Augment your decision making with our expertise in your chosen IT Risk Framework and Artifical Intelligence to ensure decisions are made on a Risk-Based approach.
Firms like Amazon push builds every 1 sec. Our expertise in Human Computer Interaction (HCI) will transform how your Security Professionals and Developers remediate security vulnerabilities within your DevOps Environment with transparent ROI.
Extract the most out of your existing Cybersecurity Tools with our Data-Driven solutions with visible ROI.
Vulnerability Management is a big data problem. Our expertise in building Data-Intensive Applications and Intelligent Decision making will minimize Human Intervention and expedite Remediation process by strategically packaging your vulnerabilities and distributing them to different Business Units. Our team has already delivered immense value in Vulnerability Management for a large bank.
Pinpoint sophisticated attacks which are located near statistically dense regions in your existing Machine Learning models - the ones that evade detection. Our solution scans critical components in the kill chain.
Easily integrate our solution into your existing workflow. We are built on the Cloud.
Our solution is powered by two state of the art AI Modules.
This module quickly performs rare class identification for highly imbalanced and dimentional datasets. This is used to detect rare attacks in critical aspects of a kill chain.
Use this module to create security focused teams instantly and intelligently distribute remediation efforts.
Leverage Contextual knowledge graph generated from Module 2 for continual training.
We are applying the latest research in Graph Computing to make sense of your ever growing richly interconnected environment and bring previously hidden relationsips to light.
Experience scalable discovery of events leveraging our Explainable Resoning System
Identify the information you need from an ocean of data leveraging simple search.
Easily integrate with your environment. Our current offering is built on AWS using Security Best Practices.
Tahseen graduated from the University of Waterloo in Electrical Engineering. He has ever since dedicated his career towards Cybersecurity. He was the Lead Developer of IBM AppScan Source Cloud, a leading Application Security (SAST) Tool. He is an Award winning Cybersecurity Consultant for multiple Fortune 500 firms, Financial institutions, and Governments. Tahseen was previously Developer #8 of Beat the boss 2/3 game, which went to 2nd in iOS charts in 2013. As a Coop student, he was one of 14 Network Engineers at Public Mobile, a telecommunications startup, that was acquired by Telus.
Prof. Kate Larson is a professor at the University of Waterloo and is affiliated with the AI Group. She is interested in issues that arise in settings where self-interested agents interact. She works with ideas that lie in the intersection of artificial intelligence, game theory and microeconomics.
An adjunct associate professor at the University of Waterloo, Larry is the Founding Director of the Problem Lab, one of the few in the world devoted solely to finding and understanding important problems. He has happily taught ten percent of Waterloo’s alumni, and is a recipient of the University’s Distinguished Teacher Award.
Tahseen was previously a Lead Developer of IBM AppScan Source Cloud Tool (SAST) which identifies vulnerabilities on Source Code. AppScan Source is trusted by many Fortune 500 firms. His contributions earned him the "IBM Managers Choice Award".
Tahseen advised the client on Security Best Practices in DevOps Pipeline, including the use of proactive security controls, threat modeling, security unit tests, SAST, DAST and more.
Tahseen designed and developed a Data Driven solution to address the clients Vulnerability Management needs. He implemented IT Risk Model calculations in database solution to perform Risk Assessment. Tahseen lead development of SQL queries to generate trends and produce meaningful information from raw data and created ETL package using SSIS to automate data import, calculation and reporting process with another consultant. His contributions earned him an award.
Tahseen performed Application Security Assessment (DAST) of 35+ Web Applications using tools and manual testing. He also authored 10 hr Application Security Training session for Consultants and Developers, focusing on how to best use tools to identify OWASP Top 10 Security Risks.
Tahseen designed and developed a custom solution using Node js, Express js, JSON and XML to integrate with IBM AppScan Enterprise REST APIs to automate DAST/SAST in SDLC.
Tahseen Architected the integration of a Network Access Control (NAC) solution to an existing infrastructure being built by a large vendor for the client.
Tahseen was the technical lead responsible for preparing change grid and organizing activities related to deployment of DDoS Solution to 14 mission critical sites. He also succesfully managed the deployment of these sites by coordinating with clients and an external vendor.
Tahseen was one of two consultants to perform tuning of IPS leveraging data-driven approach prior to integration with IBM QRadar SIEM. They analyzed Intrusion Prevention System (IPS) logs, identified trends and provided recommendations to reduce false positives (70% of logs) and set preventive measures to block attacks. The Client realized the value of their work and extended their contract.
Tahseen performed Application Security Assessment (DAST) of 35+ Web Applications using AppScan Standard, Burp and manual testing
Tahseen performed Web Appliation Security Assessment DAST of clients Web Applications using IBM AppScan Standard, Burp and Manual Testing.
Tahseen performed Web Appliation Security Assessment DAST of Word Press Applications using WPSan, IBM AppScan Standard, Burp and Manual Testing.
Full Article: https://blog.waterlooedc.ca/cluster-map-waterloo-canada-security
We are excited to be a part of the Vibrant AI community in Toronto. Facilitated a discussion on DeepMinds "Mastering the game of Go without human knowledge", presented by Liam.
Talking about Cybersecurity and AI.
Had a great time networking and getting some solid mentorship.
Talking about Cybersecurity and AI.
We were happy to share our insights on "The Needle in a Haystack problem of Attack Detection in Cybersecurity and how AI can solve it".
It was an honour to share our prospective on AI within Cybersecurity among industry experts
We would like to thank The Uniersity of Waterloo for their support.
We would like to thank EY for having us over for a quick demo. The view is gorgeous!
We would like to thank Velocity for the free office space.
We would like to thank Startup school for the early mentorship.
Goofing around at SFO.