.et_pb_section_1{overflow-x:visible;overflow-y:visible;z-index:10;position:relative}.et_pb_section_1.et_pb_section{padding-bottom:13vw;margin-top:3px}.et_pb_row_2{background-color:#ffffff;border-radius:10px 10px 10px 10px;overflow:hidden;box-shadow:0px 40px 60px -8px #000000}.et_pb_row_2.et_pb_row{padding-top:0px!important;padding-bottom:0px!important;margin-top:-146px!important;margin-right:auto!important;margin-bottom:-2px!important;margin-left:auto!important;padding-top:0px;padding-bottom:0px}.et_pb_blurb_0.et_pb_blurb .et_pb_module_header,.et_pb_blurb_0.et_pb_blurb .et_pb_module_header a{font-family:'Trebuchet','Trebuchet MS',Helvetica,Arial,Lucida,sans-serif;font-weight:300;font-size:20px;line-height:1.4em}.et_pb_blurb_0.et_pb_blurb p,.et_pb_blurb_1.et_pb_blurb p{line-height:1.8em}.et_pb_blurb_0.et_pb_blurb{font-family:'Overpass',Helvetica,Arial,Lucida,sans-serif;font-weight:300;line-height:1.8em}.et_pb_blurb_0 .et-pb-icon{font-size:24px;color:#008DD2;font-family:ETmodules!important;font-weight:400!important}.et_pb_blurb_1.et_pb_blurb .et_pb_module_header,.et_pb_blurb_1.et_pb_blurb .et_pb_module_header a{font-family:'Open Sans',Helvetica,Arial,Lucida,sans-serif;font-weight:300;line-height:1.4em}.et_pb_blurb_1.et_pb_blurb{font-family:'Trebuchet','Trebuchet MS',Helvetica,Arial,Lucida,sans-serif;font-weight:300;font-size:18px;color:#000000!important;line-height:1.8em}.et_pb_blurb_1.et_pb_blurb:hover,.et_pb_blurb_1.et_pb_blurb .et_pb_blurb_description a{color:#000000!important}.et_pb_blurb_1 .et_pb_blurb_description{transition:color 300ms ease 0ms}.et_pb_blurb_1 .et-pb-icon{font-size:24px;color:#008DD2;font-family:FontAwesome!important;font-weight:400!important}.et_pb_image_0{width:68%;text-align:left;margin-left:0}.et_pb_column_2{padding-top:60px;padding-right:40px;padding-bottom:60px;padding-left:40px}.et_pb_column_3{background-size:contain;background-position:left bottom 0px;background-image:url(https://transition-innovations.com/wp-content/uploads/2025/04/cyber-security-010-1.png);background-color:#D6D6D6;padding-top:60px;padding-right:40px;padding-bottom:60px;padding-left:20%}.et_pb_image_0.et_pb_module{margin-left:auto!important;margin-right:auto!important}@media only screen and (max-width:980px){.et_pb_image_0 .et_pb_image_wrap img{width:auto}.et_pb_column_3{background-position:left top;background-image:url(http://zaib.sandbox.etdevs.com/divi/wp-content/uploads/sites/2/2019/06/cyber-security-11.png);padding-top:80px;padding-left:40px}}@media only screen and (max-width:767px){.et_pb_image_0 .et_pb_image_wrap img{width:auto}}