AI-Powered Cyber Defense
Orchestrated by Your Industry Experts

Cyber-AI Strategy and Education

Enhance your Cybersecurity Posture with AI. Our Discovery and Deep dive engagements will pave the way to Reduced Risk and optimized Workflow. Our workshops empower your Cybersecurity Staff with AI to defend against threat actors.

Data-Driven Automation

Extract the most out of your existing Cybersecurity Tools with our Data-Driven solutions with visible ROI.

Optimized SOC Operation

Leveraging strategic partnerships with IBM and Splunk, we are your trusted experts in optimizing your existing SOC operations built on top of QRadar/Enterprise Security SIEM platforms.

AppSec and DevOpsSec 2.0

Firms like Amazon push builds every 1 sec. Our expertise in Human Computer Interaction (HCI) will transform how your Security Professionals and Developers remediate security vulnerabilities within your DevOps Environment with transparent ROI.

Intelligent Vulnerability Management

Vulnerability Management is a big data problem. Our expertise in building Data-Intensive Applications and Intelligent Decision making will minimize Human Intervention and expedite Remediation process by strategically packaging your vulnerabilities and distributing them to different Business Units. Our team has already delivered immense value in Vulnerability Management for a large bank.

Risk-Driven Decision Making

Augment your decision making with our expertise in your chosen IT Risk Framework and Artifical Intelligence to ensure decisions are made on a Risk-Based approach.

Sophisticated Attacks

Pinpoint sophisticated attacks which are located near statistically dense regions in your existing Machine Learning models - the ones that evade detection. Our solution scans critical components in the kill chain.

Easy Deployment

Easily integrate our solution into your existing workflow with simple APIs. We deploy on your chosen cloud environment: AWS, Google Cloud, Azure.

Two Powerful AI Modules

Our solution is powered by two state of the art AI Modules.

Module 1: Dynamically Surface Rare Attacks

This module quickly performs rare class identification for highly imbalanced and dimentional datasets. This is used to detect rare attacks in critical aspects of a kill chain.

  • Rare class identification with minimum training
  • Surface attacks residing near stastical norm
  • High level algorithm overview and benchmark available on request

Module 2: Intelligent Distribution of Micro-Tasks

Use this module to create security focused teams instantly and intelligently distribute simple tasks geared towards identifying critical aspects of a kill chain. This optimizes Module 1.

  • High Accuracy
  • Simple tasks. vs
  • High level algorithm overview and benchmark available on request

Contextual Knowledge Graph

Leverage Contextual knowledge graph generated from Module 2 for continual training.

  • Tragetted Training
  • Distributed Security Awareness
  • From "Weakest Link" to "Security Champion"

Powerful Graph Computing

We are applying the latest research in Graph Computing to make sense of your ever growing richly interconnected environment and bring previously hidden relationsips to light.

  • Fast Complex Queries
  • Proven Scalability
  • Real Time Analytics

Tahseen Shabab

Chief Security Officer

Tahseen graduated from the University of Waterloo in Electrical Engineering. He has ever since dedicated his career towards Cybersecurity. He was the Lead Developer of IBM AppScan Source Cloud, a leading Application Security (SAST) Tool. He is an Award winning Cybersecurity Consultant for multiple Fortune 500 firms, Financial institutions, and Governments. Tahseen was previously Developer #8 of Beat the boss 2/3 game, which went to 2nd in iOS charts in 2013. As a Coop student, he was one of 14 Network Engineers at Public Mobile, a telecommunications startup, that was acquired by Telus.

Prof. Kate Larson

Advisor - AI

Prof. Kate Larson is a professor at the University of Waterloo and is affiliated with the AI Group. She is interested in issues that arise in settings where self-interested agents interact. She works with ideas that lie in the intersection of artificial intelligence, game theory and microeconomics.

Prof. Larry Smith

Advisor - Strategy

An adjunct associate professor at the University of Waterloo, Larry is the Founding Director of the Problem Lab, one of the few in the world devoted solely to finding and understanding important problems. He has happily taught ten percent of Waterloo’s alumni, and is a recipient of the University’s Distinguished Teacher Award.

IBM AppSec on Cloud

Tahseen was previously a Lead Developer of IBM AppScan Source Cloud Tool (SAST) which identifies vulnerabilities on Source Code. AppScan Source is trusted by many Fortune 500 firms. His contributions earned him the "IBM Managers Choice Award".

Large Bank (Canada) DevSecOps

Tahseen advised the client on Security Best Practices in DevOps Pipeline, including the use of proactive security controls, threat modeling, security unit tests, SAST, DAST and more.

Large Bank (Canada) IT Risk Vulnerability Management

Tahseen designed and developed a Data Driven solution to address the clients Vulnerability Management needs. He implemented IT Risk Model calculations in database solution to perform Risk Assessment. Tahseen lead development of SQL queries to generate trends and produce meaningful information from raw data and created ETL package using SSIS to automate data import, calculation and reporting process with another consultant. His contributions earned him an award.

Large Bank (Canada) AppSec

Tahseen performed Application Security Assessment (DAST) of 35+ Web Applications using tools and manual testing. He also authored 10 hr Application Security Training session for Consultants and Developers, focusing on how to best use tools to identify OWASP Top 10 Security Risks.

Fortune 60 Telecommunication Firm (US) Secure SDLC Automation

Tahseen designed and developed a custom solution using Node js, Express js, JSON and XML to integrate with IBM AppScan Enterprise REST APIs to automate DAST/SAST in SDLC.

North American Government Security Architecture

Tahseen Architected the integration of a Network Access Control (NAC) solution to an existing infrastructure being built by a large vendor for the client.

Top Financial Services Firm (Canada) DDoS Protection

Tahseen was the technical lead responsible for preparing change grid and organizing activities related to deployment of DDoS Solution to 14 mission critical sites. He also succesfully managed the deployment of these sites by coordinating with clients and an external vendor.

Top Printing Services Firm (US) IPS SIEM Optimization

Tahseen was one of two consultants to perform tuning of IPS leveraging data-driven approach prior to integration with IBM QRadar SIEM. They analyzed Intrusion Prevention System (IPS) logs, identified trends and provided recommendations to reduce false positives (70% of logs) and set preventive measures to block attacks. The Client realized the value of their work and extended their contract.

Leading Certification Consulting Firm (Canada) AppSec

Tahseen performed Application Security Assessment (DAST) of 35+ Web Applications using AppScan Standard, Burp and manual testing

Leading Engineered Environmental Solutions Firm AppSec

Tahseen performed Web Appliation Security Assessment DAST of clients Web Applications using IBM AppScan Standard, Burp and Manual Testing.

Multiple Health Insurance Firm AppSec

Tahseen performed Web Appliation Security Assessment DAST of Word Press Applications using WPSan, IBM AppScan Standard, Burp and Manual Testing.

Schedule a Demo!

We are excited to demonstrate the current state of our technology. We are even more excited to learn from your feedback! Email us at!