Praise
Apata

Exploring how secure systems are built, how data flows, and how architecture shapes everything.

Writing about security, data, and systems

I write about:CybersecurityData EngineeringSoftware ArchitectureSystems Thinking

Featured writing

Ideas & Insights

Data Engineering
Video17 min read

Data Models

A data model is the shape you decide to give your data, and the set of operations that shape makes easy or hard.

Read more
Data Engineering
Video14 min read

Warehouse or Lake? Both?

A warehouse is built for fast analytical queries on structured data. You define schemas, load data into tables, and query with SQL.

Read more
Data Engineering
Video11 min read

Choosing Which Trade-offs You Can Live With

Strong consistency feels safe, but it requires coordination, and coordination costs time.

Read more
Software Architecture
Video12 min read

CAP Theorem

If you've spent any time around distributed systems, you've heard of the CAP theorem, and you've probably heard it explained poorly.

Read more
Cybersecurity
9 min read

Zero Trust Architecture: Never Trust, Always Verify

Why perimeter security is dead and how to build systems where trust is never assumed. It is always earned, always verified, and continuously re-evaluated.

Read more

About this site

Ideas worth sharing.

I think and write about the intersection of cybersecurity, software development and data engineering. I'm interested in how systems can be designed to be secure by default, how data pipelines can be built to be observable and trustworthy, and how architecture decisions compound over time for better or worse.

This site is where I share what I'm learning, what I'm building, and what I find interesting. I write long form technical pieces, record videos walking through real problems or sharing my learning, and share ideas about the craft of building resilient software systems.

Core values

Security-First
Data-Driven
Systems Thinker
Pragmatic
Always Learning
Open Source

Focus areas

What I work on

Security is a property, not a feature.

I approach security as a systems property. I believe it is something that must be designed in, not layered on top. My interests spans zero-trust architecture, threat modeling, identity and access management, and building security programs that scale with the organization. I believe that the best security controls are ones developers barely notice, because they're built into the platform they work on.

Key Skills

  • Zero Trust Architecture
  • Threat Modeling & Risk Assessment
  • Identity & Access Management
  • Penetration Testing
  • Incident Response
  • Security Program Design

Tools & Technologies

HashiCorp Vault

OPA / Rego

Snyk

Wireshark

Burp Suite

Falco