website/blogs: Swap em dash and hyphen on blog post (#6978)

Swap em dash and hyphen

Signed-off-by: Rebecca Dodd <82806852+rebeccadee@users.noreply.github.com>
This commit is contained in:
Rebecca Dodd 2023-09-25 22:08:30 +01:00 committed by GitHub
parent ce1a071d16
commit 2398157b0b
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23

View file

@ -25,7 +25,7 @@ image: ./image1.jpg
---
Legacy security vendors that rely on black box development can't keep up with open source. It's an oft—discussed topic-the ability of open source communities to quickly jump in and collectively solve problems and innovate solutions—but it is equally believed that "serious" security software companies have proprietary software.
Legacy security vendors that rely on black box development can't keep up with open source. It's an oft-discussed topic—the ability of open source communities to quickly jump in and collectively solve problems and innovate solutions—but it is equally believed that "serious" security software companies have proprietary software.
In this blog, we will take a closer look at the pros and cons of the various source availability types of SSO and other security software.