{"id":9,"date":"2026-01-19T04:01:01","date_gmt":"2026-01-19T04:01:01","guid":{"rendered":"https:\/\/hu-the-geek-consulting-3103f3.ingress-alpha.ewp.live\/?page_id=7"},"modified":"2026-01-19T04:01:01","modified_gmt":"2026-01-19T04:01:01","slug":"home","status":"publish","type":"page","link":"https:\/\/huthegeek.com\/cybersecurity\/","title":{"rendered":"Hu The Geek"},"content":{"rendered":"\n<div class=\"wp-block-cover alignfull has-custom-content-position is-position-top-center wp-elements-4a59bf69a3a03c5a687f5f8a9df229f0\" style=\"font-size:clamp(18.959px, 1.185rem + ((1vw - 3.2px) * 1.082), 30px);\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-accent-4-background-color has-background-dim-100 has-background-dim\"><\/span><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<h1 class=\"wp-block-heading has-text-align-center has-base-color has-text-color has-background has-link-color has-large-font-size wp-elements-2111cdf101d0c6e53113a76527595249\" style=\"background-color:#121212\">Engineering Memory-Safety. Eliminating Enterprise Risk.<\/h1>\n\n\n\n<p class=\"has-medium-font-size\">High-concurrency systems built in <strong><mark style=\"background-color:rgba(0, 0, 0, 0);color:#00d4ff\" class=\"has-inline-color\">Go<\/mark><\/strong> and <strong><mark style=\"background-color:rgba(0, 0, 0, 0);color:#00d4ff\" class=\"has-inline-color\">Rust<\/mark><\/strong> designed to harden your infrastructure. I bridge the gap between high-performance software engineering and strategic risk mitigation to protect your bottom line.<\/p>\n\n\n\n<div class=\"wp-block-columns alignfull is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-top is-layout-flow wp-block-column-is-layout-flow\">\n<h4 class=\"wp-block-heading\">System Integrity<\/h4>\n\n\n\n<p class=\"has-medium-font-size\">Leveraging a decade of networking experience to build resilient, distributed backends<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h4 class=\"wp-block-heading\">Memory Safety<\/h4>\n\n\n\n<p class=\"has-medium-font-size\">Specializing in migrating legacy C\/C++ systems to Go\/Rust to eliminate safety vulnerabilities.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h4 class=\"wp-block-heading\">Risk Management<\/h4>\n\n\n\n<p class=\"has-medium-font-size\">Bridging technical architecture with enterprise liability and insurance standards.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><\/div>\n<\/div>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-9","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/huthegeek.com\/cybersecurity\/wp-json\/wp\/v2\/pages\/9","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/huthegeek.com\/cybersecurity\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/huthegeek.com\/cybersecurity\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/huthegeek.com\/cybersecurity\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/huthegeek.com\/cybersecurity\/wp-json\/wp\/v2\/comments?post=9"}],"version-history":[{"count":1,"href":"https:\/\/huthegeek.com\/cybersecurity\/wp-json\/wp\/v2\/pages\/9\/revisions"}],"predecessor-version":[{"id":29,"href":"https:\/\/huthegeek.com\/cybersecurity\/wp-json\/wp\/v2\/pages\/9\/revisions\/29"}],"wp:attachment":[{"href":"https:\/\/huthegeek.com\/cybersecurity\/wp-json\/wp\/v2\/media?parent=9"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}