I design secure, resilient, and inclusive digital infrastructure that enhances public service delivery and expands access to opportunities. Drawing on experience in e-governance, fintech, and agricultural digitalization, I integrate cybersecurity, policy insight, and human-centered design because digital transformation succeeds only when people trust it, can use it effectively, and truly benefit from it.
A privacy-focused OSINT and education tool that helps users understand and reduce their digital footprint across online services. Combines OSINT scanning with AI-powered risk explanations and tailored privacy actions to support safer, more informed digital participation.
An AI-enabled platform designed to increase visibility and economic opportunity for Africa’s informal workers. Supports digital identity creation, skills signalling, and responsible matchmaking between artisans, service providers, and brands in a way that centers trust and inclusion.
SOC-style investigations, phishing response playbooks, and post-incident reporting, using MITRE ATT&CK and NIST to structure detection logic, evidence collection, and lessons learned for security operations.
A vulnerability management workflow using Nessus to scan, prioritize, and track remediation, illustrating how risk-based security can support governance and operational decision-making in enterprise environments.
A security audit case study applying NIST CSF, PCI DSS, and GDPR principles to assess controls, identify gaps, and propose improvements—demonstrating alignment between technical security measures and regulatory/compliance expectations.
A hands-on digital forensics lab for analyzing malicious PDF documents, combining static and dynamic techniques to understand payload behavior and improve threat detection practices.
A hardened Node.js server demonstrating secure-by-design principles: validated inputs, HTTPS configuration, and safer file handling to reduce common web application risks.
A secure authentication module using JSON Web Tokens, with attention to session handling, access control, and common implementation pitfalls—illustrating foundational identity and access management concepts.
Erasmus Mundus Joint Master's Degree (EMJMD) programme in Applied Cybersecurity offered by a consortium of three highly ranked universities in Turkey, Germany, and North Macedonia.
Summer school on open-source resilient hardware and software for IoT, covering secure lifecycle management, hardware security, and privacy-preserving cryptographic protocols.
Intensive program focusing on advanced digital security and privacy technologies.
Foundation in software development, operating systems, and cryptography. Strong technical background in computer science fundamentals.
Awarded for academic excellence and dedication to advancing cybersecurity knowledge. Prestigious EU scholarship for outstanding international students.
Making cybersecurity accessible • Privacy research • Threat awareness
We've all heard the same privacy advice over and over again. But how much of it is still relevant in 2024? This article re-evaluates common privacy tips and offers updated, practical advice.
Large Language Models (LLMs) are everywhere, and they're reshaping our digital lives. Discover the hidden risks of using AI and learn how to protect your digital footprint when interacting with these powerful tools.
Digital privacy is often seen as a minor inconvenience, but the long-term consequences of its erosion can be profound. This article explores the societal and personal impacts of a world with less privacy.
Deep-dive articles • Quick cybersecurity insights • Privacy research
I’m open to collaborations and conversations at the intersection of digital development, cybersecurity, and privacy. Whether you’re exploring secure digital public services, responsible use of AI, or simply want to exchange ideas, I’d be happy to connect.
Skopje, North Macedonia
Open to relocation