(function(i,s,o,g,r,a,m){ i['GoogleAnalyticsObject']=r; i[r]=i[r]||function(){(i[r].q=i[r].q||[]).push(arguments)}, i[r].l=1*new Date(); a=s.createElement(o),m=s.getElementsByTagName(o)[0]; a.async=1; a.data-privacy-src=g; m.parentNode.insertBefore(a,m) })(window,document,'script','//www.google-analytics.com/analytics.js','ga'); ga('create', 'UA-132428928-1', 'auto'); ga('send', 'pageview');

Pen-testing

Kleared4 Edge Fly Away Kits

2025-04-29T14:19:36-04:00

During pandemic, we could not travel to customer locations and wanted to continue working on providing quality pentests and incident response services. CompSec Direct created small shippable cyber kits packaged inside PPE containers and has continued to improve this concept. "For us it was simple, adapt or close. While other vendors create large field kits, we [...]

Kleared4 Edge Fly Away Kits2025-04-29T14:19:36-04:00

CTF-Pasteables

2022-06-13T17:38:43-04:00

“Typing Kills”, so even if you do not agree with this; it’s true. Operator error grows the more you type. It’s akin to “measure twice, cut once”. In Capture the Flags (CTF’s), we often redo the same methodology and the only thing we change are network variables and usernames, the syntax remains constant. Over the years, [...]

CTF-Pasteables2022-06-13T17:38:43-04:00

CompSec Direct now approved Cyber-security vendor in Maryland

2022-06-15T00:32:05-04:00

CompSec Direct has been approved as a Qualified Maryland Cybersecurity Seller (QMCS) by the Department of Commerce of Maryland. This allows us to provide cybersecurity services to qualifying companies under the Buy Maryland Cybersecurity (BMC) program. The program allows companies with 50 employees or less to purchase services and products from approved vendors like CompSec Direct. [...]

CompSec Direct now approved Cyber-security vendor in Maryland2022-06-15T00:32:05-04:00

CompSec Direct’s president presents Shodan research at local security conference in Puerto Rico

2022-06-15T00:53:53-04:00

CompSec Direct president, Jose Fernandez, presented an open-source intelligence gathering tool called Shodan-Runner at the Bsides PR security conference hosted on Oct 6,2016 in Puerto Rico. The tool allows users to use external CSV files in conjunction with the Shodan api in python to search for associations between different different fields. Using this tool reduces initial [...]

CompSec Direct’s president presents Shodan research at local security conference in Puerto Rico2022-06-15T00:53:53-04:00

Forcepoint 2015 Threat Report

2022-06-15T00:55:26-04:00

An excellent publication from Forcepoint that covers CnC malware, malicious insiders and attribution. Unlike other threat reports, this report covers multiple human factors that are often neglected in technical reports. In some cases, human error and predisposition to reuse malware has lead thee researchers to determine a high probability of configuration reuse which leads to easier detection of [...]

Forcepoint 2015 Threat Report2022-06-15T00:55:26-04:00

Pen-testing Guidelines posted from PCI-DSS

2022-06-15T01:24:07-04:00

PCI-DSS recently released a revised document that covers pen-testing requirements for merchants and security providers. The document does a good job of comparing pen-testing with vulnerability assessments. If your company recently had a pen-test or vulnerability assessment done that did not cover all of these area and more, then call us and compare. Here is a [...]

Pen-testing Guidelines posted from PCI-DSS2022-06-15T01:24:07-04:00
Go to Top