From e94a09f55a41c3e47b3a3a6c69ba622b4f98d900 Mon Sep 17 00:00:00 2001 From: ryan Date: Sun, 27 Jul 2025 11:53:26 -0400 Subject: [PATCH] fix another typo --- _posts/2025-06-07-package-managers.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/_posts/2025-06-07-package-managers.md b/_posts/2025-06-07-package-managers.md index d54f961..8dee6aa 100644 --- a/_posts/2025-06-07-package-managers.md +++ b/_posts/2025-06-07-package-managers.md @@ -36,7 +36,7 @@ not be nearly as common. The industry participants point to each other for examples of how things are meant to be done. The problem is that not all companies have the same risk exposure. For some companies, they may tolerate attacks because they don't have -assets that are as valuable as other's. A great example of this are companies +assets that are as valuable as others. A great example of this are companies handling digital assets. If a tech stack has the ability to move digital assets, or handles otherwise valuable data, different security measures are required. Using SAST and monitoring, and claiming it's a complete security control for