Skip to content

Commit e14510d

Browse files
fix menu
1 parent b74e2f0 commit e14510d

File tree

14 files changed

+16
-14
lines changed

14 files changed

+16
-14
lines changed
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.

docs/learn/security/overview.md renamed to docs/innovation-design/security/overview.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,6 @@
1-
At Polygon Labs, ensuring the security of our information systems, and safeguarding sensitive data is of paramount importance. We prioritize security throughout every facet of our operations, from implementing robust security policies and guidelines to adopting industry best practices, such as ISO 27001 as a baseline for our security program and adhering to the OWASP recommendations for secure software development. We invest heavily in continuous security training for our employees, keeping them informed of emerging threats and equipping them with the necessary skills to protect our assets. In addition, we embrace a proactive approach by incorporating security-by-design principles and using state-of-the-art security tools to detect and mitigate vulnerabilities at every stage of the development lifecycle.
1+
At Polygon Labs, ensuring the security of our information systems, and safeguarding sensitive data is of paramount importance. We prioritize security throughout every facet of our operations, from implementing robust security policies and guidelines to adopting industry best practices, such as ISO 27001 as a baseline for our security program and adhering to the OWASP recommendations for secure software development.
2+
3+
We invest heavily in continuous security training for our employees, keeping them informed of emerging threats and equipping them with the necessary skills to protect our assets. In addition, we embrace a proactive approach by incorporating security-by-design principles and using state-of-the-art security tools to detect and mitigate vulnerabilities at every stage of the development lifecycle.
24

35
## Commitment to security
46

File renamed without changes.
File renamed without changes.

0 commit comments

Comments
 (0)