slides from our presentation at [...]

    Comments Off on BSides Charm 2015 – Mass Hunting and Exploitation with PowerShell Slides CompSec Direct

    Cybergeddon: Why the Internet could be the next “failed state” -ArsTechnica

    By |February 26th, 2015|Categories: Cyber, Hacking|Tags: , |

    Excellent article by Sean Gallagher from ArsTechnica. It truly captures [...]

    Comments Off on Cybergeddon: Why the Internet could be the next “failed state” -ArsTechnica

    Hunt-as-a-Service find out It started with #wannacry... How will you respond when the next threat attacks us? Capabilities Windows / Linux / Sun / Unix Penetration and Hardening Cisco / Juniper Penetration and Hardening Vulnerability Assessments Traffic Analysis and Network Penetration Forensic Analysis from Incident Response Digital Evidence Collection and eDiscovery Social Engineering / Physical Penetration Campaigns Ransomware Protection Services Security Analyst / SOC Analysts OCONUS Operations / Radio Frequency Signal Penetration Network Analysis / Sensor Configurations / SIEM Deployments case studies Black SPIN: Systematic Penetration Inside Network Learn what makes this hybrid assessment learn more a better solution for you Insider Advantage How much damage can employees cause in your workplace? learn more FIRM: Forensic Incident Response Management see now See how FIRM is the right answer to all cyber attack questions Proactive-Response Services Learn How You Can Expedite Your Companie's Reaction Time to Any Cyber Breach learn more PsyCo. Edge find out 99% of Cyber-Breaches start with Social Engineering Attacks- How Are You Protecting Yourself? Phishing & Whaling Campaign Threat Models VARS: Vulnerability Assessments Find out how VARS can give you the most distinguishable results learn more & Remediations Service Software Licensing Protect yourself from Piracy and Software Liabilities learn more Ransomware Protection Learn How to Protect Yourself from the Most Profitable Ransom Business of 2017 learn more "$209 million was paid to ransomware criminals in 2016" - CNN
    Go to Top