From 70630aab3a8a69cd967a1693ad8eec38ccb56eef Mon Sep 17 00:00:00 2001 From: Tana M Berry Date: Mon, 18 Sep 2023 05:22:53 -0500 Subject: [PATCH] website/blogs: added emm dashes (#6927) added emm dashes Co-authored-by: Tana Berry --- .../item.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/website/blog/2023-09-14-black-box-security-software-cant-keep-up-with-open-source/item.md b/website/blog/2023-09-14-black-box-security-software-cant-keep-up-with-open-source/item.md index 6469f7b60..aa62569f2 100644 --- a/website/blog/2023-09-14-black-box-security-software-cant-keep-up-with-open-source/item.md +++ b/website/blog/2023-09-14-black-box-security-software-cant-keep-up-with-open-source/item.md @@ -25,7 +25,7 @@ image: ./image1.jpg --- -Legacy security vendors that rely on black box development can't keep up with open source. It's an oft-discussed topic-the ability of open source communities to quickly jump in and collectively solve problems and innovate solutions-but it is equally believed that "serious" security software companies have proprietary software. +Legacy security vendors that rely on black box development can't keep up with open source. It's an oft—discussed topic-the ability of open source communities to quickly jump in and collectively solve problems and innovate solutions—but it is equally believed that "serious" security software companies have proprietary software. In this blog, we will take a closer look at the pros and cons of the various source availability types of SSO and other security software.