minor copy cleanup
This commit is contained in:
parent
ad3dc87277
commit
31c79c8a18
|
@ -75,14 +75,14 @@
|
|||
<p>
|
||||
Why choose Distrust? Because security shouldn't be based on blind trust, it should be based on <b>dis</b>trust, and verifiability. Most organizations treat cybersecurity like people once treated hygiene—poorly.
|
||||
</p>
|
||||
<p>At Distrust, we've identified fundamental methods to eliminate risks at their source. Similarly to how handwashing revolutionized public health by preventing unseen threats like bacteria, our first-principles security methodology brings new levels of security to our clients by eliminating single points of failure, and providing verifiable, resilient protection for your critical systems.
|
||||
<p>At Distrust, we've identified fundamental methods to eliminate risks at their source. Similarly to how handwashing revolutionized public health by preventing unseen threats like bacteria, our first-principles security methodology brings new levels of security to our clients by eliminating single points of failure, and providing verifiable, resilient protection for critical systems.
|
||||
</p>
|
||||
<ul class="narrow-list">
|
||||
<li><b>First-principles security</b>
|
||||
<p>Comprehensive, strategic risk based on eliminating root causes.</p>
|
||||
<p>Attack surface area reduction through eliminating root causes.</p>
|
||||
</li>
|
||||
<li><b>Proven methodology</b>
|
||||
<p>Security approaches tested in high-stakes, mission-critical environments.</p>
|
||||
<p>Methodology tested in high-stakes, mission-critical environments.</p>
|
||||
</li>
|
||||
<li><b>Seamless collaboration</b>
|
||||
<p>Clear, actionable engagement steps—start immediately.</p>
|
||||
|
|
Loading…
Reference in New Issue