.EngineerEnterprise_engineer-enterprise-section___5Tsj{width:100%;padding:40px 0 40px 80px;display:flex;flex-direction:column;align-items:center;justify-content:center}@media(max-width:1380px){.EngineerEnterprise_engineer-enterprise-section___5Tsj{padding:40px 0 40px 40px}}.EngineerEnterprise_engineer-enterprise-section___5Tsj h2{font-weight:600;font-style:SemiBold;font-size:40px;line-height:55px;letter-spacing:0;text-align:center;text-transform:capitalize;color:#fcf9f8;width:75%}.EngineerEnterprise_engineer-enterprise-section___5Tsj h2 span{display:inline;color:#fcf9f8}.EngineerEnterprise_engineer-enterprise-section___5Tsj p{font-weight:400;font-style:Regular;font-size:18px;line-height:32px;letter-spacing:0;text-align:center;text-transform:capitalize;color:#b6b6b6;width:60%;margin-top:20px}.EngineerEnterprise_engineer-enterprise-section___5Tsj h6{font-weight:600;font-style:SemiBold;font-size:20px;line-height:100%;letter-spacing:0;color:#fcfcfc;margin-top:40px}.EngineerEnterprise_engineer-enterprise-section___5Tsj .EngineerEnterprise_all-images-cards__WmbUX{width:100%;margin-top:40px;display:flex;gap:12px;height:516px;align-items:stretch}.EngineerEnterprise_engineer-enterprise-section___5Tsj .EngineerEnterprise_image-card__9Oybc{position:relative;flex:1 1;overflow:hidden;min-width:208px;transition:flex .45s ease,transform .45s ease,box-shadow .45s ease;box-shadow:0 12px 30px #00000059}.EngineerEnterprise_engineer-enterprise-section___5Tsj .EngineerEnterprise_image-card__9Oybc:after{content:"";position:absolute;inset:0;opacity:.6;transition:opacity .3s ease;z-index:1}.EngineerEnterprise_engineer-enterprise-section___5Tsj .EngineerEnterprise_card-image__yt1qb{object-fit:cover;transition:transform .6s ease}.EngineerEnterprise_engineer-enterprise-section___5Tsj .EngineerEnterprise_card-overlay___UZjo{position:absolute;inset:0;z-index:2;display:flex;flex-direction:column;text-align:left;justify-content:flex-end;padding:22px;color:#fefefe;opacity:0;transform:translateY(12px);transition:opacity .3s ease,transform .3s ease}.EngineerEnterprise_engineer-enterprise-section___5Tsj .EngineerEnterprise_card-overlay___UZjo h3{margin:0 0 10px;font-weight:700;font-style:Bold;font-size:30px;line-height:42px;letter-spacing:0;color:#fcf9f8;text-transform:none;text-align:left}.EngineerEnterprise_engineer-enterprise-section___5Tsj .EngineerEnterprise_card-overlay___UZjo p{margin:0;width:auto;text-transform:none;color:#b6b6b6;font-weight:400;font-style:Regular;font-size:20px;line-height:32px;letter-spacing:0;text-align:left}.EngineerEnterprise_engineer-enterprise-section___5Tsj .EngineerEnterprise_card-vertical-title__fKfVw{position:absolute;z-index:2;left:50%;bottom:20px;transform:translateX(-50%) rotate(180deg);writing-mode:vertical-rl;display:flex;align-items:flex-end;justify-content:center;font-weight:500;font-size:28px;line-height:45px;color:#fcf9f8;opacity:1;transition:opacity .25s ease;pointer-events:none;padding:0 8px}.EngineerEnterprise_engineer-enterprise-section___5Tsj .EngineerEnterprise_active__0i0L_{flex:3 1;border-radius:40px}.EngineerEnterprise_engineer-enterprise-section___5Tsj .EngineerEnterprise_image-card__9Oybc.EngineerEnterprise_active__0i0L_:after{opacity:.95}.EngineerEnterprise_engineer-enterprise-section___5Tsj .EngineerEnterprise_image-card__9Oybc.EngineerEnterprise_active__0i0L_ .EngineerEnterprise_card-overlay___UZjo{opacity:1;transform:translateY(0)}.EngineerEnterprise_engineer-enterprise-section___5Tsj .EngineerEnterprise_image-card__9Oybc.EngineerEnterprise_active__0i0L_ .EngineerEnterprise_card-vertical-title__fKfVw{opacity:0}.EngineerEnterprise_engineer-enterprise-section___5Tsj .EngineerEnterprise_image-card__9Oybc:hover .EngineerEnterprise_card-image__yt1qb{transform:scale(1.05)}.EngineerEnterprise_engineer-enterprise-section___5Tsj .EngineerEnterprise_all-images-cards__WmbUX:hover .EngineerEnterprise_image-card__9Oybc{flex:1 1;transform:none}.EngineerEnterprise_engineer-enterprise-section___5Tsj .EngineerEnterprise_all-images-cards__WmbUX:hover .EngineerEnterprise_image-card__9Oybc:after{opacity:.6}.EngineerEnterprise_engineer-enterprise-section___5Tsj .EngineerEnterprise_all-images-cards__WmbUX:hover .EngineerEnterprise_image-card__9Oybc .EngineerEnterprise_card-overlay___UZjo{opacity:0;transform:translateY(12px)}.EngineerEnterprise_engineer-enterprise-section___5Tsj .EngineerEnterprise_all-images-cards__WmbUX:hover .EngineerEnterprise_image-card__9Oybc .EngineerEnterprise_card-vertical-title__fKfVw{opacity:1}.EngineerEnterprise_engineer-enterprise-section___5Tsj .EngineerEnterprise_all-images-cards__WmbUX:hover .EngineerEnterprise_image-card__9Oybc:hover{flex:3 1;transform:translateY(-6px);border-radius:40px}.EngineerEnterprise_engineer-enterprise-section___5Tsj .EngineerEnterprise_all-images-cards__WmbUX:hover .EngineerEnterprise_image-card__9Oybc:hover:after{opacity:.95}.EngineerEnterprise_engineer-enterprise-section___5Tsj .EngineerEnterprise_all-images-cards__WmbUX:hover .EngineerEnterprise_image-card__9Oybc:hover .EngineerEnterprise_card-overlay___UZjo{opacity:1;transform:translateY(0)}.EngineerEnterprise_engineer-enterprise-section___5Tsj .EngineerEnterprise_all-images-cards__WmbUX:hover .EngineerEnterprise_image-card__9Oybc:hover .EngineerEnterprise_card-vertical-title__fKfVw{opacity:0}@media(max-width:1280px){.EngineerEnterprise_engineer-enterprise-section___5Tsj h2{font-size:38px;line-height:55px;width:100%;padding-right:40px}.EngineerEnterprise_engineer-enterprise-section___5Tsj h6{font-size:18px}}@media(max-width:1180px){.EngineerEnterprise_engineer-enterprise-section___5Tsj{padding:40px 0 40px 20px}.EngineerEnterprise_engineer-enterprise-section___5Tsj h2{font-size:36px;padding-right:20px}.EngineerEnterprise_engineer-enterprise-section___5Tsj .EngineerEnterprise_all-images-cards__WmbUX{overflow-x:auto;overflow-y:hidden;display:flex;gap:8px;padding-right:20px;scroll-snap-type:x mandatory;-webkit-overflow-scrolling:touch;scrollbar-width:none}.EngineerEnterprise_engineer-enterprise-section___5Tsj .EngineerEnterprise_all-images-cards__WmbUX::-webkit-scrollbar{display:none}.EngineerEnterprise_engineer-enterprise-section___5Tsj .EngineerEnterprise_image-card__9Oybc{flex:0 0 22%;min-width:22%;height:100%;border-radius:10px;scroll-snap-align:start;transform:none}.EngineerEnterprise_engineer-enterprise-section___5Tsj .EngineerEnterprise_image-card__9Oybc.EngineerEnterprise_active__0i0L_{flex:0 0 60%;min-width:60%;transform:translateY(-6px);border-radius:10px}.EngineerEnterprise_engineer-enterprise-section___5Tsj .EngineerEnterprise_card-overlay___UZjo{opacity:0;transform:translateY(12px);padding:12px}.EngineerEnterprise_engineer-enterprise-section___5Tsj .EngineerEnterprise_card-vertical-title__fKfVw{opacity:1;bottom:10px}.EngineerEnterprise_engineer-enterprise-section___5Tsj .EngineerEnterprise_image-card__9Oybc.EngineerEnterprise_active__0i0L_:after{opacity:.95}.EngineerEnterprise_engineer-enterprise-section___5Tsj .EngineerEnterprise_image-card__9Oybc.EngineerEnterprise_active__0i0L_ .EngineerEnterprise_card-overlay___UZjo{opacity:1;transform:translateY(0)}.EngineerEnterprise_engineer-enterprise-section___5Tsj .EngineerEnterprise_image-card__9Oybc.EngineerEnterprise_active__0i0L_ .EngineerEnterprise_card-vertical-title__fKfVw{opacity:0}.EngineerEnterprise_engineer-enterprise-section___5Tsj .EngineerEnterprise_all-images-cards__WmbUX:hover .EngineerEnterprise_image-card__9Oybc.EngineerEnterprise_active__0i0L_ .EngineerEnterprise_card-overlay___UZjo{opacity:1;transform:translateY(0)}.EngineerEnterprise_engineer-enterprise-section___5Tsj .EngineerEnterprise_all-images-cards__WmbUX:hover .EngineerEnterprise_image-card__9Oybc.EngineerEnterprise_active__0i0L_ .EngineerEnterprise_card-vertical-title__fKfVw{opacity:0}.EngineerEnterprise_engineer-enterprise-section___5Tsj .EngineerEnterprise_all-images-cards__WmbUX:hover .EngineerEnterprise_image-card__9Oybc:hover:not(.EngineerEnterprise_active__0i0L_) .EngineerEnterprise_card-overlay___UZjo{opacity:0;transform:translateY(12px)}.EngineerEnterprise_engineer-enterprise-section___5Tsj .EngineerEnterprise_all-images-cards__WmbUX:hover .EngineerEnterprise_image-card__9Oybc:hover:not(.EngineerEnterprise_active__0i0L_) .EngineerEnterprise_card-vertical-title__fKfVw{opacity:1}.EngineerEnterprise_engineer-enterprise-section___5Tsj .EngineerEnterprise_all-images-cards__WmbUX:hover .EngineerEnterprise_image-card__9Oybc:hover{border-radius:10px;transform:translateY(0)}}@media(max-width:820px){.EngineerEnterprise_engineer-enterprise-section___5Tsj{padding:10px 0 40px 20px}.EngineerEnterprise_engineer-enterprise-section___5Tsj h2{font-size:24px;line-height:35px;width:100%;padding-right:20px;text-align:center}.EngineerEnterprise_engineer-enterprise-section___5Tsj p{font-size:14px;line-height:30px;width:100%;padding-right:20px;text-align:center}.EngineerEnterprise_engineer-enterprise-section___5Tsj h6{font-size:16px;padding-right:20px;text-align:center}.EngineerEnterprise_engineer-enterprise-section___5Tsj .EngineerEnterprise_all-images-cards__WmbUX{height:250px;overflow-x:auto;overflow-y:hidden;display:flex;gap:8px;padding-right:20px;scroll-snap-type:x mandatory;-webkit-overflow-scrolling:touch;scrollbar-width:none}.EngineerEnterprise_engineer-enterprise-section___5Tsj .EngineerEnterprise_all-images-cards__WmbUX::-webkit-scrollbar{display:none}.EngineerEnterprise_engineer-enterprise-section___5Tsj .EngineerEnterprise_image-card__9Oybc{flex:0 0 22%;min-width:22%;height:100%;border-radius:10px;scroll-snap-align:start;transform:none}.EngineerEnterprise_engineer-enterprise-section___5Tsj .EngineerEnterprise_image-card__9Oybc.EngineerEnterprise_active__0i0L_{flex:0 0 60%;min-width:60%;transform:translateY(-6px);border-radius:10px}.EngineerEnterprise_engineer-enterprise-section___5Tsj .EngineerEnterprise_card-overlay___UZjo{opacity:0;transform:translateY(12px);padding:12px}.EngineerEnterprise_engineer-enterprise-section___5Tsj .EngineerEnterprise_card-vertical-title__fKfVw{opacity:1;font-size:16px;line-height:20px;bottom:10px}.EngineerEnterprise_engineer-enterprise-section___5Tsj .EngineerEnterprise_image-card__9Oybc.EngineerEnterprise_active__0i0L_:after{opacity:.95}.EngineerEnterprise_engineer-enterprise-section___5Tsj .EngineerEnterprise_image-card__9Oybc.EngineerEnterprise_active__0i0L_ .EngineerEnterprise_card-overlay___UZjo{opacity:1;transform:translateY(0)}.EngineerEnterprise_engineer-enterprise-section___5Tsj .EngineerEnterprise_image-card__9Oybc.EngineerEnterprise_active__0i0L_ .EngineerEnterprise_card-vertical-title__fKfVw{opacity:0}.EngineerEnterprise_engineer-enterprise-section___5Tsj .EngineerEnterprise_all-images-cards__WmbUX:hover .EngineerEnterprise_image-card__9Oybc.EngineerEnterprise_active__0i0L_ .EngineerEnterprise_card-overlay___UZjo{opacity:1;transform:translateY(0)}.EngineerEnterprise_engineer-enterprise-section___5Tsj .EngineerEnterprise_all-images-cards__WmbUX:hover .EngineerEnterprise_image-card__9Oybc.EngineerEnterprise_active__0i0L_ .EngineerEnterprise_card-vertical-title__fKfVw{opacity:0}.EngineerEnterprise_engineer-enterprise-section___5Tsj .EngineerEnterprise_all-images-cards__WmbUX:hover .EngineerEnterprise_image-card__9Oybc:hover:not(.EngineerEnterprise_active__0i0L_) .EngineerEnterprise_card-overlay___UZjo{opacity:0;transform:translateY(12px)}.EngineerEnterprise_engineer-enterprise-section___5Tsj .EngineerEnterprise_all-images-cards__WmbUX:hover .EngineerEnterprise_image-card__9Oybc:hover:not(.EngineerEnterprise_active__0i0L_) .EngineerEnterprise_card-vertical-title__fKfVw{opacity:1}.EngineerEnterprise_engineer-enterprise-section___5Tsj .EngineerEnterprise_card-overlay___UZjo h3{font-size:18px;line-height:26px}.EngineerEnterprise_engineer-enterprise-section___5Tsj .EngineerEnterprise_card-overlay___UZjo p{font-size:14px;line-height:18px}.EngineerEnterprise_engineer-enterprise-section___5Tsj .EngineerEnterprise_all-images-cards__WmbUX:hover .EngineerEnterprise_image-card__9Oybc:hover{border-radius:10px;transform:translateY(0)}}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT{width:100%;padding:40px 80px;display:flex;flex-direction:column;align-items:center;justify-content:center}@media(max-width:1380px){.ModernCyberSecurity_modern-cybersecurity-section__LYlaT{padding:40px}}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_heading-text__f1xUV{display:flex;justify-content:space-between;gap:60px}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_heading-text__f1xUV h2{font-weight:600;font-style:SemiBold;font-size:44px;line-height:60px;letter-spacing:0;text-transform:capitalize;color:#fcf9f8;width:50%}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_heading-text__f1xUV h2 span{display:inline;color:#fcf9f8}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_heading-text__f1xUV P{font-weight:400;font-style:Regular;font-size:18px;line-height:32px;letter-spacing:0;text-align:left;text-transform:capitalize;color:#b6b6b6;width:50%}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_all-modern-cyber-cards___x4uV{display:grid;margin-top:40px;grid-template-columns:repeat(4,1fr);gap:16px}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_all-modern-cyber-cards___x4uV .ModernCyberSecurity_modern-cyber-card__wC_pl{border:1px solid #242424;border-radius:24px;height:235px;padding:20px;display:flex;flex-direction:column;gap:12px}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_all-modern-cyber-cards___x4uV .ModernCyberSecurity_modern-cyber-card__wC_pl h5{font-weight:500;font-style:Medium;font-size:24px;line-height:35px;letter-spacing:0;color:#fcf9f8}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_all-modern-cyber-cards___x4uV .ModernCyberSecurity_modern-cyber-card__wC_pl h6{font-weight:400;font-style:Regular;font-size:16px;line-height:24px;letter-spacing:0;color:#b6b6b6}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT p{font-weight:600;font-style:SemiBold;font-size:20px;line-height:100%;letter-spacing:0;color:#fcf9f8;text-align:center;margin-top:30px}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_cyber-case-study-section__r6KMA{width:100%;padding:80px 0 40px}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_cyber-case-study-section__r6KMA h3{display:none}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_cyber-case-study-section__r6KMA .ModernCyberSecurity_cyber-study-left-right-content__SvkMC{display:flex;gap:80px;align-items:center}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_cyber-case-study-section__r6KMA .ModernCyberSecurity_cyber-study-left-right-content__SvkMC .ModernCyberSecurity_cyber-study-left-content__zxqux .ModernCyberSecurity_cyber-study-image__5a2zd{width:700px;height:514px;overflow:hidden}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_cyber-case-study-section__r6KMA .ModernCyberSecurity_cyber-study-left-right-content__SvkMC .ModernCyberSecurity_cyber-study-left-content__zxqux .ModernCyberSecurity_cyber-study-image__5a2zd img{width:100%;height:100%;object-fit:cover;border-radius:24px}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_cyber-case-study-section__r6KMA .ModernCyberSecurity_cyber-study-left-right-content__SvkMC .ModernCyberSecurity_cyber-study-right-content__vM9iG{display:flex;flex-direction:column;gap:26px}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_cyber-case-study-section__r6KMA .ModernCyberSecurity_cyber-study-left-right-content__SvkMC .ModernCyberSecurity_cyber-study-right-content__vM9iG h2{font-weight:600;font-style:SemiBold;font-size:44px;line-height:60px;letter-spacing:-1.12px;color:#fcf9f8}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_cyber-case-study-section__r6KMA .ModernCyberSecurity_cyber-study-left-right-content__SvkMC .ModernCyberSecurity_cyber-study-right-content__vM9iG h4{font-weight:500;font-style:Medium;font-size:18px;line-height:150%;letter-spacing:.18px;color:#e7e7e7;width:85%}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_cyber-case-study-section__r6KMA .ModernCyberSecurity_cyber-study-left-right-content__SvkMC .ModernCyberSecurity_cyber-study-right-content__vM9iG h6{font-weight:400;font-style:Regular;font-size:16px;line-height:150%;letter-spacing:0;color:#b6b6b6;width:85%}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_cyber-case-study-section__r6KMA .ModernCyberSecurity_cyber-study-left-right-content__SvkMC .ModernCyberSecurity_cyber-study-right-content__vM9iG .ModernCyberSecurity_all-weeks-cards__Aa4Zh{display:flex;gap:30px}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_cyber-case-study-section__r6KMA .ModernCyberSecurity_cyber-study-left-right-content__SvkMC .ModernCyberSecurity_cyber-study-right-content__vM9iG .ModernCyberSecurity_all-weeks-cards__Aa4Zh .ModernCyberSecurity_week-card__8L3fa h6{font-weight:400;font-style:Regular;font-size:28px;line-height:100%;letter-spacing:0;color:#fcf9f8}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_cyber-case-study-section__r6KMA .ModernCyberSecurity_cyber-study-left-right-content__SvkMC .ModernCyberSecurity_cyber-study-right-content__vM9iG .ModernCyberSecurity_all-weeks-cards__Aa4Zh .ModernCyberSecurity_week-card__8L3fa p{font-weight:400;font-style:Regular;font-size:16px;line-height:150%;letter-spacing:0;color:#b6b6b6;text-align:left;margin-top:16px;width:75%}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_cyber-case-study-section__r6KMA .ModernCyberSecurity_cyber-study-left-right-content__SvkMC .ModernCyberSecurity_cyber-study-right-content__vM9iG button{display:flex;align-items:center;gap:10px;background-color:#0c0c0c;cursor:pointer;padding:12px;height:54px;border-radius:72px;border:1px solid #fff;font-weight:400;font-style:Regular;font-size:18px;letter-spacing:0;vertical-align:middle;color:#fff}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_cyber-case-study-section__r6KMA .ModernCyberSecurity_cyber-study-left-right-content__SvkMC .ModernCyberSecurity_cyber-study-right-content__vM9iG button .ModernCyberSecurity_arrow-circle__lwXUp{width:32px;height:32px;display:flex;align-items:center;justify-content:center;background-color:#fff;border-radius:50%}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_cyber-case-study-section__r6KMA .ModernCyberSecurity_cyber-study-left-right-content__SvkMC .ModernCyberSecurity_cyber-study-right-content__vM9iG button .ModernCyberSecurity_arrow-circle__lwXUp svg path{fill:#0c0c0c}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_cyber-case-study-section__r6KMA .ModernCyberSecurity_cyber-study-left-right-content__SvkMC .ModernCyberSecurity_cyber-study-right-content__vM9iG button:hover{background-color:#fff;color:#0c0c0c}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_cyber-case-study-section__r6KMA .ModernCyberSecurity_cyber-study-left-right-content__SvkMC .ModernCyberSecurity_cyber-study-right-content__vM9iG button:hover .ModernCyberSecurity_arrow-circle__lwXUp{background-color:#0c0c0c}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_cyber-case-study-section__r6KMA .ModernCyberSecurity_cyber-study-left-right-content__SvkMC .ModernCyberSecurity_cyber-study-right-content__vM9iG button:hover .ModernCyberSecurity_arrow-circle__lwXUp svg path{fill:#fff}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_cybersecurity-risk-section__IvApi{width:100%;margin:40px 0;background:#0c0c0c33;backdrop-filter:blur(14px);-webkit-backdrop-filter:blur(14px);border:1px solid #ffffff1f;box-shadow:0 10px 30px #00000059,inset 0 1px 0 #ffffff1f;border-radius:24px;padding:80px}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_cybersecurity-risk-section__IvApi .ModernCyberSecurity_cybersecurity-risk-left-right-content__2aS_y{display:flex;align-items:center;gap:60px}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_cybersecurity-risk-section__IvApi .ModernCyberSecurity_cybersecurity-risk-left-right-content__2aS_y .ModernCyberSecurity_cybersecurity-risk-left-content__ehXCI h2{font-weight:600;font-style:SemiBold;font-size:46px;line-height:60px;letter-spacing:0;text-transform:capitalize;color:#fcf9f8}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_cybersecurity-risk-section__IvApi .ModernCyberSecurity_cybersecurity-risk-left-right-content__2aS_y .ModernCyberSecurity_cybersecurity-risk-left-content__ehXCI h2 span{display:inline;color:#fcf9f8}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_cybersecurity-risk-section__IvApi .ModernCyberSecurity_cybersecurity-risk-left-right-content__2aS_y .ModernCyberSecurity_cybersecurity-risk-left-content__ehXCI .ModernCyberSecurity_cybersecurity-mobile-image__CDuz5{display:none}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_cybersecurity-risk-section__IvApi .ModernCyberSecurity_cybersecurity-risk-left-right-content__2aS_y .ModernCyberSecurity_cybersecurity-risk-left-content__ehXCI h5{font-weight:500;font-style:Medium;font-size:20px;line-height:28px;letter-spacing:0;color:#fcf9f8;margin:20px 0}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_cybersecurity-risk-section__IvApi .ModernCyberSecurity_cybersecurity-risk-left-right-content__2aS_y .ModernCyberSecurity_cybersecurity-risk-left-content__ehXCI .ModernCyberSecurity_all-list-data__loN4H .ModernCyberSecurity_list-data__TKmwL{display:flex;align-items:center;gap:12px;margin-bottom:12px}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_cybersecurity-risk-section__IvApi .ModernCyberSecurity_cybersecurity-risk-left-right-content__2aS_y .ModernCyberSecurity_cybersecurity-risk-left-content__ehXCI .ModernCyberSecurity_all-list-data__loN4H .ModernCyberSecurity_list-data__TKmwL h6{font-weight:400;font-style:Regular;font-size:16px;line-height:normal;letter-spacing:0;color:#b6b6b6}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_cybersecurity-risk-section__IvApi .ModernCyberSecurity_cybersecurity-risk-left-right-content__2aS_y .ModernCyberSecurity_cybersecurity-risk-left-content__ehXCI button{margin-top:40px;display:flex;align-items:center;gap:10px;background-color:#0000;cursor:pointer;padding:12px;height:54px;border-radius:72px;border:1px solid #fff;font-weight:400;font-style:Regular;font-size:18px;letter-spacing:0;vertical-align:middle;color:#fff}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_cybersecurity-risk-section__IvApi .ModernCyberSecurity_cybersecurity-risk-left-right-content__2aS_y .ModernCyberSecurity_cybersecurity-risk-left-content__ehXCI button .ModernCyberSecurity_arrow-circle__lwXUp{width:32px;height:32px;display:flex;align-items:center;justify-content:center;background-color:#fff;border-radius:50%}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_cybersecurity-risk-section__IvApi .ModernCyberSecurity_cybersecurity-risk-left-right-content__2aS_y .ModernCyberSecurity_cybersecurity-risk-left-content__ehXCI button .ModernCyberSecurity_arrow-circle__lwXUp svg path{fill:#0c0c0c}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_cybersecurity-risk-section__IvApi .ModernCyberSecurity_cybersecurity-risk-left-right-content__2aS_y .ModernCyberSecurity_cybersecurity-risk-left-content__ehXCI button:hover{background-color:#fff;color:#0c0c0c}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_cybersecurity-risk-section__IvApi .ModernCyberSecurity_cybersecurity-risk-left-right-content__2aS_y .ModernCyberSecurity_cybersecurity-risk-left-content__ehXCI button:hover .ModernCyberSecurity_arrow-circle__lwXUp{background-color:#0c0c0c}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_cybersecurity-risk-section__IvApi .ModernCyberSecurity_cybersecurity-risk-left-right-content__2aS_y .ModernCyberSecurity_cybersecurity-risk-left-content__ehXCI button:hover .ModernCyberSecurity_arrow-circle__lwXUp svg path{fill:#fff}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_cybersecurity-risk-section__IvApi .ModernCyberSecurity_cybersecurity-risk-left-right-content__2aS_y .ModernCyberSecurity_cybersecurity-risk-right-content__WhEG3 .ModernCyberSecurity_risk-image__YF2_l{width:500px;height:441px;overflow:hidden}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_cybersecurity-risk-section__IvApi .ModernCyberSecurity_cybersecurity-risk-left-right-content__2aS_y .ModernCyberSecurity_cybersecurity-risk-right-content__WhEG3 .ModernCyberSecurity_risk-image__YF2_l img{width:100%;height:100%;object-fit:cover}@media(max-width:1280px){.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_heading-text__f1xUV{flex-direction:column;align-items:center;justify-content:center;text-align:center;gap:0}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_heading-text__f1xUV h2{font-size:38px;width:100%}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_heading-text__f1xUV P{width:100%;text-align:center}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_all-modern-cyber-cards___x4uV{grid-template-columns:repeat(3,1fr);gap:16px}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT p{font-size:18px}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_cyber-case-study-section__r6KMA .ModernCyberSecurity_cyber-study-left-right-content__SvkMC{gap:40px}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_cyber-case-study-section__r6KMA .ModernCyberSecurity_cyber-study-left-right-content__SvkMC .ModernCyberSecurity_cyber-study-left-content__zxqux .ModernCyberSecurity_cyber-study-image__5a2zd{width:600px;height:414px}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_cyber-case-study-section__r6KMA .ModernCyberSecurity_cyber-study-left-right-content__SvkMC .ModernCyberSecurity_cyber-study-right-content__vM9iG{gap:20px}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_cyber-case-study-section__r6KMA .ModernCyberSecurity_cyber-study-left-right-content__SvkMC .ModernCyberSecurity_cyber-study-right-content__vM9iG h2{font-size:38px;line-height:45px}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_cyber-case-study-section__r6KMA .ModernCyberSecurity_cyber-study-left-right-content__SvkMC .ModernCyberSecurity_cyber-study-right-content__vM9iG h4{font-size:18px;width:100%}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_cyber-case-study-section__r6KMA .ModernCyberSecurity_cyber-study-left-right-content__SvkMC .ModernCyberSecurity_cyber-study-right-content__vM9iG h6{width:100%}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_cyber-case-study-section__r6KMA .ModernCyberSecurity_cyber-study-left-right-content__SvkMC .ModernCyberSecurity_cyber-study-right-content__vM9iG .ModernCyberSecurity_all-weeks-cards__Aa4Zh{gap:20px}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_cyber-case-study-section__r6KMA .ModernCyberSecurity_cyber-study-left-right-content__SvkMC .ModernCyberSecurity_cyber-study-right-content__vM9iG .ModernCyberSecurity_all-weeks-cards__Aa4Zh .ModernCyberSecurity_week-card__8L3fa h6{font-size:20px}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_cyber-case-study-section__r6KMA .ModernCyberSecurity_cyber-study-left-right-content__SvkMC .ModernCyberSecurity_cyber-study-right-content__vM9iG .ModernCyberSecurity_all-weeks-cards__Aa4Zh .ModernCyberSecurity_week-card__8L3fa p{width:100%}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_cybersecurity-risk-section__IvApi{border-radius:24px;padding:40px}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_cybersecurity-risk-section__IvApi .ModernCyberSecurity_cybersecurity-risk-left-right-content__2aS_y{gap:40px}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_cybersecurity-risk-section__IvApi .ModernCyberSecurity_cybersecurity-risk-left-right-content__2aS_y .ModernCyberSecurity_cybersecurity-risk-left-content__ehXCI h2{font-size:38px;line-height:45px}}@media(max-width:1180px){.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_cyber-case-study-section__r6KMA .ModernCyberSecurity_cyber-study-left-right-content__SvkMC{gap:20px}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_cyber-case-study-section__r6KMA .ModernCyberSecurity_cyber-study-left-right-content__SvkMC .ModernCyberSecurity_cyber-study-left-content__zxqux .ModernCyberSecurity_cyber-study-image__5a2zd{width:480px;height:384px}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_cyber-case-study-section__r6KMA .ModernCyberSecurity_cyber-study-left-right-content__SvkMC .ModernCyberSecurity_cyber-study-right-content__vM9iG{gap:20px}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_cyber-case-study-section__r6KMA .ModernCyberSecurity_cyber-study-left-right-content__SvkMC .ModernCyberSecurity_cyber-study-right-content__vM9iG h2{font-size:36px;line-height:40px}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_cybersecurity-risk-section__IvApi{padding:20px}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_cybersecurity-risk-section__IvApi .ModernCyberSecurity_cybersecurity-risk-left-right-content__2aS_y{gap:20px}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_cybersecurity-risk-section__IvApi .ModernCyberSecurity_cybersecurity-risk-left-right-content__2aS_y .ModernCyberSecurity_cybersecurity-risk-left-content__ehXCI h2{font-size:36px}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_cybersecurity-risk-section__IvApi .ModernCyberSecurity_cybersecurity-risk-left-right-content__2aS_y .ModernCyberSecurity_cybersecurity-risk-right-content__WhEG3 .ModernCyberSecurity_risk-image__YF2_l{width:400px;height:341px}}@media(max-width:1024px){.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_all-modern-cyber-cards___x4uV{grid-template-columns:repeat(2,1fr)}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_cyber-case-study-section__r6KMA .ModernCyberSecurity_cyber-study-left-right-content__SvkMC{flex-direction:column}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_cyber-case-study-section__r6KMA .ModernCyberSecurity_cyber-study-left-right-content__SvkMC .ModernCyberSecurity_cyber-study-left-content__zxqux{width:100%}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_cyber-case-study-section__r6KMA .ModernCyberSecurity_cyber-study-left-right-content__SvkMC .ModernCyberSecurity_cyber-study-left-content__zxqux .ModernCyberSecurity_cyber-study-image__5a2zd{width:100%;height:384px}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_cybersecurity-risk-section__IvApi .ModernCyberSecurity_cybersecurity-risk-left-right-content__2aS_y{flex-direction:column;width:100%}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_cybersecurity-risk-section__IvApi .ModernCyberSecurity_cybersecurity-risk-left-right-content__2aS_y .ModernCyberSecurity_cybersecurity-risk-left-content__ehXCI{width:100%}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_cybersecurity-risk-section__IvApi .ModernCyberSecurity_cybersecurity-risk-left-right-content__2aS_y .ModernCyberSecurity_cybersecurity-risk-left-content__ehXCI h2{font-size:36px}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_cybersecurity-risk-section__IvApi .ModernCyberSecurity_cybersecurity-risk-left-right-content__2aS_y .ModernCyberSecurity_cybersecurity-risk-right-content__WhEG3{width:100%}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_cybersecurity-risk-section__IvApi .ModernCyberSecurity_cybersecurity-risk-left-right-content__2aS_y .ModernCyberSecurity_cybersecurity-risk-right-content__WhEG3 .ModernCyberSecurity_risk-image__YF2_l{width:100%;height:341px}}@media(max-width:768px){.ModernCyberSecurity_modern-cybersecurity-section__LYlaT{padding:20px}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_heading-text__f1xUV{flex-direction:column;justify-content:center;align-items:center;text-align:center}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_heading-text__f1xUV h2{font-size:24px;line-height:40px;width:100%}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_heading-text__f1xUV P{font-size:16px;line-height:26px;text-align:center;width:100%}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_all-modern-cyber-cards___x4uV{margin-top:20px;grid-template-columns:repeat(1,1fr);gap:12px;width:100%}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_all-modern-cyber-cards___x4uV .ModernCyberSecurity_modern-cyber-card__wC_pl{gap:16px}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT p{font-size:16px}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_cyber-case-study-section__r6KMA{padding:0 0 20px;display:flex;flex-direction:column;align-items:center;justify-content:center}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_cyber-case-study-section__r6KMA h3{margin-top:20px;display:flex;font-weight:700;font-style:Bold;font-size:24px;line-height:40px;letter-spacing:0;text-align:center;margin-bottom:20px;color:#fcf9f8}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_cyber-case-study-section__r6KMA .ModernCyberSecurity_cyber-study-left-right-content__SvkMC{flex-direction:column;gap:20px}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_cyber-case-study-section__r6KMA .ModernCyberSecurity_cyber-study-left-right-content__SvkMC .ModernCyberSecurity_cyber-study-left-content__zxqux{width:100%}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_cyber-case-study-section__r6KMA .ModernCyberSecurity_cyber-study-left-right-content__SvkMC .ModernCyberSecurity_cyber-study-left-content__zxqux .ModernCyberSecurity_cyber-study-image__5a2zd{width:100%;height:219px}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_cyber-case-study-section__r6KMA .ModernCyberSecurity_cyber-study-left-right-content__SvkMC .ModernCyberSecurity_cyber-study-left-content__zxqux .ModernCyberSecurity_cyber-study-image__5a2zd img{border-radius:12px}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_cyber-case-study-section__r6KMA .ModernCyberSecurity_cyber-study-left-right-content__SvkMC .ModernCyberSecurity_cyber-study-right-content__vM9iG{display:flex;flex-direction:column;align-items:center;justify-content:center;gap:24px}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_cyber-case-study-section__r6KMA .ModernCyberSecurity_cyber-study-left-right-content__SvkMC .ModernCyberSecurity_cyber-study-right-content__vM9iG h2{display:none}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_cyber-case-study-section__r6KMA .ModernCyberSecurity_cyber-study-left-right-content__SvkMC .ModernCyberSecurity_cyber-study-right-content__vM9iG h4{font-size:20px;line-height:150%;width:100%}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_cyber-case-study-section__r6KMA .ModernCyberSecurity_cyber-study-left-right-content__SvkMC .ModernCyberSecurity_cyber-study-right-content__vM9iG h6{font-size:16px;line-height:150%;width:100%}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_cyber-case-study-section__r6KMA .ModernCyberSecurity_cyber-study-left-right-content__SvkMC .ModernCyberSecurity_cyber-study-right-content__vM9iG .ModernCyberSecurity_all-weeks-cards__Aa4Zh{gap:18px}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_cyber-case-study-section__r6KMA .ModernCyberSecurity_cyber-study-left-right-content__SvkMC .ModernCyberSecurity_cyber-study-right-content__vM9iG .ModernCyberSecurity_all-weeks-cards__Aa4Zh .ModernCyberSecurity_week-card__8L3fa h6{font-size:18px}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_cyber-case-study-section__r6KMA .ModernCyberSecurity_cyber-study-left-right-content__SvkMC .ModernCyberSecurity_cyber-study-right-content__vM9iG .ModernCyberSecurity_all-weeks-cards__Aa4Zh .ModernCyberSecurity_week-card__8L3fa p{font-size:14px;line-height:150%;margin-top:14px;width:100%}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_cyber-case-study-section__r6KMA .ModernCyberSecurity_cyber-study-left-right-content__SvkMC .ModernCyberSecurity_cyber-study-right-content__vM9iG button{padding:10px;height:40px;font-size:16px}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_cyber-case-study-section__r6KMA .ModernCyberSecurity_cyber-study-left-right-content__SvkMC .ModernCyberSecurity_cyber-study-right-content__vM9iG button .ModernCyberSecurity_arrow-circle__lwXUp{width:24px;height:24px}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_cybersecurity-risk-section__IvApi{margin:20px 0;border-radius:20px;padding:20px 16px}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_cybersecurity-risk-section__IvApi .ModernCyberSecurity_cybersecurity-risk-left-right-content__2aS_y{flex-direction:column;gap:20px}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_cybersecurity-risk-section__IvApi .ModernCyberSecurity_cybersecurity-risk-left-right-content__2aS_y .ModernCyberSecurity_cybersecurity-risk-left-content__ehXCI{width:100%}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_cybersecurity-risk-section__IvApi .ModernCyberSecurity_cybersecurity-risk-left-right-content__2aS_y .ModernCyberSecurity_cybersecurity-risk-left-content__ehXCI h2{font-size:24px;line-height:40px;text-align:center}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_cybersecurity-risk-section__IvApi .ModernCyberSecurity_cybersecurity-risk-left-right-content__2aS_y .ModernCyberSecurity_cybersecurity-risk-left-content__ehXCI .ModernCyberSecurity_cybersecurity-mobile-image__CDuz5{display:flex;align-items:center;justify-content:center;margin-top:16px}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_cybersecurity-risk-section__IvApi .ModernCyberSecurity_cybersecurity-risk-left-right-content__2aS_y .ModernCyberSecurity_cybersecurity-risk-left-content__ehXCI .ModernCyberSecurity_cybersecurity-mobile-image__CDuz5 .ModernCyberSecurity_image-mobile__tSTjT{width:100%;height:282px;overflow:hidden}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_cybersecurity-risk-section__IvApi .ModernCyberSecurity_cybersecurity-risk-left-right-content__2aS_y .ModernCyberSecurity_cybersecurity-risk-left-content__ehXCI .ModernCyberSecurity_cybersecurity-mobile-image__CDuz5 .ModernCyberSecurity_image-mobile__tSTjT img{width:100%;height:100%;object-fit:cover}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_cybersecurity-risk-section__IvApi .ModernCyberSecurity_cybersecurity-risk-left-right-content__2aS_y .ModernCyberSecurity_cybersecurity-risk-left-content__ehXCI h5{font-size:18px;line-height:28px;margin:18px 0}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_cybersecurity-risk-section__IvApi .ModernCyberSecurity_cybersecurity-risk-left-right-content__2aS_y .ModernCyberSecurity_cybersecurity-risk-left-content__ehXCI .ModernCyberSecurity_all-list-data__loN4H .ModernCyberSecurity_list-data__TKmwL{gap:10px;margin-bottom:12px}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_cybersecurity-risk-section__IvApi .ModernCyberSecurity_cybersecurity-risk-left-right-content__2aS_y .ModernCyberSecurity_cybersecurity-risk-left-content__ehXCI .ModernCyberSecurity_all-list-data__loN4H .ModernCyberSecurity_list-data__TKmwL h6{font-size:14px;width:95%}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_cybersecurity-risk-section__IvApi .ModernCyberSecurity_cybersecurity-risk-left-right-content__2aS_y .ModernCyberSecurity_cybersecurity-risk-left-content__ehXCI button{margin-top:30px;padding:10px;height:40px;font-size:16px}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_cybersecurity-risk-section__IvApi .ModernCyberSecurity_cybersecurity-risk-left-right-content__2aS_y .ModernCyberSecurity_cybersecurity-risk-left-content__ehXCI button .ModernCyberSecurity_arrow-circle__lwXUp{width:24px;height:24px}.ModernCyberSecurity_modern-cybersecurity-section__LYlaT .ModernCyberSecurity_cybersecurity-risk-section__IvApi .ModernCyberSecurity_cybersecurity-risk-left-right-content__2aS_y .ModernCyberSecurity_cybersecurity-risk-right-content__WhEG3{display:none}}