Applied Cyber Security Research & Practical Tool Development

Cyber Data Labs is an independent company focused on advancing practical application of cyber security methodologies through empirical investigation and open-source tool development. Our work bridges the gap between academic research and practitioner needs, developing evidence-based solutions for real-world security challenges.


Founded on principles of methodological rigor and practical utility, we conduct exploratory research in threat intelligence, security data analysis, and defensive automation. Our research outputs include peer-reviewed publications, open-source analytical tools, and comprehensive datasets that contribute to the broader cybersecurity research community.

Research Areas

Threat Intelligence Methodologies

Our research investigates systematic approaches to threat intelligence collection, analysis, and dissemination. We examine the effectiveness of various data sources, analytical frameworks, and reporting mechanisms in supporting organizational decision-making processes. Current projects include developing metrics for intelligence quality assessment and evaluating the predictive value of different threat indicators.

This work contributes to establishing evidence-based standards for threat intelligence operations, moving toward methodologically sound approaches that can be empirically validated.

Security Data Analytics & Visualization

We explore computational methods for processing and analyzing large-scale security datasets, with particular focus on developing interpretable analytical models that support human decision-making. We aim to test application of statistical methods, machine learning models, and data visualization techniques to cybersecurity problems.

Current investigations include studying the effectiveness of different visualization approaches for security data and creating tools that enable practitioners to conduct their own exploratory data analysis without requiring extensive technical expertise.

Defensive Automation & Tool Development

Our tool development efforts focus on creating practical software solutions that address documented gaps in current security practice. We develop open-source tools that automate routine security tasks, enhance analyst productivity, and improve the consistency of security operations across different organizational contexts.

Each tool is developed through iterative design processes that incorporate feedback from practicing security professionals. We emphasize creating solutions that integrate seamlessly with existing workflows while providing clear documentation and extensible architectures that support customization for specific organizational needs.

Financial Risk Quantification in Cybersecurity

We investigate methods for quantifying cybersecurity risks in financial terms, enabling organizations to make more informed resource allocation decisions. Our research examines the relationship between security investments and risk reduction outcomes, developing frameworks that support evidence-based security budget planning.

This work includes developing models that incorporate uncertainty quantification, studying the effectiveness of different risk assessment methodologies, and creating tools that enable organizations to track the financial impact of their security programs over time through systematic measurement and analysis.

Research Methodology & Technical Approach

Empirical Research Design

Our research methodology emphasizes rigorous empirical investigation combined with practical validation. We employ mixed-methods approaches that incorporate quantitative analysis of security data with qualitative insights from practitioner interviews and case studies. Each research project follows established protocols for data collection, analysis, and validation to ensure reproducible results.

We maintain documentation of our research processes, including detailed descriptions of data sources, analytical methods, and validation procedures. This approach enables other researchers to replicate our work and build upon our findings, contributing to the cumulative advancement of cybersecurity knowledge.

Tool Development Philosophy

Our tool development process begins with identification of practitioner needs through surveys, interviews, and/or analysis of existing workflows. We prioritize creating solutions that address documented problems rather than implementing technology for its own sake. Each tool undergoes iterative testing with target users to ensure usability and effectiveness.

We emphasize creating modular, extensible architectures that can be adapted to different organizational contexts. Our tools are designed with clear APIs and comprehensive documentation to support customization and integration with existing systems.

Most of the software is released under open-source licenses to encourage community contribution and ensure long-term sustainability.

Technical Stack & Frameworks

Threat-Informed Defense
Threat Intelligence
Cybercrime Intelligence
MITRE ATT&CK
NIST CSF
Cyber Risk Institute
ISO 27001/2
AI / MITRE ATLAS
OSINT
STIX/TAXII Standards
Python / R
JavaScript / TypeScript
PHP / Rust / Go / Java
SQL / NoSQL Databases
Docker / Kubernetes
Apache Spark / Pandas
D3.js / Observable
OpenAPI Specifications
Git / Continuous Integration
Jupyter / R Markdown
Elasticsearch
Cloud Platforms (AWS/Azure/GCP)

Academic Collaboration & Professional Development

We actively seek collaboration opportunities with academic institutions, research organizations, and industry partners who share our commitment to advancing cybersecurity knowledge through rigorous research and practical application. Our collaborative approach emphasizes mutual benefit, with projects designed to contribute to both academic understanding and practical implementation.


We offer several collaboration models including joint research projects, tool development partnerships, and consulting arrangements for organizations seeking to implement evidence-based security practices. Our expertise in full-stack development, financial modeling, and data analysis enables us to contribute effectively to interdisciplinary research teams while maintaining focus on practical outcomes.


For academic institutions, we could provide guest lectures, workshop facilitation, and collaborative research opportunities that bring real-world perspective to cybersecurity education. We also support student research by providing access to our research datasets and analytical tools for academic projects.

Research Inquiries

Email: research@cylabs.dev

Response: ~ 1 week

Focus: Collaborative projects, publication opportunities

Consulting Services

Email: strategy@cylabs.dev

Rate: £120-200/hour

Specialties: Strategic Advisory, Risk Assessment, Data Analysis

Full Stack Development

Email: build@cylabs.dev

Services: Web App, API Services, Mobile Apps, Cloud Pipelines

Areas: Tool development, optimisations, cost savings

Educational Partnerships

Email: edu@cylabs.dev

Services: Guest lectures, curriculum development

Areas: Applied cybersecurity, research methods