From 2398157b0b0c011bb887bae1fde59c69fb44bcc3 Mon Sep 17 00:00:00 2001 From: Rebecca Dodd <82806852+rebeccadee@users.noreply.github.com> Date: Mon, 25 Sep 2023 22:08:30 +0100 Subject: [PATCH] website/blogs: Swap em dash and hyphen on blog post (#6978) Swap em dash and hyphen Signed-off-by: Rebecca Dodd <82806852+rebeccadee@users.noreply.github.com> --- .../item.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/website/blog/2023-09-14-black-box-security-software-cant-keep-up-with-open-source/item.md b/website/blog/2023-09-14-black-box-security-software-cant-keep-up-with-open-source/item.md index aa62569f2..74cdca36f 100644 --- a/website/blog/2023-09-14-black-box-security-software-cant-keep-up-with-open-source/item.md +++ b/website/blog/2023-09-14-black-box-security-software-cant-keep-up-with-open-source/item.md @@ -25,7 +25,7 @@ image: ./image1.jpg --- -Legacy security vendors that rely on black box development can't keep up with open source. It's an oft—discussed topic-the ability of open source communities to quickly jump in and collectively solve problems and innovate solutions—but it is equally believed that "serious" security software companies have proprietary software. +Legacy security vendors that rely on black box development can't keep up with open source. It's an oft-discussed topic—the ability of open source communities to quickly jump in and collectively solve problems and innovate solutions—but it is equally believed that "serious" security software companies have proprietary software. In this blog, we will take a closer look at the pros and cons of the various source availability types of SSO and other security software.