diff --git a/website/src/pages/use-cases/incident-response.tsx b/website/src/pages/use-cases/incident-response.tsx index 586de026392..bf500e11ea3 100644 --- a/website/src/pages/use-cases/incident-response.tsx +++ b/website/src/pages/use-cases/incident-response.tsx @@ -1,5 +1,5 @@ import { Link, PageProps } from 'gatsby' -import CrosshairsGpsIcon from 'mdi-react/CrosshairsGpsIcon' +import MagnifyIcon from 'mdi-react/MagnifyIcon' import ClockTimeThreeOutlineIcon from 'mdi-react/ClockTimeThreeOutlineIcon' import WebIcon from 'mdi-react/WebIcon' import React, { FunctionComponent, ReactNode } from 'react' @@ -69,7 +69,7 @@ const items = [

Visualize fixes in progress and track their deployment. With{' '} Code Insights, get visibility into remediation efforts and - share progress with team leaders and customers. + share progress with team leaders and all of your customers.

} /> @@ -77,10 +77,10 @@ const items = [ itemClass: 'd-none', }, { - buttonLabel: 'Monitor for the introduction of unsafe code', + buttonLabel: 'Monitor for unsafe code', text: ( Close the loop on your incident response efforts. After finding the root cause, use{' '} @@ -119,7 +119,7 @@ const resourceItems = [ { title: 'Log4j Log4Shell 0-day: find, fix, and track affected code', description: - 'In the biggest security vulnerability incident since Heartbleed, Sourcegraph co-founder and CEO Quinn Slack shared how you can find affected code, automate fixes, and track progress.', + 'In the biggest security vulnerability incident since Heartbleed, Sourcegraph co-founder and CEO Quinn Slack shares how you can find affected code, automate fixes, and track progress.', type: 'Blog post', img: { src: 'https://sourcegraphstatic.com/blog/log4j/log4j-blog-thumbnail.png', @@ -130,7 +130,7 @@ const resourceItems = [ { title: "The real weakest link in software supply chain security (it's not open source)", description: - 'Using open source code can jump-start development but it can also expose you to security vulnerabilities. In this post, learn how to design an effective vulnerability management process that can make dependencies visible and mitigation less time-consuming.', + 'Using open source code can jumpstart development, but it can also expose you to security vulnerabilities. In this post, learn how to design an effective vulnerability management process that can make dependencies visible and mitigation less time-consuming.', type: 'Blog post', img: { src: 'https://storage.googleapis.com/sourcegraph-assets/blog/third-party-open-source-vulnerabilities.png', @@ -141,7 +141,7 @@ const resourceItems = [ { title: 'How to remove secrets from your codebase', description: - 'Back in early 2021, Sourcegraph stored infrastructure and service passwords in private repositories. Security engineer André Eleuterio moved every secret to a secure vault and used code search to ensure the move was successful and complete.', + 'In early 2021, Sourcegraph stored infrastructure and service passwords in private repositories. Learn how Sourcegraph Security Engineer André Eleuterio moved every secret to a secure vault and used Code Search to ensure the move was successful and complete.', type: 'Blog post', img: { src: 'https://sourcegraphstatic.com/blog/securing-sourcegraph-eliminating-secrets.png', @@ -153,7 +153,7 @@ const resourceItems = [ const threeUpTextItems = [ { - icon: , + icon: , subtitle:

Assess incidents quickly

, description: "Pinpoint the code responsible for the incident and find the root cause in your codebase. Understand the code's functionality to verify the issue.", @@ -278,7 +278,7 @@ const UseCasePage: FunctionComponent = props => ( > Read the Cloudflare case study - +