{"type":"rich","url":"https://view.ceros.com/beazley-security/a-preempta-report-1-2-2-1","title":"[FR] [Page 2-wForm] Cyber Risk | In Focus: Edge Device Exploitation","html":"<div style=\"position:relative;width:auto;padding:0 0 920.31%;height:0;top:0;left:0;bottom:0;right:0;margin:0;border:0 none\" id=\"experience-686279721191d\" data-aspectRatio=\"0.10865874\" data-mobile-aspectRatio=\"0.03795066\"><iframe allowfullscreen src=\"https://view.ceros.com/beazley-security/a-preempta-report-1-2-2-1?heightOverride=11780&mobileHeightOverride=21080\" style=\"position:absolute;top:0;left:0;bottom:0;right:0;margin:0;padding:0;border:0 none;height:1px;width:1px;min-height:100%;min-width:100%\" frameborder=\"0\" class=\"ceros-experience\" title=\"[FR] [Page 2-wForm] Cyber Risk | In Focus: Edge Device Exploitation\" scrolling=\"no\"></iframe></div><script type=\"text/javascript\" src=\"https://view.ceros.com/scroll-proxy.min.js\" data-ceros-origin-domains=\"view.ceros.com\"></script>","width":1280,"height":11780,"provider_name":"Ceros","provider_url":"https://ceros.com","version":"1.0","embedType":"full-height"}