May 13, 2024, 11:58 p.m. | /u/Admirable_Idea9183

cybersecurity www.reddit.com

I'm going thorugh CSA CCZT course and a question came to mind. Since ZTA trusts nothing and verifies everything, this means every initial request to a resource is verified, authorized, authenticated and timed. Has anyone implemented some form of ZTA and noticed a change in network performance because every request now has to be authenticated?

change course csa cybersecurity everything network nothing performance question request resource verified zta

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Corporate Intern - Information Security (Year Round)

@ Associated Bank | US WI Remote

Senior Offensive Security Engineer

@ CoStar Group | US-DC Washington, DC