@import"https://fonts.googleapis.com/css2?family=Poppins:wght@300;400;500;600;700&display=swap";@import"https://fonts.googleapis.com/css2?family=Sofia+Sans+Extra+Condensed:wght@1000&display=swap";@import"https://fonts.googleapis.com/css2?family=Inter:ital,opsz,wght@0,14..32,100..900;1,14..32,100..900&family=Rajdhani:wght@300;400;500;600;700&display=swap";body:before{content:'{ "current": "large" }';display:none}@media(min-width:47.063em) and (max-width:68.063em){body:before{content:'{ "current": "medium" }'}}@media(min-width:0em) and (max-width:47em){body:before{content:'{ "current": "small" }'}}.ieee-cybersecurity-2025{scroll-behavior:smooth}.ieee-cybersecurity-2025 *{box-sizing:border-box}.ieee-cybersecurity-2025 .show-desktop{display:block}@media(max-width:768px){.ieee-cybersecurity-2025 .show-desktop{display:none!important}}.ieee-cybersecurity-2025 .show-mobile{display:none}@media(max-width:768px){.ieee-cybersecurity-2025 .show-mobile{display:block!important}}.ieee-cybersecurity-2025 h1{font-family:Rajdhani,Helvetica Neue,Helvetica,Roboto,Arial,sans-serif;font-size:55px;line-height:1;color:#ffba38;font-weight:700;margin:0 0 30px;position:relative}@media(max-width:1024px){.ieee-cybersecurity-2025 h1{font-size:40px}}.ieee-cybersecurity-2025 h2{font-family:Rajdhani,Helvetica Neue,Helvetica,Roboto,Arial,sans-serif;font-size:50px;line-height:1.05;text-align:left;color:#fff;font-weight:800;margin:0 0 30px;padding:0;text-transform:none}@media(max-width:1300px){.ieee-cybersecurity-2025 h2{font-size:40px}}@media(max-width:1024px){.ieee-cybersecurity-2025 h2{font-size:32px}}.ieee-cybersecurity-2025 h3{font-family:Rajdhani,Helvetica Neue,Helvetica,Roboto,Arial,sans-serif;font-size:30px;font-weight:700;line-height:1;text-align:center;color:#fff;margin:0 0 10px;padding:0;text-transform:none}.ieee-cybersecurity-2025 h3 span{font-family:Inter,sans-serif;font-weight:400;font-size:20px;color:#fff;text-transform:none}@media(max-width:1024px){.ieee-cybersecurity-2025 h3 span{font-size:18px}}@media(max-width:768px){.ieee-cybersecurity-2025 h3{font-size:24px}}.ieee-cybersecurity-2025 h4{font-family:Poppins,sans-serif;font-size:40px;color:#fff;font-weight:700;line-height:1.25;margin:0 0 30px;padding:0;text-transform:none}@media(max-width:768px){.ieee-cybersecurity-2025 h4{font-size:25px;margin-bottom:15px}}.ieee-cybersecurity-2025 p{font-family:Inter,sans-serif;font-size:20px;line-height:1.5;color:#fff;margin:0 0 30px;padding:0}@media(max-width:768px){.ieee-cybersecurity-2025 p{font-size:18px;margin-bottom:15px}}.ieee-cybersecurity-2025 span{color:#ffba38;font-weight:700;font-size:22px;text-transform:uppercase}@media(max-width:1024px){.ieee-cybersecurity-2025 span{font-size:20px}}.ieee-cybersecurity-2025 blockquote{font-family:Inter,sans-serif;background:none;font-size:20px;line-height:1.5;color:#fff}@media(max-width:768px){.ieee-cybersecurity-2025 blockquote{font-size:16px}}.ieee-cybersecurity-2025 .wrapper,.ieee-cybersecurity-2025 .poster{max-width:1450px;margin:0 auto;height:100%;position:relative;padding:0 80px}@media(max-width:768px){.ieee-cybersecurity-2025 .wrapper,.ieee-cybersecurity-2025 .poster{padding:0 20px}}.ieee-cybersecurity-2025 .section .frame{height:350vh;width:100%}.ieee-cybersecurity-2025 .section.related{border:none}.ieee-cybersecurity-2025 .section.related:before{display:none}.ieee-cybersecurity-2025 .section.related .frame{height:350vh}.ieee-cybersecurity-2025 .slide{z-index:5;position:absolute;width:100%;height:100%;opacity:1;overflow:hidden}.ieee-cybersecurity-2025 .slide .frame{position:absolute;height:100vh;display:flex;width:calc(100% - 160px);flex-direction:column;justify-content:center}@media(max-width:768px){.ieee-cybersecurity-2025 .slide .frame{width:calc(100% - 40px)}}.ieee-cybersecurity-2025 .slide.slide-footer{top:100vh;background:radial-gradient(circle at 50% 70%,#c65be0 0,#1f32ae 100%)}.ieee-cybersecurity-2025 .slide.slide-footer .frame>.wrapper{max-width:100%;margin:0;padding:0}.ieee-cybersecurity-2025 .slide.slide-footer .frame{width:100%;min-height:100vh;height:auto}.ieee-cybersecurity-2025 .slide.slide-footer .frame h3{color:#ffba38;font-size:60px;padding-bottom:30px}@media(max-width:768px){.ieee-cybersecurity-2025 .slide.slide-footer .frame h3{font-size:42px}}.ieee-cybersecurity-2025 .slide.slide-footer .frame .poster{min-height:100vh;display:flex;flex-direction:column;justify-content:center;padding-top:80px;padding-bottom:80px}.ieee-cybersecurity-2025 .slide.slide1{z-index:20}.ieee-cybersecurity-2025 .slide.slide2{z-index:19}.ieee-cybersecurity-2025 .slide.slide3{z-index:18}.ieee-cybersecurity-2025 .slide.slide4{z-index:17}.ieee-cybersecurity-2025 .slide.slide5{z-index:16}.ieee-cybersecurity-2025 .slide.slide6{z-index:15}.ieee-cybersecurity-2025 .slide.slide7{z-index:14}.ieee-cybersecurity-2025 .slide.slide8{z-index:13}.ieee-cybersecurity-2025 .slide.slide9{z-index:12}.ieee-cybersecurity-2025 .slide.slide10{z-index:11}.ieee-cybersecurity-2025 .slide.slide11{z-index:10}.ieee-cybersecurity-2025 .slide.slide12{z-index:9}.ieee-cybersecurity-2025 .slide.slide13{z-index:8}.ieee-cybersecurity-2025 .slide.slide14{z-index:7}.ieee-cybersecurity-2025 .slide.slide15{z-index:6}.ieee-cybersecurity-2025 .slide.slide16{z-index:5}.ieee-cybersecurity-2025 .slide.slide17{z-index:4}.ieee-cybersecurity-2025 .slide.slide18{z-index:3}.ieee-cybersecurity-2025 .slide.slide19{z-index:2}.ieee-cybersecurity-2025 .slide.slide20{z-index:1}.ieee-cybersecurity-2025 .slide.slide-intro,.ieee-cybersecurity-2025 .slide.slide-footer{z-index:30}.ieee-cybersecurity-2025 .slide.slide-intro.small-height .wrapper{align-items:flex-start}@media(max-width:1024px){.ieee-cybersecurity-2025 .slide:not(.slide-intro):not(.slide-footer){top:100vh}}.ieee-cybersecurity-2025 .slide .frame{justify-content:flex-start}.ieee-cybersecurity-2025 .pinned.small-height .slide1 .frame{justify-content:flex-start}.ieee-cybersecurity-2025 .pinned{position:fixed;left:0;top:237px;width:100%;height:calc(100vh - 237px);overflow:hidden}@media(max-width:1088px){.ieee-cybersecurity-2025 .pinned{top:168px;height:calc(100vh - 168px)}}.ieee-cybersecurity-2025 .video-cover{position:absolute;top:0;left:0;width:100%;height:100%;z-index:0;opacity:1;color:#fff}.ieee-cybersecurity-2025 .video-cover #bgvid,.ieee-cybersecurity-2025 .video-cover .bgvid{z-index:0}.ieee-cybersecurity-2025 .video-cover:after{content:'';position:absolute;top:0;left:0;width:100%;height:100%;background:linear-gradient(to right,rgba(0,40,85,.2),#b287f2);mix-blend-mode:multiply}@media(max-width:1024px){.ieee-cybersecurity-2025 .video-cover:after{opacity:1;mix-blend-mode:normal;background:linear-gradient(to bottom,transparent 40%,#092958 70%,#442a6b 90%)}}.ieee-cybersecurity-2025 .videoc{position:absolute;top:0;left:0;width:100%;height:100%;background-color:#002855}.ieee-cybersecurity-2025 .gap{background:#002855;width:40px;height:12px}.ieee-cybersecurity-2025 .gap:before{content:'';position:absolute;width:12px;height:12px;border:1px solid #fff;border-radius:50%}.ieee-cybersecurity-2025 .text-box{background:#002855;padding:60px;width:100%;max-width:40%;backdrop-filter:blur(10px);display:flex;flex-direction:column;justify-content:flex-start;position:absolute;bottom:-100%}.ieee-cybersecurity-2025 .text-box .solution{position:relative}.ieee-cybersecurity-2025 .text-box .gap.gap1{position:absolute;z-index:10;top:24px;left:50%}.ieee-cybersecurity-2025 .text-box .gap.gap2{position:absolute;z-index:10;top:-10px;width:50px;right:-59px;transform:rotate(90deg)}.ieee-cybersecurity-2025 .text-box:before{content:'';position:absolute;z-index:15;top:30px;left:30px;width:30px;height:30px;background-color:#002855;background-image:linear-gradient(to bottom right,transparent,transparent calc(50% - 1px),#fff 50%,transparent calc(50% + 2px))}.ieee-cybersecurity-2025 .text-box:after{content:'';position:absolute;top:30px;left:30px;width:calc(100% - 60px);height:calc(100% - 60px);border:2px solid #fff}@media(max-width:1024px){.ieee-cybersecurity-2025 .text-box{max-width:100%}}.ieee-cybersecurity-2025 .author-box{position:absolute;right:0;width:100%;max-width:45%;min-height:50vh;bottom:-100%;display:flex;align-items:flex-end}@media(max-width:1024px){.ieee-cybersecurity-2025 .author-box{max-width:100%}}.ieee-cybersecurity-2025 .author-box .box{background:#6028b3;position:relative;margin-top:80px;padding:30px 30px 0}.ieee-cybersecurity-2025 .author-box .box:after{content:'';position:absolute;top:30px;left:30px;width:calc(100% - 60px);height:calc(100% - 60px);border:2px solid #fff}.ieee-cybersecurity-2025 .author-box .box:before{content:'';position:absolute;z-index:15;top:30px;left:30px;width:30px;height:30px;background-color:#6028b3;background-image:linear-gradient(to bottom right,transparent,transparent calc(50% - 1px),#fff 50%,transparent calc(50% + 2px))}.ieee-cybersecurity-2025 .author-box .gap{background:#6028b3;position:absolute;z-index:10;bottom:30%;width:50px;left:7px;transform:rotate(90deg)}.ieee-cybersecurity-2025 .author-box .img{width:220px;aspect-ratio:1/1;border-radius:50%;overflow:hidden;margin-left:auto;margin-right:auto;z-index:10;margin-top:-100px}@media(max-width:1024px){.ieee-cybersecurity-2025 .author-box .img{width:150px;margin-top:-75px}}.ieee-cybersecurity-2025 .author-box .img img{width:100%;height:auto;object-fit:cover}.ieee-cybersecurity-2025 .author-box .blurb{padding:30px 0 0;background:none}.ieee-cybersecurity-2025 .slide:nth-child(5n+3) .author-box .box,.ieee-cybersecurity-2025 .slide:nth-child(5n+3) .author-box .gap{background:#2166a1}.ieee-cybersecurity-2025 .slide:nth-child(5n+3) .author-box .box:before,.ieee-cybersecurity-2025 .slide:nth-child(5n+3) .author-box .gap:before{background-color:#2166a1}@media(min-width:1025px){.ieee-cybersecurity-2025 .slide:nth-child(5n+3) .video-cover:after{background:linear-gradient(to right,rgba(0,40,85,.1),#39a7dc);mix-blend-mode:multiply}}.ieee-cybersecurity-2025 .slide:nth-child(5n+4) .author-box .box,.ieee-cybersecurity-2025 .slide:nth-child(5n+4) .author-box .gap{background:#872b80}.ieee-cybersecurity-2025 .slide:nth-child(5n+4) .author-box .box:before,.ieee-cybersecurity-2025 .slide:nth-child(5n+4) .author-box .gap:before{background-color:#872b80}@media(min-width:1025px){.ieee-cybersecurity-2025 .slide:nth-child(5n+4) .video-cover:after{background:linear-gradient(to right,rgba(0,40,85,.1),#39a7dc);mix-blend-mode:multiply}}.ieee-cybersecurity-2025 .slide:nth-child(5n+5) .author-box .box,.ieee-cybersecurity-2025 .slide:nth-child(5n+5) .author-box .gap{background:#2a7687}.ieee-cybersecurity-2025 .slide:nth-child(5n+5) .author-box .box:before,.ieee-cybersecurity-2025 .slide:nth-child(5n+5) .author-box .gap:before{background-color:#2a7687}@media(min-width:1025px){.ieee-cybersecurity-2025 .slide:nth-child(5n+5) .video-cover:after{background:linear-gradient(to right,rgba(0,40,85,.1),#39a7dc);mix-blend-mode:multiply}}.ieee-cybersecurity-2025 .articles-list{display:flex;gap:60px;max-width:1250px;margin:0 auto}@media(max-width:1790px){.ieee-cybersecurity-2025 .articles-list{padding:0 20px}}@media(max-width:1024px){.ieee-cybersecurity-2025 .articles-list{flex-wrap:wrap;max-width:600px}}@media(max-width:500px){.ieee-cybersecurity-2025 .articles-list{max-width:300px}}.ieee-cybersecurity-2025 .articles-list .article{display:block;flex:0 0 calc(25% - 45px);text-decoration:none;margin:0;position:relative}.ieee-cybersecurity-2025 .articles-list .article .border{position:relative;height:100%}.ieee-cybersecurity-2025 .articles-list .article .border:before{content:'';position:absolute;top:0;left:30px;width:calc(100% - 31px);height:1px;background:#fff}.ieee-cybersecurity-2025 .articles-list .article .border:after{content:'';position:absolute;top:30px;left:0;height:calc(100% - 30px);width:1px;background:#fff}.ieee-cybersecurity-2025 .articles-list .article:after{content:'';display:block;position:absolute;right:-12px;top:-6px;width:12px;height:12px;border:1px solid #fff;border-radius:50%}.ieee-cybersecurity-2025 .articles-list .article:before{content:'';position:absolute;z-index:15;top:0;left:0;width:30px;height:30px;background-image:linear-gradient(to bottom right,transparent,transparent calc(50% - 1px),#fff 50%,transparent calc(50% + 1px))}.ieee-cybersecurity-2025 .articles-list .article:nth-child(2n):after{right:auto;left:-6px;top:auto;bottom:0}.ieee-cybersecurity-2025 .articles-list .article:nth-child(2n) .border:after{height:calc(100% - 43px)}.ieee-cybersecurity-2025 .articles-list .article h4{font-size:22px;font-family:Inter,sans-serif;font-weight:500;text-align:left;margin-bottom:30px;background:none;display:block}.ieee-cybersecurity-2025 .articles-list .article .read-more{font-size:20px;font-family:Rajdhani,Helvetica Neue,Helvetica,Roboto,Arial,sans-serif;font-weight:700;color:#ffba38;text-decoration:none;text-transform:uppercase;text-align:center;position:relative;display:inline-block;padding:12px 20px;margin:auto 0 0;width:100%;clip-path:polygon(0 0,calc(100% - 20px) 0,100% 20px,100% 100px,100% 100%,0 100%);transition:all ease .3s}.ieee-cybersecurity-2025 .articles-list .article .read-more:after{content:'';position:absolute;z-index:-1;top:0;left:0;width:100%;height:100%;background:#002855;transition:all ease .3s}.ieee-cybersecurity-2025 .articles-list .article .read-more:hover{text-decoration:none;color:#2166a1}.ieee-cybersecurity-2025 .articles-list .article .read-more:hover:after{right:0;background:#ffba38}.ieee-cybersecurity-2025 .articles-list .article .img{width:100%!important;max-width:100%!important;height:auto!important}.ieee-cybersecurity-2025 .articles-list .article .img img{width:100%;aspect-ratio:1 / .85;object-fit:cover}.ieee-cybersecurity-2025 .articles-list .article .blurb{padding:30px 0 30px 30px;background:none;text-align:left;display:flex;flex-direction:column;height:100%}@media(max-width:1024px){.ieee-cybersecurity-2025 .articles-list .article .blurb{padding-bottom:0}}@media(max-width:1024px){.ieee-cybersecurity-2025 .articles-list .article{flex:0 0 calc(50% - 30px)}}@media(max-width:500px){.ieee-cybersecurity-2025 .articles-list .article{flex:0 0 100%}}.ieee-cybersecurity-2025 .slide-intro{position:absolute;z-index:6;opacity:1;width:100%;height:100%;background-color:#002855}@media(max-width:1024px){.ieee-cybersecurity-2025 .slide-intro{display:flex;flex-direction:column}}.ieee-cybersecurity-2025 .slide-intro .img-bg{position:absolute;left:0;top:0;width:100%;height:calc(100% + 237px)}.ieee-cybersecurity-2025 .slide-intro .img-bg picture img,.ieee-cybersecurity-2025 .slide-intro .img-bg video#bgvid,.ieee-cybersecurity-2025 .slide-intro .img-bg video.bgvid{width:100%;height:100%;object-fit:cover;object-position:top left}@media(max-width:1024px){.ieee-cybersecurity-2025 .slide-intro .img-bg picture img,.ieee-cybersecurity-2025 .slide-intro .img-bg video#bgvid,.ieee-cybersecurity-2025 .slide-intro .img-bg video.bgvid{object-position:center bottom}}.ieee-cybersecurity-2025 .slide-intro .img-bg:after{content:'';position:absolute;top:0;right:0;width:60%;height:100%;background:linear-gradient(to left,#0058bb,transparent);mix-blend-mode:multiply}@media(max-width:1024px){.ieee-cybersecurity-2025 .slide-intro .img-bg:after{background:linear-gradient(180deg,#0058bb 0,rgba(0,40,85,0) 57.84%);width:100%}}.ieee-cybersecurity-2025 .slide-intro .img-bg.video-cover:after{width:100%}.ieee-cybersecurity-2025 .slide-intro .scroll-down{display:inline-block;width:80px;height:80px;position:relative}.ieee-cybersecurity-2025 .slide-intro .scroll-down:after{content:'';background-image:url(../../ieee-impact-ai-autonomous-technologies-2025/images/icon-arrow-down.png);background-size:contain;background-position:center center;background-repeat:no-repeat;position:absolute;left:25%;top:45%;width:50%;height:30%;animation:jump 1.5s infinite}.ieee-cybersecurity-2025 .video-cover .videoc .bgvid.mobile-only{display:none}@media(max-width:1024px){.ieee-cybersecurity-2025 .video-cover .videoc .bgvid.mobile-only{display:block}}.ieee-cybersecurity-2025 .video-cover .videoc .bgvid.desktop-only{display:block}@media(max-width:1024px){.ieee-cybersecurity-2025 .video-cover .videoc .bgvid.desktop-only{display:none}}.ieee-cybersecurity-2025 .intro-blurb{font-size:45px;width:40%;padding-top:30px;margin-left:auto}@media(max-width:1024px){.ieee-cybersecurity-2025 .intro-blurb{width:100%;height:100%;display:flex;flex-direction:column;padding-bottom:30px}.ieee-cybersecurity-2025 .intro-blurb .scroll-down{margin:auto auto 0}}.ieee-cybersecurity-2025 .intro-blurb>*{opacity:0}.ieee-cybersecurity-2025 .intro-blurb h2{font-size:36px}@media(max-width:1024px){.ieee-cybersecurity-2025 .intro-blurb h2{font-size:28px}}.ieee-cybersecurity-2025 .intro-blurb p{font-family:Inter,sans-serif}@media(max-width:768px){.ieee-cybersecurity-2025 .intro-blurb p{font-size:16px}}.ieee-cybersecurity-2025 .slide-intro .wrapper{display:flex;align-items:center}@media(max-width:1024px){.ieee-cybersecurity-2025 .slide-intro .wrapper{align-items:flex-start}}.ieee-cybersecurity-2025 .video{position:relative}@media(max-width:768px){.ieee-cybersecurity-2025 .video{flex:0 0 100vw;overflow:hidden}}.ieee-cybersecurity-2025 video.bgvid,.ieee-cybersecurity-2025 video#bgvid{position:absolute;top:50%;left:50%;min-width:100%;min-height:100%;width:auto;height:auto;z-index:-100;-ms-transform:translateX(-50%) translateY(-50%);-moz-transform:translateX(-50%) translateY(-50%);-webkit-transform:translateX(-50%) translateY(-50%);transform:translateX(-50%) translateY(-50%);background:#002855;background-size:cover}.ieee-cybersecurity-2025 video.bgvid.mobile-only,.ieee-cybersecurity-2025 video#bgvid.mobile-only{width:100%;height:100%;object-fit:cover;object-position:top left}@media(max-width:1024px){.ieee-cybersecurity-2025 video.bgvid.mobile-only,.ieee-cybersecurity-2025 video#bgvid.mobile-only{object-position:center bottom}}.ieee-cybersecurity-2025 .back-top{position:fixed;z-index:20;bottom:0;right:0;opacity:0;transition:opacity .3s ease}.ieee-cybersecurity-2025 .back-top.show{opacity:1}.ieee-cybersecurity-2025 .footer .social{background-image:url(../../ieee-cyber-security-2025/images/footer-bg.jpg);background-position:left top;background-size:cover;padding:80px 80px 65px;display:flex;flex-direction:column;align-items:center}@media(max-width:768px){.ieee-cybersecurity-2025 .footer .social{padding:60px 20px}}.ieee-cybersecurity-2025 .footer .social h5{font-family:Poppins,sans-serif;font-size:32px;font-weight:700;color:#fff;text-transform:uppercase;margin-bottom:20px;text-align:center}@media(max-width:768px){.ieee-cybersecurity-2025 .footer .social h5{font-size:24px}}.ieee-cybersecurity-2025 .footer .social ul{display:flex;justify-content:center;flex-wrap:wrap;gap:20px 40px;margin:0}@media(max-width:768px){.ieee-cybersecurity-2025 .footer .social ul{gap:20px}}.ieee-cybersecurity-2025 .footer .social ul li{padding:0;margin:0}.ieee-cybersecurity-2025 .footer .social ul li:before{display:none}.ieee-cybersecurity-2025 .footer .social ul li a{width:60px;height:60px;line-height:60px;text-align:center;border-radius:50%;background:#fff;color:#000;font-size:30px;transition:all ease .3s}@media(max-width:768px){.ieee-cybersecurity-2025 .footer .social ul li a{width:40px;height:40px;line-height:40px;font-size:22px}}.ieee-cybersecurity-2025 .footer .social ul li a svg{width:30px;height:30px;fill:#000;margin-top:15px}@media(max-width:768px){.ieee-cybersecurity-2025 .footer .social ul li a svg{width:20px;height:20px;margin-top:10px}}.ieee-cybersecurity-2025 .footer .social ul li a:hover{background:#39a7dc;text-decoration:none}.ieee-cybersecurity-2025 .footer .social ul li a:hover svg{fill:#000}.ieee-cybersecurity-2025 .footer .site-footer{height:auto;padding:20px 0}.ieee-cybersecurity-2025 .footer .site-footer p{font-size:14px}@keyframes jump{0{top:45%}50%{top:55%}100%{top:45%}}.post-password-form p{color:#fff}