Enhance your Cybersecurity Posture with AI. Our Discovery and Deep dive engagements will pave the way to Reduced Risk and optimized Workflow. Our workshops empower your Cybersecurity Staff with AI to defend against threat actors.
Extract the most out of your existing Cybersecurity Tools with our Data-Driven solutions with visible ROI.
Leveraging strategic partnerships with IBM and Splunk, we are your trusted experts in optimizing your existing SOC operations built on top of QRadar/Enterprise Security SIEM platforms.
Firms like Amazon push builds every 1 sec. Our expertise in Human Computer Interaction (HCI) will transform how your Security Professionals and Developers remediate security vulnerabilities within your DevOps Environment with transparent ROI.
Vulnerability Management is a big data problem. Our expertise in building Data-Intensive Applications and Intelligent Decision making will minimize Human Intervention and expedite Remediation process by strategically packaging your vulnerabilities and distributing them to different Business Units. Our team has already delivered immense value in Vulnerability Management for a large bank.
Augment your decision making with our expertise in your chosen IT Risk Framework and Artifical Intelligence to ensure decisions are made on a Risk-Based approach.
Pinpoint sophisticated attacks which are located near statistically dense regions in your existing Machine Learning models - the ones that evade detection. Our solution scans critical components in the kill chain.
Easily integrate our solution into your existing workflow with simple APIs. We deploy on your chosen cloud environment: AWS, Google Cloud, Azure.
Our solution is powered by two state of the art AI Modules.
This module quickly performs rare class identification for highly imbalanced and dimentional datasets. This is used to detect rare attacks in critical aspects of a kill chain.
Use this module to create security focused teams instantly and intelligently distribute simple tasks geared towards identifying critical aspects of a kill chain. This optimizes Module 1.
Leverage Contextual knowledge graph generated from Module 2 for continual training.
We are applying the latest research in Graph Computing to make sense of your ever growing richly interconnected environment and bring previously hidden relationsips to light.
Tahseen graduated from the University of Waterloo in Electrical Engineering. He has ever since dedicated his career towards Cybersecurity. He was the Lead Developer of IBM AppScan Source Cloud, a leading Application Security (SAST) Tool. He is an Award winning Cybersecurity Consultant for multiple Fortune 500 firms, Financial institutions, and Governments. Tahseen was previously Developer #8 of Beat the boss 2/3 game, which went to 2nd in iOS charts in 2013. As a Coop student, he was one of 14 Network Engineers at Public Mobile, a telecommunications startup, that was acquired by Telus.
Prof. Kate Larson is a professor at the University of Waterloo and is affiliated with the AI Group. She is interested in issues that arise in settings where self-interested agents interact. She works with ideas that lie in the intersection of artificial intelligence, game theory and microeconomics.
An adjunct associate professor at the University of Waterloo, Larry is the Founding Director of the Problem Lab, one of the few in the world devoted solely to finding and understanding important problems. He has happily taught ten percent of Waterloo’s alumni, and is a recipient of the University’s Distinguished Teacher Award.
Tahseen was previously a Lead Developer of IBM AppScan Source Cloud Tool (SAST) which identifies vulnerabilities on Source Code. AppScan Source is trusted by many Fortune 500 firms. His contributions earned him the "IBM Managers Choice Award".
Tahseen advised the client on Security Best Practices in DevOps Pipeline, including the use of proactive security controls, threat modeling, security unit tests, SAST, DAST and more.
Tahseen designed and developed a Data Driven solution to address the clients Vulnerability Management needs. He implemented IT Risk Model calculations in database solution to perform Risk Assessment. Tahseen lead development of SQL queries to generate trends and produce meaningful information from raw data and created ETL package using SSIS to automate data import, calculation and reporting process with another consultant. His contributions earned him an award.
Tahseen performed Application Security Assessment (DAST) of 35+ Web Applications using tools and manual testing. He also authored 10 hr Application Security Training session for Consultants and Developers, focusing on how to best use tools to identify OWASP Top 10 Security Risks.
Tahseen designed and developed a custom solution using Node js, Express js, JSON and XML to integrate with IBM AppScan Enterprise REST APIs to automate DAST/SAST in SDLC.
Tahseen Architected the integration of a Network Access Control (NAC) solution to an existing infrastructure being built by a large vendor for the client.
Tahseen was the technical lead responsible for preparing change grid and organizing activities related to deployment of DDoS Solution to 14 mission critical sites. He also succesfully managed the deployment of these sites by coordinating with clients and an external vendor.
Tahseen was one of two consultants to perform tuning of IPS leveraging data-driven approach prior to integration with IBM QRadar SIEM. They analyzed Intrusion Prevention System (IPS) logs, identified trends and provided recommendations to reduce false positives (70% of logs) and set preventive measures to block attacks. The Client realized the value of their work and extended their contract.
Tahseen performed Application Security Assessment (DAST) of 35+ Web Applications using AppScan Standard, Burp and manual testing
Tahseen performed Web Appliation Security Assessment DAST of clients Web Applications using IBM AppScan Standard, Burp and Manual Testing.
Tahseen performed Web Appliation Security Assessment DAST of Word Press Applications using WPSan, IBM AppScan Standard, Burp and Manual Testing.