diff --git a/_posts/2025-06-07-package-managers.md b/_posts/2025-06-07-package-managers.md index d54f961..8dee6aa 100644 --- a/_posts/2025-06-07-package-managers.md +++ b/_posts/2025-06-07-package-managers.md @@ -36,7 +36,7 @@ not be nearly as common. The industry participants point to each other for examples of how things are meant to be done. The problem is that not all companies have the same risk exposure. For some companies, they may tolerate attacks because they don't have -assets that are as valuable as other's. A great example of this are companies +assets that are as valuable as others. A great example of this are companies handling digital assets. If a tech stack has the ability to move digital assets, or handles otherwise valuable data, different security measures are required. Using SAST and monitoring, and claiming it's a complete security control for