image of a traffic control center (for a mobility and transportation)image of branding materials (for a graphic design studio)[background image] image of city landscape (for an ar/vr)[interface] graphic design of threat detection module (for an ai cybersecurity company)

Human Centric Security

Welcome!

From pixels to packets, I have transitioned from design to networks and cybersecurity.

Join me exploring how creativity, empathy, and logic can help build safer digital worlds.

Where creativity meets cybersecurity

Here’s where cyber defense techniques and design vision come together. Dive into a showcase of projects that spans from mapping user behavior to threat management—each one a step in my journey from creative insights to safeguarding data.

[background image] image of art supplies on a desk (for a graphic design studio)
Security spotlight

"Honeypot-Pi" project

This project involved setting up a network with a Raspberry Pi as honeypot, to analyze vulnerable systems and lure attackers. The primary goal was to simulate real-world attack behavior in a controlled environment.

[interface] screenshot of core security functionalities (for an ai cybersecurity company)
Design highlight

Android Auto feature design

With little competition in the Android space, Android Auto faces usability and satisfaction issues. The redesign focused on enhancing accessibility and overall user experience, by adding an instant language switch feature to the system.

Empathy Meets Cybersecurity

A designer mindset in cybersecurity teams...

What is human-ce?

...emphasizes the human element. Aims at robust and usable solutions, making compliance easier and reducing human errors.

How does design impact security?

...fosters quick thinking and rapid iterations, which means a creative approach to threats and solutions to ever-evolving attack vectors.

Who benefits from this approach?

...translates complex problems into clear and assertive communication, bridging the gap between tech and non-tech stakeholders.

What  a honeypot proje

...improves pattern recognition and attention to detail, essential for threat detection and incident response.

Why securitstories?

...balances user needs and business goals. A collaborative mindset is highly desired to align stakeholders' expectations.

Why share personal securitstories?

...provides critical insights to user experience, avoiding unnecessary risk exposure due to user friction and system misuse.

Join the journey.
Secure your future.

Ready to discover how we can leverage security without compromising the user experience in your service or product? Let’s connect and grow together.

image of a traffic control center (for a mobility and transportation)