integrate feedback

This commit is contained in:
Anton Livaja 2023-11-10 17:52:15 -05:00
parent 6644765283
commit 047a23750b
Signed by: anton
GPG Key ID: 44A86CFF1FDF0E85
2 changed files with 2 additions and 2 deletions

View File

@ -156,7 +156,7 @@
<div class="text-well"> <div class="text-well">
<h3>Security Engineering</h3> <h3>Security Engineering</h3>
<p>Our team is comprised of security engineers with past lives as full time system administrators, and software engineers. We have extensive first hand experience in actually implementing custom security defenses for high risk organizations. We are happy to get as deep into the weeds planning new defense strategies as you like, from Linux kernel hardening, to supply chain signing, to code quality, library choices, and beyond.</p> <p>Our team is comprised of security engineers with past lives as full time system administrators and software engineers. We have extensive first hand experience in implementing custom security defenses for high risk organizations. We are happy to get as deep into the weeds planning new defense strategies as you like, from Linux kernel hardening, to supply chain signing, to code quality, library choices, and beyond.</p>
</div> </div>
<br /> <br />

View File

@ -49,7 +49,7 @@
<div class="flex-container-inner"> <div class="flex-container-inner">
<div class="text-well"> <div class="text-well">
<h3>Security Engineering</h3> <h3>Security Engineering</h3>
<p>Our team is comprised of security engineers with past lives as full time system administrators, and software engineers. We have extensive first hand experience in actually implementing custom security defenses for high risk organizations. We are happy to get as deep into the weeds planning new defense strategies as you like, from Linux kernel hardening, to supply chain signing, to code quality, library choices, and beyond.</p> <p>Our team is comprised of security engineers with past lives as full time system administrators and software engineers. We have extensive first hand experience in implementing custom security defenses for high risk organizations. We are happy to get as deep into the weeds planning new defense strategies as you like, from Linux kernel hardening, to supply chain signing, to code quality, library choices, and beyond.</p>
</div> </div>
</div> </div>
<div class="flex-container-inner"> <div class="flex-container-inner">