integrate feedback
This commit is contained in:
parent
6644765283
commit
047a23750b
|
@ -156,7 +156,7 @@
|
||||||
|
|
||||||
<div class="text-well">
|
<div class="text-well">
|
||||||
<h3>Security Engineering</h3>
|
<h3>Security Engineering</h3>
|
||||||
<p>Our team is comprised of security engineers with past lives as full time system administrators, and software engineers. We have extensive first hand experience in actually implementing custom security defenses for high risk organizations. We are happy to get as deep into the weeds planning new defense strategies as you like, from Linux kernel hardening, to supply chain signing, to code quality, library choices, and beyond.</p>
|
<p>Our team is comprised of security engineers with past lives as full time system administrators and software engineers. We have extensive first hand experience in implementing custom security defenses for high risk organizations. We are happy to get as deep into the weeds planning new defense strategies as you like, from Linux kernel hardening, to supply chain signing, to code quality, library choices, and beyond.</p>
|
||||||
</div>
|
</div>
|
||||||
|
|
||||||
<br />
|
<br />
|
||||||
|
|
|
@ -49,7 +49,7 @@
|
||||||
<div class="flex-container-inner">
|
<div class="flex-container-inner">
|
||||||
<div class="text-well">
|
<div class="text-well">
|
||||||
<h3>Security Engineering</h3>
|
<h3>Security Engineering</h3>
|
||||||
<p>Our team is comprised of security engineers with past lives as full time system administrators, and software engineers. We have extensive first hand experience in actually implementing custom security defenses for high risk organizations. We are happy to get as deep into the weeds planning new defense strategies as you like, from Linux kernel hardening, to supply chain signing, to code quality, library choices, and beyond.</p>
|
<p>Our team is comprised of security engineers with past lives as full time system administrators and software engineers. We have extensive first hand experience in implementing custom security defenses for high risk organizations. We are happy to get as deep into the weeds planning new defense strategies as you like, from Linux kernel hardening, to supply chain signing, to code quality, library choices, and beyond.</p>
|
||||||
</div>
|
</div>
|
||||||
</div>
|
</div>
|
||||||
<div class="flex-container-inner">
|
<div class="flex-container-inner">
|
||||||
|
|
Loading…
Reference in New Issue