Jan. 19, 2024, 11:09 a.m. | /u/PhilipLGriffiths88

cybersecurity www.reddit.com

Technical blog on our open source project about why Golang as a language is amazing for building zero trust networking solutions [https://blog.openziti.io/go-is-amazing-for-zero-trust](https://blog.openziti.io/go-is-amazing-for-zero-trust).

I like the following quotes on security outcomes if you can embed zero trust networking directly into your applications:

* *Only identities authorized to host a service are allowed to do so. Contrast that to the IP-based underlay. With IP-based servers, any process can be a listening server. This allows for attacks like DNS poisoning. With a zero …

applications attacks can cybersecurity dns dns poisoning host identities listening networking outcomes overlay poisoning process quotes security server servers service trust zero trust zero trust networking

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

Information Security Specialist, Sr. (Container Hardening)

@ Rackner | San Antonio, TX

Principal Security Researcher (Advanced Threat Prevention)

@ Palo Alto Networks | Santa Clara, CA, United States

EWT Infosec | IAM Technical Security Consultant - Manager

@ KPMG India | Bengaluru, Karnataka, India

Security Engineering Operations Manager

@ Gusto | San Francisco, CA; Denver, CO; Remote

Network Threat Detection Engineer

@ Meta | Denver, CO | Reston, VA | Menlo Park, CA | Washington, DC