Cyber Labs
Blog and Portfolio

Showcasing my skills and knowledge in modern cyber security practices and digital solutions.

A laptop displays a web page with a bold header text reading 'Blog' against a colorful abstract background. Several thumbnail images are displayed below the header, featuring various content such as graphics and text. The screen is illuminated, creating a contrast against the dark keyboard and surrounding environment.
A laptop displays a web page with a bold header text reading 'Blog' against a colorful abstract background. Several thumbnail images are displayed below the header, featuring various content such as graphics and text. The screen is illuminated, creating a contrast against the dark keyboard and surrounding environment.
A padlock sits on a laptop keyboard with glowing red, green, and blue light trails swirling around, creating a sense of security and cyber awareness.
A padlock sits on a laptop keyboard with glowing red, green, and blue light trails swirling around, creating a sense of security and cyber awareness.
A dimly lit desk setup featuring a computer monitor displaying a document titled 'General Hardening Guideline'. The desk has a mechanical keyboard with blue and red keys, a lamp providing light on the right side, and various small items including notes pinned to the wall, a notebook, and a cup. There is a mesh office chair in front of the desk.
A dimly lit desk setup featuring a computer monitor displaying a document titled 'General Hardening Guideline'. The desk has a mechanical keyboard with blue and red keys, a lamp providing light on the right side, and various small items including notes pinned to the wall, a notebook, and a cup. There is a mesh office chair in front of the desk.

About Cyber Labs Blog

Welcome to Cyber Labs Blog, a portfolio dedicated to showcasing my skills and knowledge in the dynamic field of cybersecurity.

A computer screen displays a portion of source code written in a programming language. The code includes comments and conditional statements, with particular emphasis on credential management.
A computer screen displays a portion of source code written in a programming language. The code includes comments and conditional statements, with particular emphasis on credential management.
Signage on a wall reads 'Cybercrime Analysis & Research Alliance @ NTU (CARA)' in bold, white letters against a dark, textured surface. A corridor with partial ceiling panels is visible, and there's some greenery in the background.
Signage on a wall reads 'Cybercrime Analysis & Research Alliance @ NTU (CARA)' in bold, white letters against a dark, textured surface. A corridor with partial ceiling panels is visible, and there's some greenery in the background.
A modern desk setup featuring a camera lens, a tablet displaying an interface with app icons, a pair of earbuds in an open charging case, and a book titled 'Wireless and Mobile Device Security' on a shelf below.
A modern desk setup featuring a camera lens, a tablet displaying an interface with app icons, a pair of earbuds in an open charging case, and a book titled 'Wireless and Mobile Device Security' on a shelf below.

My Vision

I am aiming to show an insight into my own stabilizes within the cyber security space as well as within IT and other branches of the digitial world. I am also hoping to provide a space to learn and communicate with others on a topic we all love!