Praise
Apata
Exploring how secure systems are built, how data flows, and how architecture shapes everything.
Writing about security, data, and systems
Featured writing
Ideas & Insights
Data Models
A data model is the shape you decide to give your data, and the set of operations that shape makes easy or hard.
Warehouse or Lake? Both?
A warehouse is built for fast analytical queries on structured data. You define schemas, load data into tables, and query with SQL.
Choosing Which Trade-offs You Can Live With
Strong consistency feels safe, but it requires coordination, and coordination costs time.
CAP Theorem
If you've spent any time around distributed systems, you've heard of the CAP theorem, and you've probably heard it explained poorly.
Zero Trust Architecture: Never Trust, Always Verify
Why perimeter security is dead and how to build systems where trust is never assumed. It is always earned, always verified, and continuously re-evaluated.
About this site
Ideas worth sharing.
I think and write about the intersection of cybersecurity, software development and data engineering. I'm interested in how systems can be designed to be secure by default, how data pipelines can be built to be observable and trustworthy, and how architecture decisions compound over time for better or worse.
This site is where I share what I'm learning, what I'm building, and what I find interesting. I write long form technical pieces, record videos walking through real problems or sharing my learning, and share ideas about the craft of building resilient software systems.
Core values
Focus areas
What I work on
Security is a property, not a feature.
I approach security as a systems property. I believe it is something that must be designed in, not layered on top. My interests spans zero-trust architecture, threat modeling, identity and access management, and building security programs that scale with the organization. I believe that the best security controls are ones developers barely notice, because they're built into the platform they work on.
Key Skills
- Zero Trust Architecture
- Threat Modeling & Risk Assessment
- Identity & Access Management
- Penetration Testing
- Incident Response
- Security Program Design
Tools & Technologies
HashiCorp Vault
OPA / Rego
Snyk
Wireshark
Burp Suite
Falco