{"type":"rich","url":"https://view.ceros.com/beazley-security/a-preempta-report-1-2-2","title":"[Page 2-wForm] Cyber Risk | In Focus: Edge Device Exploitation","html":"<div style=\"position:relative;width:auto;padding:0 0 904.69%;height:0;top:0;left:0;bottom:0;right:0;margin:0;border:0 none\" id=\"experience-68346edf8a9ea\" data-aspectRatio=\"0.11053541\" data-mobile-aspectRatio=\"0.04069176\"><iframe allowfullscreen src=\"https://view.ceros.com/beazley-security/a-preempta-report-1-2-2?heightOverride=11580&mobileHeightOverride=19660\" style=\"position:absolute;top:0;left:0;bottom:0;right:0;margin:0;padding:0;border:0 none;height:1px;width:1px;min-height:100%;min-width:100%\" frameborder=\"0\" class=\"ceros-experience\" title=\"[Page 2-wForm] Cyber Risk | In Focus: Edge Device Exploitation\" scrolling=\"no\"></iframe></div><script type=\"text/javascript\" src=\"https://view.ceros.com/scroll-proxy.min.js\" data-ceros-origin-domains=\"view.ceros.com\"></script>","width":1280,"height":11580,"provider_name":"Ceros","provider_url":"https://ceros.com","version":"1.0","embedType":"full-height"}