Debug Information
Array
(
[meilisearch] => Array
(
[url] => https://msin.fadunews.in/indexes/zipri/search
[http_code] => 200
[response] => {"hits":[],"query":"Mitigating-Vulnerabilities","processingTimeMs":4,"limit":3,"offset":0,"estimatedTotalHits":0}
[curl_error] =>
[parsed] => Array
(
[hits] => Array
(
)
[query] => Mitigating-Vulnerabilities
[processingTimeMs] => 4
[limit] => 3
[offset] => 0
[estimatedTotalHits] => 0
)
)
[image_search] => Array
(
[url] => http://206.189.178.169:3001/?freshness=All&show=1&q=Mitigating-Vulnerabilities+INR+loc%3Ain
[http_code] => 200
[response] => {"name":"mitigating-vulnerabilities inr loc:in","totalEstimatedMatches":259,"nextOffset":120,"currentOffset":0,"value":{"5F9D9FB9DD8C747342CCFE05591104F96426A410":{"name":"INR Full Form: What is full form of INR?","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.-HbYAKjSJ-4PC_ZocKUqaAHaEU?pid=Api","datePublished":"2022-11-05T12:08:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://st.adda247.com/https://wpassets.adda247.com/wp-content/uploads/multisite/2022/11/05144815/What-is-INR.png","hostPageUrl":"https://www.bankersadda.com/inr-full-form/","contentSize":"35329 B","width":720,"height":420,"cDNContentUrl":"https://th.bing.com/th/id/R.f876d800a8d227ee0f0bf66870a52a68?rik=9dn5m93IRzckzA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"014A62469F40119550EFCC243747C8DD9BF9D9F5","accentColor":"B71414"},"472CA413B663384E22D3DB4D66240A4631A4B138":{"name":"How to mitigate risks in Business? - Enterslice Private Limited","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.owf7uZo3sdWe_1tcx7XuAgHaE2?pid=Api","datePublished":"2021-03-31T06:51:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://enterslice.com/learning/wp-content/uploads/2021/03/image001-58.png","hostPageUrl":"https://enterslice.com/learning/how-to-mitigate-risks-in-business/","contentSize":"48298 B","width":1006,"height":660,"cDNContentUrl":"https://th.bing.com/th/id/R.a307fbb99a37b1d59eff5b5cc7b5ee02?rik=dMJKMWs2g%2bQiPQ&pid=ImgRaw&r=0","isTransparent":true,"imageId":"831B4A1364A04266D4BD3D22E483366B314AC274","accentColor":"029E94"},"EB082A4D62DD3E745D3492781AFD11C52FDEABA5":{"name":"Insurance to Mitigate Vulnerabilities","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.Lxh1VC5lGKrQk0u-V3tc5AHaEK?pid=Api","datePublished":"2024-10-19T07:33:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.studyiq.com/articles/wp-content/uploads/2024/10/18175806/Insurance-to-Mitigate-Vulnerabilities-blog.png","hostPageUrl":"https://www.studyiq.com/articles/insurance-to-mitigate-vulnerabilities/","contentSize":"627544 B","width":1280,"height":720,"cDNContentUrl":"https://th.bing.com/th/id/R.2f1875542e6518aad0934bbe577b5ce4?rik=voCi1Cbd40fVQw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"5ABAEDF25C11DFA1872943D547E3DD26D4A280BE","accentColor":"690F0F"},"9B67AEEA4AB579B2D331D500CC6E326A45C7CE1F":{"name":"ED 25-02: Mitigate Microsoft Exchange Vulnerability | CISA","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.fJ-NZUTZOPstRkUnnA85ZwHaEK?pid=Api","datePublished":"2025-08-07T17:48:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.cisa.gov/sites/default/files/styles/large/public/2025-08/WEB%2025-0280%20ED%2025-02_08062026_STANDARD%20WEB%20-%20700x394.jpg?itok=PhC8dmg0","hostPageUrl":"https://www.cisa.gov/news-events/directives/ed-25-02-mitigate-microsoft-exchange-vulnerability","contentSize":"77087 B","width":1024,"height":576,"cDNContentUrl":"https://th.bing.com/th/id/R.7c9f8d6544d938fb2d4645279c0f3967?rik=uXbqrqRblys9Ew&pid=ImgRaw&r=0","isTransparent":false,"imageId":"F1EC7C54A623E6CC005D133D2B975BA4AEEA76B9","accentColor":"AF1C2E"},"D97F01AE233860EB47FB91979665F1616F1A6422":{"name":"Green and Blue Infrastructure as Nature-Based Better Preparedness ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.lNRC04BiQZdfRwZhVwIm5QHaDp?pid=Api","datePublished":"2022-12-02T17:56:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.mdpi.com/sustainability/sustainability-14-16155/article_deploy/html/images/sustainability-14-16155-g001.png","hostPageUrl":"https://www.mdpi.com/2071-1050/14/23/16155","contentSize":"342821 B","width":3095,"height":1524,"cDNContentUrl":"https://th.bing.com/th/id/R.94d442d3806241975f470661570226e5?rik=nfcQ6jKDBr50vw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"2246A1F6161F56697919BF74BE068332EA10F79D","accentColor":"014A95"},"B33F22511E0499B42D4B6CE4B3B78B25238DC30B":{"name":"A guide to implement effective cloud vulnerability scanning | nasscom ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.1vF25VD0pQBnph3u_9UWJAHaEo?pid=Api","datePublished":"2023-05-09T08:58:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://community.nasscom.in/sites/default/files/media/images/Secure-your-cloud-with-vulnerability-scanning-Nasscom.jpg","hostPageUrl":"https://community.nasscom.in/communities/cyber-security-privacy/guide-implement-effective-cloud-vulnerability-scanning","contentSize":"258453 B","width":960,"height":600,"cDNContentUrl":"https://th.bing.com/th/id/R.d6f176e550f4a50067a61deeffd51624?rik=O%2fMiFeFAmUvStA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"B03CD83252B87B3B4EC6B4D24B9940E11522F33B","accentColor":"C97E02"},"122F549128D6A6F12EB2D322FBE808F5568EBFD0":{"name":"Protect Edge","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.avnfA0Yfgnid7OWLByHr8AHaCL?pid=Api","datePublished":"2024-06-14T04:34:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.protectedge.in/img/vulnerability1.jpg","hostPageUrl":"https://www.protectedge.in/security_assessment_services.html","contentSize":"92323 B","width":965,"height":285,"cDNContentUrl":"https://th.bing.com/th/id/R.6af9df03461f82789dece58b0721ebf0?rik=IfJFGYJtah%2fiKw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"0DFBE8655F808EBF223D2BE21F6A6D821945F221","accentColor":"0C91BF"},"52393C74378345BFCEFF6D41DCC644A9A6502A46":{"name":"Natural Disasters—Origins, Impacts, Management","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.LMyEFNAFLK53hN2_K8p6jwHaFY?pid=Api","datePublished":"2021-10-30T09:14:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://pub.mdpi-res.com/encyclopedia/encyclopedia-01-00084/article_deploy/html/images/encyclopedia-01-00084-g008.png?1669875133","hostPageUrl":"https://www.mdpi.com/2673-8392/1/4/84","contentSize":"943601 B","width":2578,"height":1872,"cDNContentUrl":"https://th.bing.com/th/id/R.2ccc8414d0052cae7784ddbf2bca7a8f?rik=JZPDR3M4VPvs%2fw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"64A2056A9A446CCD14D6FFECFB54387347C39325","accentColor":"CA9901"},"0D246E7A899F569829A45FCAEA3F9D112D7641BE":{"name":"Vulnerability Management Process :: Arpit Mittal","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.GvnB_qGlauwMMaWsQRznNgHaEK?pid=Api","datePublished":"2023-09-23T09:39:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://0xarpit.in/VM_hu01a84c255eee042d17f08865a630298a_102629_800x600_fit_box_3.png","hostPageUrl":"https://0xarpit.in/posts/2023/04/vulnerability-management-process/","contentSize":"34876 B","width":800,"height":450,"cDNContentUrl":"https://th.bing.com/th/id/R.1af9c1fea1a56aec0c31a5ac411ce736?rik=0ELmp5j5ZYmSSg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"EB1467D211D9F3AEACF54A928965F998A7E642D0","accentColor":"0257C9"},"056EEB5B526FA6BDF050C5CC9E69A5A966F0AE28":{"name":"How ESG can Mitigate Risks & Enhance Returns for Investors - Enterslice","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.Cpxq4jpgEeaejkEdfXeZeAHaD4?pid=Api","datePublished":"2023-04-07T10:10:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://enterslice.com/learning/wp-content/uploads/2023/04/MicrosoftTeams-image-81.jpg","hostPageUrl":"https://enterslice.com/learning/how-esg-can-mitigate-risks-and-enhance-returns-for-investors/","contentSize":"66342 B","width":920,"height":483,"cDNContentUrl":"https://th.bing.com/th/id/R.0a9c6ae23a6011e69e8e411d7d779978?rik=UOa%2btSX2atsPBQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"82EA0F669A5A96E9CC5C050FDB6AF625B5BEE650","accentColor":"084BC3"},"4596CEC011C63C50B424DFDD018C6E8C6A9D79B7":{"name":"CVE-2025-47956: Understanding and Mitigating the Windows Security App ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.LpdJOPHx_eUS0FLccV7WtAHaLH?pid=Api","datePublished":"2025-07-21T01:55:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://cpanel.ogma.in/static/img/cato-sase.png","hostPageUrl":"https://cpanel.ogma.in/cve-2025-47956-understanding-and-mitigating-the-windows-security-app-spoofing-vulnerability","contentSize":"1937709 B","width":1024,"height":1536,"cDNContentUrl":"https://th.bing.com/th/id/R.2e974938f1f1fde512d052dc715ed6b4?rik=VGnsDBFswwVLQg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"7B97D9A6C8E6C810DDFD424B05C36C110CEC6954","accentColor":"001F34"},"1A860B9D6027D090677D31A7625FC9012582B35D":{"name":"15 Ways to Minimize Financial Risks in Business | NetSuite","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP._Gv5QF6PgUilJ7kFjr0sJQHaFd?pid=Api","datePublished":"2023-07-28T18:55:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.netsuite.com/portal/assets/img/business-articles/financial-management/infographic-mitigate-financial-risk.jpg","hostPageUrl":"https://www.netsuite.com/portal/resource/articles/financial-management/minimize-financial-risks.shtml","contentSize":"184357 B","width":1930,"height":1422,"cDNContentUrl":"https://th.bing.com/th/id/R.fc6bf9405e8f8148a527b9058ebd2c25?rik=oWiw2QZyDQl21w&pid=ImgRaw&r=0","isTransparent":false,"imageId":"D53B2852109CF5267A13D776090D7206D9B068A1","accentColor":"BC2E0F"},"A38952FFAE18525569E12DB7836CE8688434118E":{"name":"Mitigating Packet Reordering - NS2 Projects | S-Logix","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.pFfV19rBxfOSnbVA6QuqUAHaDN?pid=Api","datePublished":"2022-05-07T16:29:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://slogix.in/images/wireless-sensor-networks/mitigating-packet-reordering-for-random-packet-spraying-in-data-center-networks.jpg","hostPageUrl":"https://slogix.in/wireless-sensor-networks/mitigating-packet-reordering-for-random-packet-spraying-in-data-center-networks/","contentSize":"63233 B","width":830,"height":360,"cDNContentUrl":"https://th.bing.com/th/id/R.a457d5d7dac1c5f3929db540e90baa50?rik=Opgl%2f%2bqBJVWWHg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"E8114348868EC6387BD21E96552581EAFF25983A","accentColor":"004A95"},"AF442615FBA968A9C79AF1331C4305E639A3B42E":{"name":"A Socio-Ecological Approach to Mitigating Wildfire Vulnerability in the ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.5cvR9SjoLIhcEnyIsn1qPAHaFG?pid=Api","datePublished":"2019-02-28T12:09:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://pub.mdpi-res.com/fire/fire-02-00009/article_deploy/html/images/fire-02-00009-g002.png?1571072557","hostPageUrl":"https://www.mdpi.com/2571-6255/2/1/9","contentSize":"507954 B","width":3475,"height":2390,"cDNContentUrl":"https://th.bing.com/th/id/R.e5cbd1f528e82c885c127c88b27d6a3c?rik=%2bkRiUb%2bahpp8qQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"E24B3A936E5034C1331FA97C9A869ABF516244FA","accentColor":"3A3A3A"},"4B64B874FF13117629CEBBC0D482F00B1A2DC44F":{"name":"Why Air Quality deserves more attention | CEEW","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.f2UWhBTCjIgj2f7qe7gL7gHaDq?pid=Api","datePublished":"2022-06-09T10:47:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.ceew.in/sites/default/files/mitigation-infographic.png","hostPageUrl":"https://www.ceew.in/why-air-quality-deserves-more-attention","contentSize":"240994 B","width":2732,"height":1354,"cDNContentUrl":"https://th.bing.com/th/id/R.7f65168414c28c8823d9feea7bb80bee?rik=tEaLR%2f8xEWeS7A&pid=ImgRaw&r=0","isTransparent":true,"imageId":"F44CD2A1B00F284D0CBBEC92671131FF478B46B4","accentColor":"2C839F"},"24E39186CE784150BCC9AFF5FFA17C4D0F3A52A1":{"name":"Setting up a Broken Web Application pentesting lab Environment","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.UGnysvFXu-8LbZI5feyLkwHaDJ?pid=Api","datePublished":"2024-02-28T00:05:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwYgiiCAAedFEtChocFP0IHEHXO34vNHf7G_B_jOWQJWTtlMk-E83I9lm0Pvlu092B64Saip9Wa5_SEda-_nROlBFHRK3kPI-KBULrZ9tT_Zxj7taX-mqpWhwboGV47pHZEx99XHGVfnV7wfYuNgNEYTa1hv3pmHLgEN4GgEZkR1p7EuvIpGVqhYnh-r_n/s1881/Picture10.png","hostPageUrl":"https://www.cybersecmastery.in/2023/07/setting-up-broken-web-application.html","contentSize":"418981 B","width":1881,"height":800,"cDNContentUrl":"https://th.bing.com/th/id/R.5069f2b2f157bbef0b6d92397dec8b93?rik=Qj4ZaOyHFAXLnA&pid=ImgRaw&r=0","isTransparent":true,"imageId":"1A25A3F0D4C71AFF5FFA9CCB051487EC68193E42","accentColor":"1F3663"},"E5DDA17B954637CE0DDD6D41DCC644A9A6502A46":{"name":"Natural Disasters—Origins, Impacts, Management","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.Jq7088UNPZvXC74I-qtMawHaEX?pid=Api","datePublished":"2021-10-30T09:14:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://pub.mdpi-res.com/encyclopedia/encyclopedia-01-00084/article_deploy/html/images/encyclopedia-01-00084-g001.png?1669875138","hostPageUrl":"https://www.mdpi.com/2673-8392/1/4/84","contentSize":"2021933 B","width":3399,"height":2001,"cDNContentUrl":"https://th.bing.com/th/id/R.26aef4f3c50d3d9bd70bbe08faab4c6b?rik=Xt0at1lkc%2bzQ3Q&pid=ImgRaw&r=0","isTransparent":false,"imageId":"64A2056A9A446CCD14D6DDD0EC736459B71ADD5E","accentColor":"C40707"},"78E6495267EF74A82106DFDD018C6E8C6A9D79B7":{"name":"CVE-2025-47956: Understanding and Mitigating the Windows Security App ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.cuzLtZmfzOSOtWrmGwaHcwHaHa?pid=Api","datePublished":"2025-07-21T01:55:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://cpanel.ogma.in/static/img/bas-ad.png","hostPageUrl":"https://cpanel.ogma.in/cve-2025-47956-understanding-and-mitigating-the-windows-security-app-spoofing-vulnerability","contentSize":"256034 B","width":540,"height":540,"cDNContentUrl":"https://th.bing.com/th/id/R.72eccbb5999fcce48eb56ae61b068773?rik=h26UJXb%2bR4oSYA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"7B97D9A6C8E6C810DDFD60128A47FE7625946E87","accentColor":"6B19B2"},"BE9399325E00C821704DFAB63157593B278F85EC":{"name":"Understanding and Mitigating CVE-2025-26679: RPC Endpoint Mapper ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.8KxZr-HRUiRp-V0Ls8yf4AHaLH?pid=Api","datePublished":"2025-04-27T10:57:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.ogma.in/static/img/cato-fwaas.png","hostPageUrl":"https://ogma.in/understanding-and-mitigating-cve-2025-26679-rpc-endpoint-mapper-service-vulnerability","contentSize":"2371872 B","width":1024,"height":1536,"cDNContentUrl":"https://th.bing.com/th/id/R.f0ac59afe1d1522469f95d0bb3cc9fe0?rik=6zmZI%2bUAjBIH1A&pid=ImgRaw&r=0","isTransparent":false,"imageId":"CE58F872B39575136BAFD407128C00E5239939EB","accentColor":"CBA000"},"BBD1F68B7A020B987D11ABB12F19C48B43288CB3":{"name":"Understanding and Mitigating CVE-2025-32433: Erlang/OTP SSH Vulnerability","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.0gbq3b7rv2eVQ5QZL4ESGwHaHa?pid=Api","datePublished":"2025-04-20T18:50:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.ogma.in/static/img/renew-fortigate.png","hostPageUrl":"https://www.ogma.in/understanding-and-mitigating-cve-2025-32433-erlang-otp-ssh-vulnerability","contentSize":"215044 B","width":540,"height":540,"cDNContentUrl":"https://th.bing.com/th/id/R.d206eaddbeebbf67954394192f81121b?rik=ux1vuKcgsInXEQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"3BC88234B84C91F21BBA11D789B020A7B86F1DBB","accentColor":"C90202"},"5E155E515B319A3E3F9EAFDF292B19128B2D8FC7":{"name":"Mitigating Bias in Artificial Intelligence","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.mn3zy1WnekcDbpTf6YGohgAAAA?pid=Api","datePublished":"2021-10-19T16:20:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://d12aarmt01l54a.cloudfront.net/cms/images/Media-20210901112956/288-305.png","hostPageUrl":"https://indiaai.gov.in/research-reports/mitigating-bias-in-artificial-intelligence","contentSize":"12359 B","width":288,"height":305,"cDNContentUrl":"https://th.bing.com/th/id/R.9a7df3cb55a77a47036e94dfe981a886?rik=5VHlFbUTqePz6Q&pid=ImgRaw&r=0","isTransparent":false,"imageId":"7CF8D2B82191B292FDFAE9F3E3A913B515E551E5","accentColor":"1881B3"},"1CEEE659B19352989E542322383C2ABA3779C56E":{"name":"Hackers target Microsoft SharePoint again with critical zero-days, over ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.ANbKgMW4Ch5LNK7mDLnsFwHaEN?pid=Api","datePublished":"2025-07-21T04:37:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://static.digit.in/Microsoft-SharePoint-Vulnerability-Mitigation-1024x582.png","hostPageUrl":"https://www.digit.in/news/general/hackers-target-microsoft-sharepoint-again-with-critical-zero-days-over-85-servers-hit.html","contentSize":"66340 B","width":1024,"height":582,"cDNContentUrl":"https://th.bing.com/th/id/R.00d6ca80c5b80a1e4b34aee60cb9ec17?rik=we5ulRs5JYnpRQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"E65C9773ABA2C383223245E98925391B956EEEC1","accentColor":"3A6E91"},"5CF98614BB72FED82E6410D4D17B68C16B6961CE":{"name":"Case Study - : Mitigating Cybersecurity Threats through Ethical Hacking ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.-rH2TtYzC3gTSybAUX0-VAHaKe?pid=Api","datePublished":"2023-08-31T04:38:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://d20ohkaloyme4g.cloudfront.net/img/document_thumbnails/0422e5c52c56307f813e62a2d12f366c/thumb_1200_1698.png","hostPageUrl":"https://www.studocu.com/in/document/dr-babasaheb-ambedkar-marathwada-university/ethical-hacking/case-study-mitigating-cybersecurity-threats-through-ethical-hacking-and-vulnerability/68046951","contentSize":"204030 B","width":1200,"height":1698,"cDNContentUrl":"https://th.bing.com/th/id/R.fab1f64ed6330b78134b26c0517d3e54?rik=xZ9oQbsn743iRg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"EC1696B61C86B71D4D0146E28DEF27BB41689FC5","accentColor":"666666"},"3FA8603EDD0106056322BF9F3851BF533319824F":{"name":"TSA developed the Transportation Worker Identification Credential (TWIC ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.7SBa22i2eM2YNlzpmBheSQAAAA?pid=Api","datePublished":"2023-10-15T15:57:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.pdffiller.com/preview/426/522/426522968.png","hostPageUrl":"https://www.pdffiller.com/426522968--TSA-developed-the-Transportation-Worker-Identification-Credential-TWIC-program-to-mitigate-threats-and-vulnerabilities-in-vessels-and-facilities-regulated-pursuant-to-the-Maritime-Transportation-Security-Act-of-2002-MT","contentSize":"16614 B","width":298,"height":386,"cDNContentUrl":"https://th.bing.com/th/id/R.ed205adb68b678cd98365ce998185e49?rik=84oG490QYFA2Ig&pid=ImgRaw&r=0","isTransparent":false,"imageId":"F428913335FB1583F9FB2236506010DDE3068AF3","accentColor":"474747"},"F84C87D9D01254A9EA7DFAB63157593B278F85EC":{"name":"Understanding and Mitigating CVE-2025-26679: RPC Endpoint Mapper ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.6IvgPis9_b2diMiqOIVEaQHaLH?pid=Api","datePublished":"2025-04-27T10:57:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.ogma.in/static/img/cato-ztna.png","hostPageUrl":"https://ogma.in/understanding-and-mitigating-cve-2025-26679-rpc-endpoint-mapper-service-vulnerability","contentSize":"2187720 B","width":1024,"height":1536,"cDNContentUrl":"https://th.bing.com/th/id/R.e88be03e2b3dfdbd9d88c8aa38854469?rik=j8R4nQ0hRZqu1w&pid=ImgRaw&r=0","isTransparent":false,"imageId":"CE58F872B39575136BAFD7AE9A45210D9D78C48F","accentColor":"014961"},"5BFD3CC13C9789179EF2498033733A34C0CDDB46":{"name":"Mitigating Vulnerability to High and Volatile Oil Prices (Directions in ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.GbSN2F7zS3W1sBFxGQcI8QAAAA?pid=Api","datePublished":"2020-09-21T12:09:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/51pwDu0u85L._SX342_SY445_.jpg","hostPageUrl":"https://www.amazon.in/Mitigating-Vulnerability-Volatile-Directions-Development-ebook/dp/B008EH8DRS","contentSize":"17023 B","width":342,"height":443,"cDNContentUrl":"https://th.bing.com/th/id/R.19b48dd85ef34b75b5b01171190708f1?rik=td%2fDHMN5mHHpLw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"64BDDC0C43A3373308942FE9719879C31CC3DFB5","accentColor":"BE5E0D"},"678244D9BAD57A6FFBFD6F23C8FBC210DB2A7335":{"name":"Techniques for Disaster Risk Management and Mitigation (Geophysical ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.8qYjRoftrFHtOSgzIifesQAAAA?pid=Api","datePublished":"2025-01-23T23:45:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/51Efwkn2tyL.jpg","hostPageUrl":"https://www.amazon.in/Techniques-Management-Mitigation-Geophysical-Monograph-ebook/dp/B087X54KX3","contentSize":"43621 B","width":371,"height":500,"cDNContentUrl":"https://th.bing.com/th/id/R.f2a6234687edac51ed3928332227deb1?rik=dihEnatdp%2fa%2f3w&pid=ImgRaw&r=0","isTransparent":false,"imageId":"5337A2BD012CBF8C32F6DFBFF6A75DAB9D442876","accentColor":"C89603"},"DA057193C0A24066C53811B165C9B3147699E985":{"name":"Risk Mitigating Strategies For Walled City Ahmedabad | CEPT - Portfolio","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.INrJRaNiY_oE3jrMf7STGgAAAA?pid=Api","datePublished":"2021-06-10T23:46:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://portfolio.cept.ac.in/assets/projects/feature_images/2021/featureimage_210512014715_2080572731.jpeg","hostPageUrl":"https://portfolio.cept.ac.in/2021/S/fp/city-infrastructure-plan-ui4005-spring-2021/risk-mitigating-strategies-for-walled-city-ahmedabad-spring-2021-pui20213","contentSize":"60322 B","width":334,"height":286,"cDNContentUrl":"https://th.bing.com/th/id/R.20dac945a36263fa04de3acc7fb4931a?rik=rVAXOQwqBGZcgw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"589E9967413B9C561B11835C66042A0C391750AD","accentColor":"666666"},"C9C4A38B161FB71241E2F1331C4305E639A3B42E":{"name":"A Socio-Ecological Approach to Mitigating Wildfire Vulnerability in the ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.-p7P9ntXIiKqx2zFe8N5SQHaEn?pid=Api","datePublished":"2019-02-28T12:09:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.mdpi.com/fire/fire-02-00009/article_deploy/html/images/fire-02-00009-g007.png","hostPageUrl":"https://www.mdpi.com/2571-6255/2/1/9","contentSize":"3533694 B","width":3760,"height":2346,"cDNContentUrl":"https://th.bing.com/th/id/R.fa9ecff67b572222aac76cc57bc37949?rik=nEw6uGHxeyEULg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"E24B3A936E5034C1331F2E14217BF161B83A4C9C","accentColor":"C84903"},"C3FEF0372FA6DBE634525CF4A248B930635B755F":{"name":"Climate Change Adaptation and Mitigation, Types, Strategies","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.tL9y1SIa0B9Y4VsPOgYr7AHaEK?pid=Api","datePublished":"2023-10-11T10:32:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.studyiq.com/articles/wp-content/uploads/2023/10/11151914/Climate-Change-Adaptation-and-Mitigation-1.jpg","hostPageUrl":"https://www.studyiq.com/articles/climate-change-adaptation-and-mitigation/","contentSize":"757505 B","width":1280,"height":720,"cDNContentUrl":"https://th.bing.com/th/id/R.b4bf72d5221ad01f58e15b0f3a062bec?rik=PO8Pc%2fJqvW5DJQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"F557B536039B842A4FC525436EBD6AF2730FEF3C","accentColor":"807A27"},"63528941DC5FC1CD01D3F1331C4305E639A3B42E":{"name":"A Socio-Ecological Approach to Mitigating Wildfire Vulnerability in the ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.MgFm5JQwgKMQcG6zKmt3eAHaEM?pid=Api","datePublished":"2019-02-28T12:09:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.mdpi.com/fire/fire-02-00009/article_deploy/html/images/fire-02-00009-g001-550.jpg","hostPageUrl":"https://www.mdpi.com/2571-6255/2/1/9","contentSize":"34316 B","width":550,"height":312,"cDNContentUrl":"https://th.bing.com/th/id/R.320166e4943080a310706eb32a6b7778?rik=NiWYFM31HNwQPQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"E24B3A936E5034C1331F3D10DC1CF5CD14982536","accentColor":"C0C308"},"DCFCD7E48521F2858318232B8DCD1B0F4F1772CC":{"name":"What are mitigating circumstances Doc Template | pdfFiller","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.j4zw_eX6VFxzm-7VFE5NawAAAA?pid=Api","datePublished":"2020-11-19T15:06:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.pdffiller.com/preview/423/578/423578502.png","hostPageUrl":"https://www.pdffiller.com/423578502--What-are-mitigating-circumstances-","contentSize":"8618 B","width":298,"height":386,"cDNContentUrl":"https://th.bing.com/th/id/R.8f8cf0fde5fa545c739beed5144e4d6b?rik=zc99TlgSL1g4gQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"CC2771F4F0B1DCD8B2328138582F12584E7DCFCD","accentColor":"676465"},"C9102C6DE7C7F343AA365009EC026C2F1559E663":{"name":"Mitigating Circumstances for University Doc Template | pdfFiller","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.-zcZzyOQr9E-6gh9wXBRhgAAAA?pid=Api","datePublished":"2023-11-13T03:09:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.pdffiller.com/preview/693/459/693459143.png","hostPageUrl":"https://www.pdffiller.com/693459143--Mitigating-Circumstances-Form-for-University-","contentSize":"26472 B","width":298,"height":386,"cDNContentUrl":"https://th.bing.com/th/id/R.fb3719cf2390afd13eea087dc1705186?rik=nAHC1n58PzSqYw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"366E9551F2C620CE900563AA343F7C7ED6C2019C","accentColor":"0202C9"},"D6645F9DEA210B68710882CADC93181F51B4A459":{"name":"Vulnerability of a Northeast Mediterranean Island to Soil Loss. Can ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.lxC6gRNLt7V25Bx-GDXdqQHaDq?pid=Api","datePublished":"2019-07-18T09:40:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://pub.mdpi-res.com/water/water-11-01491/article_deploy/html/images/water-11-01491-g005.png?1564756217","hostPageUrl":"https://www.mdpi.com/2073-4441/11/7/1491","contentSize":"432527 B","width":2935,"height":1453,"cDNContentUrl":"https://th.bing.com/th/id/R.9710ba81134bb7b576e41c7e1835dda9?rik=bUb12a4SsIYXgA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"954A4B15F18139CDAC28801786B012AED9F5466D","accentColor":"158BB1"},"24069108ECD8970C35FBF1331C4305E639A3B42E":{"name":"A Socio-Ecological Approach to Mitigating Wildfire Vulnerability in the ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.JR1uN4KLW_-Lg8NORpl3UgHaEr?pid=Api","datePublished":"2019-02-28T12:09:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.mdpi.com/fire/fire-02-00009/article_deploy/html/images/fire-02-00009-g005-550.jpg","hostPageUrl":"https://www.mdpi.com/2571-6255/2/1/9","contentSize":"58720 B","width":550,"height":348,"cDNContentUrl":"https://th.bing.com/th/id/R.251d6e37828b5bff8b83c34e46997752?rik=QmAZgM6NecBTvw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"E24B3A936E5034C1331FBF53C0798DCE80196042","accentColor":"B98E12"},"AF978F96F10B922DD4B33415F79C4DC5661A2F92":{"name":"SAPSMART {Mitigating Security Vulnerabilities on Google Cloud Platform ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.9WbYmxKRTSdbZ2G9k7PO9QAAAA?pid=Api","datePublished":"2022-05-18T07:51:00.0000000Z","isFamilyFriendly":true,"contentUrl":"http://rukmini1.flixcart.com/image/300/300/kqy3rm80/educational-media/v/a/o/mitigating-security-vulnerabilities-on-google-cloud-platform-original-imag4u7szt2csnj2.jpeg","hostPageUrl":"https://www.flipkart.com/sapsmart-mitigating-security-vulnerabilities-google-cloud-platform-certificate/p/itm8f693b049a57c","contentSize":"45085 B","width":300,"height":300,"cDNContentUrl":"https://th.bing.com/th/id/R.f566d89b12914d275b6761bd93b3cef5?rik=%2bnn4aR%2bwKdJNOw&riu=http%3a%2f%2frukmini1.flixcart.com%2fimage%2f300%2f300%2fkqy3rm80%2feducational-media%2fv%2fa%2fo%2fmitigating-security-vulnerabilities-on-google-cloud-platform-original-imag4u7szt2csnj2.jpeg&ehk=LwdXEQGBLbfa8WpyZX4KKd49Tt%2fTo8IiCBAI63SJr8Q%3d&risl=&pid=ImgRaw&r=0","isTransparent":false,"imageId":"29F2A1665CD4C97F51433B4DD229B01F69F879FA","accentColor":"A35228"},"E317EF534C6DDBE71580AB3E23F885AFF485DE50":{"name":"ED 26-01: Mitigate Vulnerabilities in F5 Devices | CISA","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.N-bcgzrKZQl_r2F_fdapYQAAAA?pid=Api","datePublished":"2025-10-15T15:59:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.cisa.gov/profiles/cisad8_gov/themes/custom/gesso/dist/images/us_flag_small.png","hostPageUrl":"https://www.cisa.gov/news-events/directives/ed-26-01-mitigate-vulnerabilities-f5-devices","contentSize":"545 B","width":64,"height":44,"cDNContentUrl":"https://th.bing.com/th/id/R.37e6dc833aca65097faf617f7dd6a961?rik=PnH%2bNcTWvX5RCA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"05ED584FFA588F32E3BA08517EBDD6C435FE713E","accentColor":"B23219"},"F4313791C7C339B66BF8AB3E23F885AFF485DE50":{"name":"ED 26-01: Mitigate Vulnerabilities in F5 Devices | CISA","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.c6vYZiTKTAmjgOFNX2DiWAAAAA?pid=Api","datePublished":"2025-10-15T15:59:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.cisa.gov/profiles/cisad8_gov/themes/custom/gesso/dist/images/icon-https.svg","hostPageUrl":"https://www.cisa.gov/news-events/directives/ed-26-01-mitigate-vulnerabilities-f5-devices","contentSize":"720 B","width":64,"height":64,"cDNContentUrl":"https://th.bing.com/th/id/R.73abd86624ca4c09a380e14d5f60e258?rik=TxNzGXw8k2u2jw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"05ED584FFA588F32E3BA8FB66B933C7C1973134F","accentColor":"719F29"},"AA066304552D2D327580ABB12F19C48B43288CB3":{"name":"Understanding and Mitigating CVE-2025-32433: Erlang/OTP SSH Vulnerability","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.XJ23FU6052RBURRPUYnl-wHaHa?pid=Api","datePublished":"2025-04-20T18:50:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.ogma.in/static/img/managed-soc.png","hostPageUrl":"https://www.ogma.in/understanding-and-mitigating-cve-2025-32433-erlang-otp-ssh-vulnerability","contentSize":"316194 B","width":540,"height":540,"cDNContentUrl":"https://th.bing.com/th/id/R.5c9db7154eb4e7644151144f5189e5fb?rik=qmA2QFXS0iNXCA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"3BC88234B84C91F21BBA085723D2D255403660AA","accentColor":"099DC2"},"B1F06B8B88BC63166D9A33E21111C158940FF9FF":{"name":"Understanding and Mitigating CVE-2025-32728: OpenSSH DisableForwarding ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.VZGMBhcHccyxD9pES7DtEgAAAA?pid=Api","datePublished":"2025-05-13T21:13:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.ogma.in/static/img/ogma-logo-white.png","hostPageUrl":"https://ogma.in/understanding-and-mitigating-cve-2025-32728-openssh-disableforwarding-directive-vulnerability","contentSize":"16961 B","width":283,"height":106,"cDNContentUrl":"https://th.bing.com/th/id/R.55918c06170771ccb10fda444bb0ed12?rik=Gw%2b2uIjLNmHWqQ&pid=ImgRaw&r=0","isTransparent":true,"imageId":"FF9FF049851C11112E33A9D66136CB88B8B60F1B","accentColor":"666666"},"53BCE98C2A67BA8801A5BEB790468781B9F74930":{"name":"Government has an 'important warning' on Zoom calls - Times of India","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.DRXJa22aIqKRfEfaJERmRQAAAA?pid=Api","datePublished":"2024-04-19T07:54:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://static.toiimg.com/thumb/msid-109427912,imgsize-421532,width-400,resizemode-4/109427912.jpg","hostPageUrl":"https://timesofindia.indiatimes.com/technology/tech-news/government-has-issued-an-important-warning-for-zoom-video-conferencing-app-details/articleshow/109427912.cms","contentSize":"52709 B","width":400,"height":300,"cDNContentUrl":"https://th.bing.com/th/id/R.0d15c96b6d9a22a2917c47da24446645?rik=NcueyKJ2q4gQWg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"03947F9B187864097BEB5A1088AB76A2C89ECB35","accentColor":"0048CC"},"0F222900B18F37F5591CAB3E23F885AFF485DE50":{"name":"ED 26-01: Mitigate Vulnerabilities in F5 Devices | CISA","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.QrSsRoWXI5o9ltsEw2MnfgAAAA?pid=Api","datePublished":"2025-10-15T15:59:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.cisa.gov/profiles/cisad8_gov/themes/custom/gesso/dist/images/icon-dot-gov.svg","hostPageUrl":"https://www.cisa.gov/news-events/directives/ed-26-01-mitigate-vulnerabilities-f5-devices","contentSize":"800 B","width":64,"height":64,"cDNContentUrl":"https://th.bing.com/th/id/R.42b4ac468597239a3d96db04c363277e?rik=8CKSABv4c1%2bVwQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"05ED584FFA588F32E3BAC1955F73F81B009222F0","accentColor":"206AAB"},"C6605BDD93E6ED42E1708BE4B685A2EFB273B8C6":{"name":"Home- AITECH LABS","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.PAjPX7xaMVasih1mgJSEHQAAAA?pid=Api","datePublished":"2022-06-22T05:03:00.0000000Z","isFamilyFriendly":true,"contentUrl":"http://aitechlabs.co.in/images/home/harness1.png","hostPageUrl":"http://aitechlabs.co.in/","contentSize":"17358 B","width":353,"height":275,"cDNContentUrl":"https://th.bing.com/th/id/R.3c08cf5fbc5a3156ac8a1d668094841d?rik=bAa13Tlu3iQeBw&riu=http%3a%2f%2faitechlabs.co.in%2fimages%2fhome%2fharness1.png&ehk=cG2z526IUVHwCk5VkjuNE%2fMuI5NnHrcD2dWU9MDUH00%3d&risl=&pid=ImgRaw&r=0","isTransparent":true,"imageId":"6C8B372BFE2A586B4EB8071E24DE6E39DDB5066C","accentColor":"4401CA"},"682376800113B4205C40D501A4B9816F322CFB5E":{"name":"Exploit Forge","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.7r2gvPXTGqwZ1g704hjAowHaGW?pid=Api","datePublished":"2023-06-03T21:11:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZNLcSaUe_tKv1lvCjqe1BrAlJhlohtmWNaRcNW4csb3uof2WCp_WWWiL97wlwhrAwelNtyh3ry8C8G1JbLSnEs9bpE-k5RJ_Ox27KrY9GYjocBRED08dNOfMYbAFR0MHoa-DwCfPVLPl8CzatayrgBVtP1oIyH0ZrP2QZ9_Yx2noeJADU6ZLpAForjeQ/w1600/common-web-application-vulnerabilities.jpg","hostPageUrl":"https://pygurutricks.in/","contentSize":"53106 B","width":700,"height":600,"cDNContentUrl":"https://th.bing.com/th/id/R.eebda0bcf5d31aac19d60ef4e218c0a3?rik=hjJnCBAxSwLFBA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"E5BFC223F6189B4A105D04C5024B311008673286","accentColor":"B01B2E"},"54EB71E50A768B1C58E6939F89C0F9CC3AE9F0F1":{"name":"Mitigating Circumstances 2015-16. Template for Mitigating Circumstances ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.9REWu0FrH3Bs5SLYiiCLfwAAAA?pid=Api","datePublished":"2023-11-08T15:18:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.pdffiller.com/preview/692/472/692472881.png","hostPageUrl":"https://www.pdffiller.com/692472881--Mitigating-Circumstances-Form-2015-16-Template-form-for-Mitigating-Circumstances-","contentSize":"10595 B","width":298,"height":386,"cDNContentUrl":"https://th.bing.com/th/id/R.f51116bb416b1f706ce522d88a208b7f?rik=Rb4XXqBnuMGFbg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"1F0F9EA3CC9F0C98F9396E85C1B867A05E17BE45","accentColor":"474784"},"D54E6BE14331261C5034CDA7991EBB15BEF93120":{"name":"What is OWASP? Latest Top 10 OWASP Vulnerabilities","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.Kbc2_fS8w-5bKVntLszfgAHaE8?pid=Api","datePublished":"2021-06-29T18:06:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://simpliskills.in/wp-content/uploads/2021/07/Owasp-top-10-vulnerabilities.png","hostPageUrl":"https://simpliskills.in/owasp-top-ten-vulnerabilities/","contentSize":"86634 B","width":900,"height":600,"cDNContentUrl":"https://th.bing.com/th/id/R.29b736fdf4bcc3ee5b2959ed2eccdf80?rik=XeS2HjQTYsEFQw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"02139FEB51BBE1997ADC4305C16213341EB6E45D","accentColor":"104F88"},"E5FADDF1B3F747E2DE7E1BC50CAE7A3A373293BD":{"name":"Flood Vulnerability Mapping Using MaxEnt Machine Learning and ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.eB6QivY34DfuiTGgMI41mAHaFk?pid=Api","datePublished":"2023-04-11T07:58:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.mdpi.com/environsciproc/environsciproc-25-00073/article_deploy/html/images/environsciproc-25-00073-g004.png","hostPageUrl":"https://www.mdpi.com/2673-4931/25/1/73","contentSize":"297212 B","width":1665,"height":1251,"cDNContentUrl":"https://th.bing.com/th/id/R.781e908af637e037ee8931a0308e3598?rik=Xq%2fdHzt%2fdC7t5w&pid=ImgRaw&r=0","isTransparent":false,"imageId":"DB392373A3A7EAC05CB1E7ED2E747F3B1FDDAF5E","accentColor":"CC9600"},"5CE7FDA5AFA435D995AF27D48206EF6D3A3725CE":{"name":"NVIDIA releases drivers mitigating Spectre CPU vulnerabilities | Digit","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.dj9WFAeQChQL7ZmygK5hjQHaEQ?pid=Api","datePublished":"2019-04-20T01:16:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://static.digit.in/default/ee947f4f90a26134daf1a300aae2dbfbc2af42a5.jpeg","hostPageUrl":"https://www.digit.in/news/general/nvidia-releases-drivers-mitigating-cpu-spectre-vulnerabilities-39077.html","contentSize":"31491 B","width":940,"height":540,"cDNContentUrl":"https://th.bing.com/th/id/R.763f561407900a140bed99b280ae618d?rik=xX7fWvpKU51Z%2bg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"EC5273A3D6FE60284D72FA599D534AFA5ADF7EC5","accentColor":"977434"},"536EE195964BE41F1ACDD01D9BFA19BF9F6332EC":{"name":"Microsoft says 92% of vulnerable Exchange servers patched, mitigated ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.OpMa_s-eKWWXsZgE9wHIJQHaEK?pid=Api","datePublished":"2021-03-28T06:01:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://images.hindustantimes.com/tech/img/2021/03/28/1600x900/_b2b2e57c-a0fa-11e6-b234-3982876c2dbb_1616911051526.jpg","hostPageUrl":"https://tech.hindustantimes.com/tech/news/microsoft-says-92-of-vulnerable-exchange-servers-patched-mitigated-71616910978415.html","contentSize":"166990 B","width":1600,"height":900,"cDNContentUrl":"https://th.bing.com/th/id/R.3a931afecf9e296597b19804f701c825?rik=NeYeWWm0TvGh3A&pid=ImgRaw&r=0","isTransparent":false,"imageId":"CE2336F9FB91AFB9D10DDCA1F14EB469591EE635","accentColor":"0171CA"},"284625C8D9FDC3964E0AE713AC700D41CB160838":{"name":"Death penalty: SC refers case to 5-judge bench on framing rules for ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.8061_CZfCcdb9OwnN7t5owHaD4?pid=Api","datePublished":"2022-09-19T09:42:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://s01.sgp1.cdn.digitaloceanspaces.com/article/105589-lrcnwalobl-1663578295.jpg","hostPageUrl":"https://scroll.in/latest/1033172/death-penalty-five-judge-constitution-bench-to-frame-rules-on-mitigating-circumstances","contentSize":"55581 B","width":1200,"height":630,"cDNContentUrl":"https://th.bing.com/th/id/R.f34eb5fc265f09c75bf4ec2737bb79a3?rik=gmRSjJ3fPGnkoA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"838061BC14D007CA317EA0E4693CDF9D8C526482","accentColor":"A26129"},"8E1CB5AA98FFF10D2815071CA0DC10FA2D99DB9D":{"name":"Secure critical supply chains with the #1 AI CRM - Salesforce.com","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.5tnIN3O6o7HifIXOsf2vrAHaHa?pid=Api","datePublished":"2025-02-22T04:28:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.salesforce.com/content/dam/web/en_us/www/images/form/industries/government/request-supplier-relationship-mgmt.png","hostPageUrl":"https://www.salesforce.com/form/industries/government/supplier-relationship-management-white-paper/","contentSize":"31715 B","width":720,"height":720,"cDNContentUrl":"https://th.bing.com/th/id/R.e6d9c83773baa3b1e27c85ceb1fdafac?rik=6MFbqon%2fH9CCUQ&pid=ImgRaw&r=0","isTransparent":true,"imageId":"D9BD99D2AF01CD0AC1705182D01FFF89AA5BC1E8","accentColor":"018DCA"},"307B02CE75AE080AAF037C913CE9E1A2037D45E9":{"name":"Popular apps have vulnerabilities in how they connect to the cloud. At ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.kRJyBkyXcQp_jETyLSIP6gHaFj?pid=Api","datePublished":"2021-05-19T19:47:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://img.etimg.com/thumb/msid-82780550,width-1015,height-761,imgsize-316261,resizemode-8,quality-100/prime/technology-and-startups/popular-apps-have-vulnerabilities-in-how-they-connect-to-the-cloud-at-risk-is-users-personal-data-.jpg","hostPageUrl":"https://economictimes.indiatimes.com/prime/technology-and-startups/popular-apps-have-vulnerabilities-in-how-they-connect-to-the-cloud-at-risk-is-users-personal-data-/primearticleshow/82780550.cms","contentSize":"120024 B","width":1015,"height":761,"cDNContentUrl":"https://th.bing.com/th/id/R.911272064c97710a7f8c44f22d220fea?rik=A7cg7FfqgKD6MA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"9E54D7302A1E9EC319C730FAA080EA57EC20B703","accentColor":"9F622C"},"2E2E0DC0A7975B634FCF505980A05023CCACAACC":{"name":"Pacemaker Vulnerabilities Case Study - 21CSC308T SRMP Report - Studocu","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.rx-6yQJzDns_zWNCYTSQLAHaEK?pid=Api","datePublished":"2025-11-15T11:57:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://website-assets.studocu.com/img/document_thumbnails/9c713b035efc30bc34367b40997caaa1/thumb_784_441.png","hostPageUrl":"https://www.studocu.com/in/document/srm-institute-of-science-and-technology/security-risk-management-principles/pacemaker-vulnerabilities-case-study-21csc308t-srmp-report/145585548","contentSize":"19335 B","width":784,"height":441,"cDNContentUrl":"https://th.bing.com/th/id/R.af1fbac902730e7b3fcd63426134902c?rik=4uLQDHp5tTb0%2fA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"CCAACACC32050A089505FCF436B5797A0CD0E2E2","accentColor":"212121"},"9BEE676E1692CC285AC630DB546AC9F794D11B43":{"name":"Uranium bioremediation using microbial for mitigating its pollution","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.9H4BZkUiyDlT0Qe3JFA-8QAAAA?pid=Api","datePublished":"2019-12-20T16:10:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.projectguru.in/publications/wp-content/uploads/2017/06/uranium.jpg","hostPageUrl":"https://www.projectguru.in/uranium-bioremediation-using-microbial-mitigating-pollution/","contentSize":"17141 B","width":397,"height":196,"cDNContentUrl":"https://th.bing.com/th/id/R.f47e01664522c83953d107b724503ef1?rik=ue525mEpzIKlbA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"34B11D497F9CA645BD036CA582CC2961E676EEB9","accentColor":"191719"},"9E053CC02FF57704AC60FCAEA9D9845AA7842C21":{"name":"Buy Climate Change India in Focus Mitigating Impact of Global Warming ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.qy_HntZJHiCRZ1F5ELqXVQAAAA?pid=Api","datePublished":"2020-09-24T22:45:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/21vGVt+SdyL.jpg","hostPageUrl":"https://www.amazon.in/Climate-Change-Mitigating-Impact-Warming/dp/817658066X","contentSize":"4815 B","width":100,"height":150,"cDNContentUrl":"https://th.bing.com/th/id/R.ab2fc79ed6491e209167517910ba9755?rik=6VDDDPJfd0DKBg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"12C2487AA5489D9AEACF06CA40775FF20CC350E9","accentColor":"AF891C"},"6489352DE2B3A83232B0F4EC8F26E5053169351E":{"name":"Buy Integrated Approach of Mitigating Seedling Mortality of Chilli ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.6d0Vxbgf9jDv6GXWYulEngHaK2?pid=Api","datePublished":"2024-04-15T03:48:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/71uCZKhCRbL.jpg","hostPageUrl":"https://www.desertcart.in/products/113176714-integrated-approach-of-mitigating-seedling-mortality-of-chilli-using-trichoderma-harzianum-and-chaetomium-globosum","contentSize":"138734 B","width":1182,"height":1732,"cDNContentUrl":"https://th.bing.com/th/id/R.e9dd15c5b81ff630efe865d662e9449e?rik=RphT0i47iiMjCw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"E1539613505E62F8CE4F0B23238A3B2ED2539846","accentColor":"AC1F21"},"F292D3F376326B48AA5DF358AE3C1A7142E75393":{"name":"Flood Mitigation to Begin in Tamil Nadu","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.RHHfVPQWGxzWAsnyUpEmbAHaE8?pid=Api","datePublished":"2022-05-30T09:01:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://static.india.com/wp-content/uploads/2022/05/flood.jpg","hostPageUrl":"https://www.india.com/tamil-nadu/tamil-nadu-govt-allocates-rs-392-16-crore-for-flood-mitigation-work-5422062/","contentSize":"126240 B","width":1200,"height":800,"cDNContentUrl":"https://th.bing.com/th/id/R.4471df54f4161b1cd602c9f25291266c?rik=Lyk9P2cjtoSq1Q&pid=ImgRaw&r=0","isTransparent":false,"imageId":"39357E2417A1C3EA853FD5AA84B623673F3D292F","accentColor":"A98622"},"84310132DC712911596C271F3079A99616F07241":{"name":"CrowdStrike launches AI Red Team services to secure AI systems against ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.Ug5u6Jdozb8f7-8AvzOngwHaEu?pid=Api","datePublished":"2024-11-08T00:00:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://etimg.etb2bimg.com/thumb/msid-115050634,imgsize-20202,width-1200,height=765,overlay-etciosea/news/security/crowdstrike-launches-ai-red-team-services-to-secure-ai-systems-against-emerging-threats.jpg","hostPageUrl":"https://ciosea.economictimes.indiatimes.com/news/security/crowdstrike-launches-ai-red-team-services-to-secure-ai-systems-against-emerging-threats/115050634","contentSize":"71392 B","width":1200,"height":765,"cDNContentUrl":"https://th.bing.com/th/id/R.520e6ee89768cdbf1fefef00bf33a783?rik=SBMQI80XkhGVxg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"14270F61699A9703F172C695119217CD23101348","accentColor":"23495F"},"1C0BFBFA369FFAF3E88737020177E6EF9AA341C5":{"name":"mumbai pollution: Mobilising clusters for waste treatment can help ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.smW4RqXmM8iWURGARWQX_gHaEA?pid=Api","datePublished":"2023-02-04T10:37:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://img.etimg.com/thumb/msid-97602886,width-1070,height-580,overlay-economictimes/videoshow.jpg","hostPageUrl":"https://economictimes.indiatimes.com/news/india/mobilising-clusters-for-waste-treatment-can-help-mitigate-mumbais-pollution-problem-says-fm-sitharaman/videoshow/97602886.cms","contentSize":"52860 B","width":1070,"height":580,"cDNContentUrl":"https://th.bing.com/th/id/R.b265b846a5e633c896511180456417fe?rik=wbC%2fr2P5rz%2bOeA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"5C143AA9FE6E77102073788E3FAFF963AFBFB0C1","accentColor":"B01B20"},"3B0B547507FB706C0D30409EBB792C1598F1EEC6":{"name":"India's Climate Vulnerability","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.T3YKBDd9bXjxfUywthjCGQHaEv?pid=Api","datePublished":"2023-04-21T17:11:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://s3-ap-south-1.amazonaws.com/adda247jobs-wp-assets-adda247/articles/wp-content/uploads/2023/04/21183312/Indias-Climate-Vulnerability.jpg","hostPageUrl":"https://www.studyiq.com/articles/stats-iq-indias-climate-vulnerability/","contentSize":"533864 B","width":1200,"height":768,"cDNContentUrl":"https://th.bing.com/th/id/R.4f760a04377d6d78f17d4cb0b618c219?rik=s7BFV3C%2fB8bQAw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"6CEE1F8951C297BBE90403D0C607BF705745B0B3","accentColor":"C98B02"},"85A9EA4FD756DF373A1FEDC5F2AF5EADBC228F71":{"name":"Factors Affecting Risk Management in Industrial Companies in Jordan","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.zCE2WJnFATpPYq5wrxLG7wHaFk?pid=Api","datePublished":"2023-05-12T15:49:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.mdpi.com/admsci/admsci-13-00132/article_deploy/html/images/admsci-13-00132-g002.png","hostPageUrl":"https://www.mdpi.com/2076-3387/13/5/132","contentSize":"194130 B","width":1935,"height":1456,"cDNContentUrl":"https://th.bing.com/th/id/R.cc21365899c5013a4f62ae70af12c6ef?rik=WJqu9H1l%2fXOj8Q&pid=ImgRaw&r=0","isTransparent":false,"imageId":"17F822CBDAE5FA2F5CDEF1A373FD657DF4AE9A58","accentColor":"C89803"},"350184B327E55CAA7361E5AB3BECE4D7BFB8CB41":{"name":"AI in Penetration Testing - Revolutionizing Security Assessments - Yeah Hub","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.kPyZJfoe__UqWRDTEDPbGQHaE4?pid=Api","datePublished":"2025-01-09T04:54:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.yeahhub.com/wp-content/uploads/2025/01/Security-Assessments.jpg","hostPageUrl":"https://www.yeahhub.com/ai-in-penetration-testing-revolutionizing-security-assessments/","contentSize":"262099 B","width":1392,"height":918,"cDNContentUrl":"https://th.bing.com/th/id/R.90fc9925fa1efff52a5910d31033db19?rik=UxBIO3Jexao3Fg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"14BC8BFB7D4ECEB3BA5E1637AAC55E723B481053","accentColor":"1C5D38"},"5EDDA927333CBC114952FC3C8037E9CCD47BBFCA":{"name":"STRESS MANAGEMENT: Understanding and Mitigating Stress for a Balanced ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.4Y46-H23T1j6DLeaIC4uwwAAAA?pid=Api","datePublished":"2025-06-14T03:54:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/41ziw+t+zrL._SY445_SX342_.jpg","hostPageUrl":"https://www.amazon.in/STRESS-MANAGEMENT-Understanding-Mitigating-Balanced-ebook/dp/B0CQYV76VP","contentSize":"25688 B","width":279,"height":445,"cDNContentUrl":"https://th.bing.com/th/id/R.e18e3af87db74f58fa0cb79a202e2ec3?rik=5d2acjPDyxGUJQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"ACFBB74DCC9E7308C3CF259411CBC333729ADDE5","accentColor":"484D5B"},"3E536ADAA971EC4D7053D93F0C633A4A12918B39":{"name":"Find ways to mitigate flood situation: Gadkari to officials","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.K1YkYJzv1_Sqjum1aYx5PgHaE8?pid=Api","datePublished":"2022-11-04T16:21:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://media.dtnext.in/imported/import/Images/Article/201709101209474549_Find-ways-to-mitigate-flood-situation-Gadkari-to-officials_SECVPF.gif","hostPageUrl":"https://www.dtnext.in/national/2017/09/10/find-ways-to-mitigate-flood-situation-gadkari-to-officials","contentSize":"32440 B","width":620,"height":414,"cDNContentUrl":"https://th.bing.com/th/id/R.2b5624609cefd7f4aa8ee9b5698c793e?rik=4zWmrZoXztQHNQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"93B81921A4A336C0F39D3507D4CE179AADA635E3","accentColor":"424A5A"},"D2E4DC21B6D364DC81449D05B865FC2DD7BA72F9":{"name":"Helping to Mitigate Risk in GenAI Tools for CDS","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.PdjaFzeN5U41k0lounj4bgHaFX?pid=Api","datePublished":"2024-08-01T17:53:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://images.ctfassets.net/zlnfaxb2lcqx/3iVgcfy5v5YZKpKL68gxF4/e0c80d92d095b5c73ffd09bdcdc30f8c/Helping_to_Mitigate_Risk_in_GenAI_Tools_for_CDS.png?w=1200&q=75","hostPageUrl":"https://www.elsevier.com/en-in/resources/helping-to-mitigate-risk-in-genai-tools-for-cds","contentSize":"1033500 B","width":1200,"height":870,"cDNContentUrl":"https://th.bing.com/th/id/R.3dd8da17378de54e35934968ba78f86e?rik=LU7NEms9Rs0YRA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"9F27AB7DD2CF568B50D94418CD463D6B12CD4E2D","accentColor":"406E8B"},"36EA672D5328F109C55A6F87F2F819983927DB64":{"name":"Editorial: Reciprocal tariffs and risk mitigation","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.LfTlLlnYoZPP25CDLTnc1QHaEc?pid=Api","datePublished":"2025-04-03T01:10:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://media.dtnext.in/h-upload/2025/02/13/856712-donald.jpg","hostPageUrl":"https://www.dtnext.in/edit/editorial-reciprocal-tariffs-and-risk-mitigation-828681","contentSize":"94219 B","width":1500,"height":900,"cDNContentUrl":"https://th.bing.com/th/id/R.2df4e52e59d8a193cfdb90832d39dcd5?rik=Y6520jWCH5BcpQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"46BD729389918F2F78F6A55C901F8235D276AE63","accentColor":"2A3964"},"F3AB360519AF3985B6C280DD7D793A14EECF80CD":{"name":"Top 5 Penetration Testing Methodologies to Follow in 2025 - Yeah Hub","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.QFAAgU281thP5tZSaXRwtwHaEk?pid=Api","datePublished":"2025-01-08T14:04:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.yeahhub.com/wp-content/uploads/2025/01/Penetration-Testing-Methodologies.jpg","hostPageUrl":"https://www.yeahhub.com/top-5-penetration-testing-methodologies-to-follow-in-2025/","contentSize":"391308 B","width":1481,"height":913,"cDNContentUrl":"https://th.bing.com/th/id/R.405000814dbcd6d84fe6d652697470b7?rik=P7pjUJH6k1hrLA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"DC08FCEE41A397D7DD082C6B5893FA915063BA3F","accentColor":"6215B6"},"B66ED866BBB1683FD5FBC155D58D3BBE55EE78E0":{"name":"Rs 488 crore approved for Uttar Pradesh, Punjab and Goa under State ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.xuD0oydoV0qA2NxyGrn0swHaEu?pid=Api","datePublished":"2022-10-01T07:22:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://etimg.etb2bimg.com/thumb/msid-94579625,imgsize-22812,width-1200,height=765,overlay-etgovernment/news/governance/rs-488-crore-approved-for-uttar-pradesh-punjab-and-goa-under-the-state-disaster-mitigation-fund.jpg","hostPageUrl":"https://government.economictimes.indiatimes.com/news/governance/rs-488-crore-approved-for-uttar-pradesh-punjab-and-goa-under-the-state-disaster-mitigation-fund/94579625","contentSize":"56876 B","width":1200,"height":765,"cDNContentUrl":"https://th.bing.com/th/id/R.c6e0f4a32768574a80d8dc721ab9f4b3?rik=a%2baNZrsbhvNdvw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"0E87EE55EBB3D85D551CBF5DF3861BBB668DE66B","accentColor":"A33228"},"71053FB16E11DAF520473AE11B9C716DD879B09B":{"name":"Blog: Data Breaches in the Cloud - EE Times India","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.uI25MV9YJQthufzJNx6PFAHaDN?pid=Api","datePublished":"2020-02-14T06:40:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.eetindia.co.in/wp-content/uploads/sites/4/2020/04/cloud-shared-responsibility.jpg","hostPageUrl":"https://www.eetindia.co.in/Blog-Data-Breaches-in-the-Cloud/","contentSize":"90423 B","width":1000,"height":434,"cDNContentUrl":"https://th.bing.com/th/id/R.b88db9315f58250b61b9fcc9371e8f14?rik=F1DzG%2bYRrV8CdA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"B90B978DD617C9B11EA374025FAD11E61BF35017","accentColor":"072838"},"A83CBC472B28DB494B449077C65471B0D2AAB025":{"name":"Press Release: Press Information Bureau","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.2L7L4dif9nwa-smLXeS_4QHaE7?pid=Api","datePublished":"2023-05-25T12:32:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://static.pib.gov.in/WriteReadData/userfiles/image/G20-1Y4CE.jpg","hostPageUrl":"https://pib.gov.in/PressReleseDetailm.aspx?PRID=1927253","contentSize":"123012 B","width":1280,"height":852,"cDNContentUrl":"https://th.bing.com/th/id/R.d8becbe1d89ff67c1afac98b5de4bfe1?rik=isPLdLKCvZS0RA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"520BAA2D0B17456C770944B494BD82B274CBC38A","accentColor":"976934"},"F18197ED3F87CB411165DE4B17CBD5DFC2FB8677":{"name":"Ensuring fairness and mitigating bias with AI-powered HR decisions ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.Q-JoYc_7z_IbXSLV-DVJoQHaEV?pid=Api","datePublished":"2024-10-07T10:55:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://contentstatic.timesjobs.com/photo/114012490/leaders-talk/ensuring-fairness-and-mitigating-bias-with-ai-powered-hr-decisions.jpg","hostPageUrl":"https://content.timesjobs.com/ensuring-fairness-and-mitigating-bias-with-ai-powered-hr-decisions/articleshow/114012490.cms","contentSize":"330539 B","width":744,"height":435,"cDNContentUrl":"https://th.bing.com/th/id/R.43e26861cffbcff21b5d22d5f83549a1?rik=Hxh53vN4vBQRVg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"7768BF2CFD5DBC71B4ED561114BC78F3DE79181F","accentColor":"C00B0E"},"801F967911ABE0046957E759689E29B437A2F54D":{"name":"Innovation - Top strategies to protect your business during the novel ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.8IfCnSnsVNJlc-sXLarPngHaFj?pid=Api","datePublished":"2020-07-27T12:00:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://img.etimg.com/thumb/msid-77194936,width-640,resizemode-4,imgsize-123976/mitigating-risk.jpg","hostPageUrl":"https://economictimes.indiatimes.com/news/company/corporate-trends/top-strategies-to-protect-your-business-during-the-novel-coronavirus-pandemic/innovation/slideshow/77195003.cms","contentSize":"28051 B","width":640,"height":480,"cDNContentUrl":"https://th.bing.com/th/id/R.f087c29d29ec54d26573eb172daacf9e?rik=CPFplxG6DkCWdQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"D45F2A734B92E986957E7596400EBA119769F108","accentColor":"B41719"},"72C2C714397DED77E3F80BC9E474F0D3E9AB6103":{"name":"How to Identify and Mitigate the Risks on Construction Sites | Wehouse.in","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.drpCBHfPeZ0ASTQfAZ0wxAHaEK?pid=Api","datePublished":"2022-06-10T11:57:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://wehouse.in/assets/blog/blog-image-june10.jpg","hostPageUrl":"https://www.wehouse.in/blog-details/how-to-identify-and-mitigate-the-risks-on-construction-sites-wehouse-in","contentSize":"282688 B","width":1599,"height":899,"cDNContentUrl":"https://th.bing.com/th/id/R.76ba420477cf799d0049341f019d30c4?rik=Jyx8QZPX3nc%2bjw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"3016BA9E3D0F474E9CB08F3E77DED793417C2C27","accentColor":"BD7D0E"},"A2E4A4C2BA1D3EA5A48F1BA04C1E9204D1D8D07E":{"name":"Falcon Spotlight: Scanless Vulnerability Management","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.of8b3X11NVhg2ceuez6OJwHaDo?pid=Api","datePublished":"2021-03-06T17:33:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.crowdstrike.com/wp-content/uploads/2020/04/falcon-spotlight-vulnerability-assessment-dashboard.png","hostPageUrl":"https://www.electroon.com/cyber-security/antiviruses/falcon-spotlight-scanless-vulnerability-management/","contentSize":"162767 B","width":1600,"height":784,"cDNContentUrl":"https://th.bing.com/th/id/R.a1ff1bdd7d75355860d9c7ae7b3e8e27?rik=Kk5KLKvR41pK%2bA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"E70D8D1D4029E1C40AB1F84A5AE3D1AB2C4A4E2A","accentColor":"C28B09"},"767ED3F60E198C614735CA454F7B6C8AF8343B2F":{"name":"UPCCCE-Uttar Pradesh Climate Change and Clean Environment","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.JfJ1Y6T1lfwJVP1Byr_MEwHaFj?pid=Api","datePublished":"2022-10-14T12:59:00.0000000Z","isFamilyFriendly":true,"contentUrl":"http://upccce.org/public/images/blog/gov.jpg","hostPageUrl":"http://upccce.org/government-organizations","contentSize":"35596 B","width":480,"height":360,"cDNContentUrl":"https://th.bing.com/th/id/R.25f27563a4f595fc0954fd41cabfcc13?rik=Z%2bc9b%2bCRyBZ0Uw&riu=http%3a%2f%2fupccce.org%2fpublic%2fimages%2fblog%2fgov.jpg&ehk=zb9SeI6gRnCCdebdAZXgA3em6YoC4PpAChwnW%2f82vLc%3d&risl=&pid=ImgRaw&r=0","isTransparent":false,"imageId":"F2B3438FA8C6B7F454AC537416C891E06F3DE767","accentColor":"C0610B"},"03F2D432BE90318FC6B92B88C6AC6824CC83B77F":{"name":"Siang project not just for generating power but mitigating flood risks ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.hrNyf4d9Hry6xgdJDzvA8wHaE8?pid=Api","datePublished":"2024-12-29T05:20:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://media.dtnext.in/imported/import/Images/Article/201607272222269263_Arunachal-CM-reviews-flood-situation_SECVPF.gif","hostPageUrl":"https://www.dtnext.in/news/national/siang-project-not-just-for-generating-power-but-mitigating-flood-risks-posed-by-china-arunachal-cm-817183","contentSize":"47972 B","width":620,"height":414,"cDNContentUrl":"https://th.bing.com/th/id/R.86b3727f877d1ebcbac607490f3bc0f3?rik=MC9NI%2bsJE%2fhsmw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"F77B38CC4286CA6C88B29B6CF81309EB234D2F30","accentColor":"2E4077"},"397F77E6B90C09FFB027394CED660B63327C7CF2":{"name":"7 Types of Security Testing - QATestLab Blog","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.ogHTTAI2P6bny1C_7U38ZgHaED?pid=Api","datePublished":"2018-07-21T03:06:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://blog.qatestlab.com/wp-content/uploads/2017/02/Penetration-Testing.jpg","hostPageUrl":"https://blog.qatestlab.com/2020/09/07/security-testing-types/","contentSize":"63551 B","width":885,"height":484,"cDNContentUrl":"https://th.bing.com/th/id/R.a201d34c02363fa6e7cb50bfed4dfc66?rik=k%2fd3bpvAkP8Lcg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"2FC7C72336B066DEC493720BFF90C09B6E77F793","accentColor":"B34618"},"347B5BDAC764ADDD6668C75C11C9B91396059A72":{"name":"DevSecOps Solution","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.F_pO_rfk1gwlvgjUyL-rCAHaHa?pid=Api","datePublished":"2024-08-20T07:56:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://codesecure.in/images/solutions/dev2.png","hostPageUrl":"https://codesecure.in/solutions/devsecops-solution","contentSize":"575122 B","width":1080,"height":1080,"cDNContentUrl":"https://th.bing.com/th/id/R.17fa4efeb7e4d60c25be08d4c8bfab08?rik=Q7e1rXxG2t1mhg&pid=ImgRaw&r=0","isTransparent":true,"imageId":"27A95069319B9C11C57C8666DDDA467CADB5B743","accentColor":"14B7AD"},"59E7056452287F5FAAB0094A8CBF5B986EC890E6":{"name":"Cyber Security - Hacktronian","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.2fqCwpdrvCbnjcnT58cRdQHaHa?pid=Api","datePublished":"2024-10-22T09:30:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://hacktronian.in/assets/images/services/about/cybersecurity.webp","hostPageUrl":"https://hacktronian.in/cybersecurity","contentSize":"44596 B","width":1000,"height":1000,"cDNContentUrl":"https://th.bing.com/th/id/R.d9fa82c2976bbc26e78dc9d3e7c71175?rik=lX5QRiWC9%2fWqCw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"6E098CE689B5FBC8A4900BAAF5F7822546507E95","accentColor":"15B683"},"866C0EFFF8FCD499445E094A8CBF5B986EC890E6":{"name":"Cyber Security - Hacktronian","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.8DZx2Q0BKSSfvV5wR-vfMQAAAA?pid=Api","datePublished":"2024-10-22T09:30:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://hacktronian.in/assets/images/services/cysec2.webp","hostPageUrl":"https://hacktronian.in/cybersecurity","contentSize":"4270 B","width":300,"height":300,"cDNContentUrl":"https://th.bing.com/th/id/R.f03671d90d0129249fbd5e7047ebdf31?rik=aMbg%2f4%2fPTZlE5Q&pid=ImgRaw&r=0","isTransparent":false,"imageId":"6E098CE689B5FBC8A490E544994DCF8FFFE0C668","accentColor":"048963"},"075A8F42873C69946AC71BB7C976BD01303B32E0":{"name":"D'source Design Case study on Mobile Solution for Mitigating Ocean ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.l47UUlYd0RUW5q0IzUL1HQAAAA?pid=Api","datePublished":"2025-08-29T17:58:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://dsource.idc.iitb.ac.in/sites/default/files/case-study/mobile-solution-mitigating-ocean-plastic-waste/logo/Index_170.jpg","hostPageUrl":"https://dsource.idc.iitb.ac.in/case-study/mobile-solution-mitigating-ocean-plastic-waste","contentSize":"9432 B","width":170,"height":170,"cDNContentUrl":"https://th.bing.com/th/id/R.978ed452561dd11516e6ad08cd42f51d?rik=cKX4JHjDlkmmfA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"0E23B30310DB679C7BB17CA64996C37824F8A570","accentColor":"284867"},"C5D8556444FC37E0E07217118E38A5576AB18D45":{"name":"Network Penetration Testing Company in Chennai | Codesecure Solutions","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.jvg95UwRpyOOADtnmfMM6wHaHa?pid=Api","datePublished":"2022-05-22T17:06:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://codesecure.in/images/ab.png","hostPageUrl":"https://codesecure.in/about","contentSize":"919394 B","width":1080,"height":1080,"cDNContentUrl":"https://th.bing.com/th/id/R.8ef83de54c11a7238e003b6799f30ceb?rik=XI1VRkTPcw4OJw&pid=ImgRaw&r=0","isTransparent":true,"imageId":"54D81BA6755A83E81171270E0E73CF4446558D5C","accentColor":"385E4B"},"F7D8DB8197DBBF5F6360B7AFD589774B5B8F2E78":{"name":"TSK Automations || Security Services","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.OfZdbKGGWYjMyfuz1SvSYAHaE8?pid=Api","datePublished":"2024-12-10T03:56:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://tskautomations.com/ContentImg/SIEM.jpg","hostPageUrl":"https://tskautomations.com/Securityservices.html","contentSize":"38012 B","width":600,"height":400,"cDNContentUrl":"https://th.bing.com/th/id/R.39f65d6ca1865988ccc9fbb3d52bd260?rik=f429GHm9%2b%2fU2Bg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"87E2F8B5B477985DFA7B0636F5FBBD7918BD8D7F","accentColor":"BE980D"},"FC1F1A207C4ECD1754F09A2C75A8D2313B4C77FE":{"name":"Coastal Vegetation to mitigate Tsunami and Coastal Flood Impacts ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.9eSIxeou6CH3chEjBozEUAHaFp?pid=Api","datePublished":"2025-02-24T04:58:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://rnd.iitb.ac.in/sites/default/files/logo.png","hostPageUrl":"https://rnd.iitb.ac.in/coastal_vegetation_to_mitigate_tsunami_and_coastal_flood_impacts","contentSize":"94702 B","width":572,"height":436,"cDNContentUrl":"https://th.bing.com/th/id/R.f5e488c5ea2ee821f7721123068cc450?rik=z%2fGhAsfk3HFFDw&pid=ImgRaw&r=0","isTransparent":true,"imageId":"EF77C4B3132D8A57C2A90F4571DCE4C702A1F1CF","accentColor":"666666"},"B2A2C07A94DEAD19D72692218E37A6E19C1FC88B":{"name":"Siang project not just for generating power but mitigating flood risks ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.vitox7pDwMejpoLYz-1Z-wHaEj?pid=Api","datePublished":"2024-12-29T06:04:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://english.varthabharati.in/storage/uploads/india/andhra-cm_vb_38.jpeg","hostPageUrl":"https://english.varthabharati.in/india/siang-project-not-just-for-generating-power-but-mitigating-flood-risks-posed-by-china-arunachal-cm","contentSize":"200998 B","width":650,"height":400,"cDNContentUrl":"https://th.bing.com/th/id/R.be2b68c7ba43c0c7a3a682d8cfed59fb?rik=KyoMp0nt2pF9Yg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"B88CF1C91E6A73E81229627D91DAED49A70C2A2B","accentColor":"853078"},"A9F23952989851A4283341A6DE6F3FDE0FF8CD00":{"name":"Without mitigating measures, the health effects of heat stress will ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.n34whd9K8D9Gtx2ZoyggoAHaDV?pid=Api","datePublished":"2022-09-30T14:00:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://s01.sgp1.cdn.digitaloceanspaces.com/inline/pqaphgamnh-1664100861.jpg","hostPageUrl":"https://scroll.in/article/1033616/without-mitigating-measures-the-health-effects-of-heat-stress-will-worsen-considerably-in-india","contentSize":"109451 B","width":2048,"height":923,"cDNContentUrl":"https://th.bing.com/th/id/R.9f7e3085df4af03f46b71d99a32820a0?rik=mi%2bTJYmJFUqCMw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"00DC8FF0EDF3F6ED6A1433824A15898925932F9A","accentColor":"6E4E5F"},"8EC2A9F9C1A46B4E0DFA1BA04C1E9204D1D8D07E":{"name":"Falcon Spotlight: Scanless Vulnerability Management","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.OkJqm154b9_i-YXFkhs95QHaG7?pid=Api","datePublished":"2021-03-06T17:33:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.crowdstrike.com/wp-content/uploads/2020/04/falcon-spotlight-scan-free-dashboard-image.png","hostPageUrl":"https://www.electroon.com/cyber-security/antiviruses/falcon-spotlight-scanless-vulnerability-management/","contentSize":"342450 B","width":1378,"height":1290,"cDNContentUrl":"https://th.bing.com/th/id/R.3a426a9b5e786fdfe2f985c5921b3de5?rik=6CyanxxKtuTQrw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"E70D8D1D4029E1C40AB1AFD0E4B64A1C9F9A2CE8","accentColor":"AF3F1C"},"6632522C1866E6B4C446D0CDE986F4BDC45A318D":{"name":"CSIR-CSIO","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.2ekIYZPdWvWEpLzudxSwqAHaFj?pid=Api","datePublished":"2018-10-10T04:42:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.csio.res.in/upload/images/155518215Dust%20Mitigation%20and%20Environment%20Protection%20Device.jpg","hostPageUrl":"https://csio.res.in/home.php","contentSize":"211513 B","width":1280,"height":961,"cDNContentUrl":"https://th.bing.com/th/id/R.d9e9086193dd5af584a4bcee7714b0a8?rik=ZiMlwoFmbktMZA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"D813A54CDB4F689EDC0D644C4B6E6681C2252366","accentColor":"702D22"},"B38937120B5E00D652666D98F54541CA0E53873B":{"name":"Mastering Threat and Vulnerability Management; A Comprehensive ...","thumbnailUrl":"https://tse1.mm.bing.net/th?id=OIF.Wnccvpo%2b4%2bsgvxwmu8eolw&pid=Api","datePublished":"2026-01-29T10:09:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://cdn11.bigcommerce.com/s-ilcoov/images/stencil/1280x1280/products/566488/623675/Mastering_Threat_and_Vulnerability_Management_A_Comprehensive_Framework_for_Identifying_and_Mitigating_Risk__61468.1767356633.png?c=2","hostPageUrl":"https://store.theartofservice.com/mastering-threat-and-vulnerability-management-a-comprehensive-framework-for-identifying-and-mitigating-risk/","contentSize":"291237 B","width":1280,"height":905,"cDNContentUrl":"https://th.bing.com/th/id/R.ae135c54e390d1f433f03aea23b9a9a3?rik=&pid=ImgRaw&r=0","isTransparent":false,"imageId":"B37835E0AC14545F89D666256D00E5B02173983B","accentColor":"C69605","isFresh":true},"1B277822CB4D1317A4C75BE74630C5B7402DE2F3":{"name":"Hacking vs Ethical Hacking: Check Key Differences and Similarities","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.tCw96pH8d49m1j70IWP9wAHaEK?pid=Api","datePublished":"2022-11-03T05:43:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://img.jagranjosh.com/images/2022/November/3112022/hacking.webp","hostPageUrl":"https://www.jagranjosh.com/general-knowledge/hacking-vs-ethical-hacking-check-key-differences-and-similarities-1667455060-1","contentSize":"39638 B","width":1200,"height":675,"cDNContentUrl":"https://th.bing.com/th/id/R.b42c3dea91fc778f66d63ef42163fdc0?rik=sXKHIrzUMXFKfA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"3F2ED2047B5C03647EB57C4A7131D4BC228772B1","accentColor":"C20909"},"9CA8BA4C4427C2D55B5579A138F40BF1FC17D280":{"name":"PREVENT 2025 Puts India at the Center of Global Cybersecurity Innovation","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.PediHzDxMcsmzDhLaR1i6AHaFD?pid=Api","datePublished":"2025-02-24T07:10:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://aniportalimages.s3.amazonaws.com/media/details/ANI-20250224064823.jpg","hostPageUrl":"https://www.aninews.in/news/business/prevent-2025-puts-india-at-the-center-of-global-cybersecurity-innovation20250224123847/","contentSize":"116590 B","width":1166,"height":797,"cDNContentUrl":"https://th.bing.com/th/id/R.3de7621f30f131cb26cc384b691d62e8?rik=yYqrxERyLF21VQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"082D71CF1FB04F831A9755B55D2C7244C4AB8AC9","accentColor":"00A3CB"},"579F379802DF87E4C8D999C030F963D9ADCD3DF9":{"name":"Petition · Demand stern action and policies to mitigate man-animal ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.4xidP2kCnPpMYQI49LG8OAHaEK?pid=Api","datePublished":"2020-11-23T19:15:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://assets.change.org/photos/8/bo/wt/OcBowtgecrwPDWl-800x450-noPad.jpg?1591366108","hostPageUrl":"https://www.change.org/p/government-of-india-forest-department-demand-stern-action-and-policies-to-mitigate-man-animal-conflict-in-india","contentSize":"23458 B","width":681,"height":383,"cDNContentUrl":"https://th.bing.com/th/id/R.e3189d3f69029cfa4c610238f4b1bc38?rik=dflziSD9eE6MnQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"9FD3DCDA9D369F030C999D8C4E78FD208973F975","accentColor":"4A5B2C"},"603467AEFEF035FA6EE31BBBD9194A682E2C8274":{"name":"Working with Splunk Support Guide | Splunk","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP._aAt7JAvZwUQMYWvollCQQAAAA?pid=Api","datePublished":"2022-03-31T15:23:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.splunk.com/content/dam/splunk2/en_us/images/icon-library/color-black/mitigating-security-risks.svg","hostPageUrl":"https://www.splunk.com/en_us/resources/working-with-splunk-support.html","contentSize":"1969 B","width":192,"height":192,"cDNContentUrl":"https://th.bing.com/th/id/R.fda02dec902f6705103185afa2594241?rik=BkN26u8PU6%2fmPg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"4728C2E286A4919DBBB13EE6AF530FEFEA764306","accentColor":"666666"},"4E1FCEF5D7F5CF36D29391ED88E16D6B2A4C1BBB":{"name":"Integrated Mycotoxin Management - Trouw Nutrition","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.9erSbq7DwBn6qU0YU04FfgHaG7?pid=Api","datePublished":"2022-07-08T05:55:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.trouwnutritionasiapacific.com/contentassets/68c2437a34974b7e888af86f1e319b99/pic3.3.jpg?v=49ecc4","hostPageUrl":"https://www.trouwnutritionasiapacific.com/en-in/7.0-tn-In-news-and-events/highlighted-stories/2021/integrated-mycotoxin-management/","contentSize":"70547 B","width":927,"height":867,"cDNContentUrl":"https://th.bing.com/th/id/R.f5ead26eaec3c019faa94d18534e057e?rik=5PHsX31f%2fGMtOQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"BBB1C4A2B6D61E88DE19392D63FC5F7D5FECF1E4","accentColor":"C70404"},"22C432242B2D12ADBED170276BDD68E1FA01B53A":{"name":"Army Cannot Throw Up Hands On Grounds Of Road Width; If Landslides ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.pN5HxoVZfZcoBhq54yxxQgHaEc?pid=Api","datePublished":"2021-11-11T15:41:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.livelaw.in/h-upload/2021/07/03/750x450_396020-kk-venugopal-and-sc.jpg","hostPageUrl":"https://www.livelaw.in/top-stories/supreme-court-char-dham-highway-expansion-project-ag-kk-venugopal-india-china-border-185352","contentSize":"377424 B","width":750,"height":450,"cDNContentUrl":"https://th.bing.com/th/id/R.a4de47c685597d9728061ab9e32c7142?rik=IkwjQrLSIdrrHQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"A35B10AF1E86DDB672071DEBDA21D2B242234C22","accentColor":"A34728"},"279AD719782A0B7DEA441F1DABC9E0C3478AA650":{"name":"East Luwu Mahalona Transmigrant Alternatives in Mitigating Poverty Imp ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.hGRFBPRTgC9MdxHU7fspzwAAAA?pid=Api","datePublished":"2024-11-12T06:07:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://store.whitefalconpublishing.com/cdn/shop/files/East_Luwu_Mahalona_CoverF_large.jpg?v=1731390713","hostPageUrl":"https://store.whitefalconpublishing.com/products/east-luwu-mahalona-transmigrant-alternatives-in-mitigating-poverty-impact","contentSize":"29382 B","width":310,"height":480,"cDNContentUrl":"https://th.bing.com/th/id/R.84644504f453802f4c7711d4edfb29cf?rik=cql9kYeisNeuRA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"056AA8743C0E9CBAD1F144AED7B0A287917DA972","accentColor":"835348"},"C6CC1BFBBDF27DC7DF1BB2CA8AA626130925C50E":{"name":"Security Services: HP launches security services - Times of India","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.rKQwbIlTG084WlflFTKg7QAAAA?pid=Api","datePublished":"2021-01-09T19:07:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://static.toiimg.com/thumb/msid-9025762,imgsize-2725,width-400,resizemode-4/9025762.jpg","hostPageUrl":"https://timesofindia.indiatimes.com/it-services/HP-launches-security-services/articleshow/9025762.cms","contentSize":"9146 B","width":400,"height":267,"cDNContentUrl":"https://th.bing.com/th/id/R.aca4306c89531b4f385a57e51532a0ed?rik=bMyxv9sv13z9sQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"E05C529031626AA8AC2BB1FD7CD72FDBBFB1CC6C","accentColor":"186695"},"1062C8BDCD6563106E38D34BACDBF4AA7F3D05AC":{"name":"BDS | Retrofittings | Micro-Concrete with Jacketing","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.48eUxRmzfNA2LZLO3YZl1QHaEK?pid=Api","datePublished":"2023-03-01T10:58:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.bdsindia.com/images/Corrosion-Mitigation-System-S2e.jpg","hostPageUrl":"https://www.bdsindia.com/retrofittings_corrosion_mitigation_system.html","contentSize":"180563 B","width":1920,"height":1080,"cDNContentUrl":"https://th.bing.com/th/id/R.e3c794c519b37cd0362d92cedd8665d5?rik=ASaM29xWNgHmgw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"CA50D3F7AA4FBDCAB43D83E6013656DCDB8C2601","accentColor":"1F2041"},"C4792C03B3CDF1A28A1D3F76804EF735FD01FFED":{"name":"CleanML Python Dataset: Privacy Risk Scoring 2026","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.j9Q1VnTY09SZ-SyZA0dUSgHaHa?pid=Api","datePublished":"2025-11-22T13:43:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://johal.in/content/images/2025/08/logo-1.png","hostPageUrl":"https://johal.in/cleanml-python-dataset-privacy-risk-scoring-2026/","contentSize":"1411915 B","width":1024,"height":1024,"cDNContentUrl":"https://th.bing.com/th/id/R.8fd4355674d8d3d499f92c990347544a?rik=TJfCMDvcHyqo0Q&pid=ImgRaw&r=0","isTransparent":true,"imageId":"DEFF10DF537FE40867F3D1A82A1FDC3B30C2974C","accentColor":"0054AC"},"2CC973E0026636C771C7995119AC436BCA4ECFB3":{"name":"Atlassian Addresses High-Severity Vulnerabilities in Confluence ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.uNnkXDPqCQtd-zbA7S9jmAHaEL?pid=Api","datePublished":"2024-06-20T10:39:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://techhyme.com/wp-content/uploads/2024/06/VMware-vCenter-Vulnerabilities.jpg","hostPageUrl":"https://techhyme.com/atlassian-addresses-high-severity-vulnerabilities-in-confluence-crucible-and-jira/","contentSize":"35523 B","width":1352,"height":764,"cDNContentUrl":"https://th.bing.com/th/id/R.b8d9e45c33ea090b5dfb36c0ed2f6398?rik=wpw3DiBmY3wXfA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"3BFCE4ACB634CA9115997C177C6366200E379CC2","accentColor":"0C4A7B"},"FA42A68D46903FC3B7721A83D9BF069A843C2681":{"name":"Divecha Centre for Climate Change","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.WvhuY8JIApdAfrkSVkDNWQHaEK?pid=Api","datePublished":"2022-07-19T06:43:00.0000000Z","isFamilyFriendly":true,"contentUrl":"http://dccc.iisc.ac.in/assets/images/IMG_27_JAN_2022.jpg","hostPageUrl":"http://dccc.iisc.ac.in/gallery_2022.html","contentSize":"161344 B","width":1280,"height":720,"cDNContentUrl":"https://th.bing.com/th/id/R.5af86e63c2480297407eb9125640cd59?rik=ryRq2GQJ8zx7Jw&riu=http%3a%2f%2fdccc.iisc.ac.in%2fassets%2fimages%2fIMG_27_JAN_2022.jpg&ehk=sklc9Y0uBR%2bCthE9jfdHH1pVVJnsC9nMDNpxtclAtts%3d&risl=&pid=ImgRaw&r=0","isTransparent":false,"imageId":"1862C348A960FB9D38A1277B3CF30964D86A24AF","accentColor":"4B6880"},"7D1A40EEA0031340FA215A95FB549D64761715FB":{"name":"Delhi's Winter Air Pollution Case Study | Delhi Smog Case Study","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.t1q0qzNjUhPcNFjL2XQpRgHaKd?pid=Api","datePublished":"2022-06-09T06:54:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.ceew.in/sites/default/files/AQ_0.png","hostPageUrl":"https://www.ceew.in/publications/delhi-winter-pollution-2021-case-study-on-air-quality-management","contentSize":"281957 B","width":586,"height":828,"cDNContentUrl":"https://th.bing.com/th/id/R.b75ab4ab33635213dc3458cbd9742946?rik=16EE7gowMQSvEg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"BF51716746D945BF59A512AF0431300AEE04A1D7","accentColor":"1985B2"},"B5CC9E1041FEAA9E090F30D4BB50307A5BBAB25F":{"name":"Current multilateral system failing to mitigate climate change: India","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.N_ae2pJklbSupL4GMoZC-wHaFK?pid=Api","datePublished":"2025-03-05T13:49:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB1hRljP.img?w=768&h=536&m=6&x=1580&y=852&s=1224&d=1224","hostPageUrl":"https://www.msn.com/en-in/news/India/current-multilateral-system-failing-to-mitigate-climate-change-india/ar-AA1AiH8m","contentSize":"65536 B","width":768,"height":536,"cDNContentUrl":"https://th.bing.com/th/id/R.37f69eda926495b4aea4be06328642fb?rik=W8zpARTvqumQ8A&pid=ImgRaw&r=0","isTransparent":false,"imageId":"F52BABB5A70305BB4D03F090E9AAEF1401E9CC5B","accentColor":"1454B7"},"972DDB89DFC27973C36E582E61DE9D5E19C0AF1A":{"name":"Mapping Vulnerabilities | Economic and Political Weekly","thumbnailUrl":"https://tse3.mm.bing.net/th?id=OIF.1%2bfVV9xyJX1aJZy45%2fdnBA&pid=Api","datePublished":"2026-01-30T06:25:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.epw.in/themes/contrib/epw/images/paywall.jpg","hostPageUrl":"https://www.epw.in/journal/special-articles/mapping-vulnerabilities.html","contentSize":"355314 B","width":2362,"height":1653,"cDNContentUrl":"https://th.bing.com/th/id/R.8a478eb56327fd9c1269bd5e968f9cad?rik=&pid=ImgRaw&r=0","isTransparent":false,"imageId":"A1FA0C91E5D9ED16E285E63C37972CFD98BDD279","accentColor":"AA2124","isFresh":true},"73BCFDCD99EB8F4144FE5DF7C7B6495C26C7A4ED":{"name":"IIT Researchers develop new method to mitigate Acid Mine Drainage from ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.wHDSzw9e0ukS6TyfmjtlTgHaEK?pid=Api","datePublished":"2022-06-30T14:41:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://akm-img-a-in.tosshub.com/lingo/itne/images/photo_gallery/202206/iit-researcher.jpg","hostPageUrl":"https://www.indiatodayne.in/assam/photo/iit-researchers-develop-new-method-mitigate-acid-mine-drainage-northeastern-coalfields-418489-2022-06-28","contentSize":"145013 B","width":1200,"height":675,"cDNContentUrl":"https://th.bing.com/th/id/R.c070d2cf0f5ed2e912e93c9f9a3b654e?rik=N8vf3Jm%2b%2bBRE7w&pid=ImgRaw&r=0","isTransparent":false,"imageId":"DE4A7C62C5946B7C7FD5EF4414F8BE99DCDFCB37","accentColor":"184480"},"27D99B72245BEE2E75768878E584536277FAB9D9":{"name":"Buy Festa Radon AMG Spirit Radon Fan - Quiet and Energy Efficient 121 ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.43y4Pd_GE__gnPtQ2Q5RTAHaHa?pid=Api","datePublished":"2022-09-22T06:43:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://i5.walmartimages.com/asr/b1fe0aa5-04ad-4491-bdb4-5da26cce9883.08ad3c16be7e167def23ac8da5bad5cf.jpeg","hostPageUrl":"https://www.ubuy.co.in/product/5BTZSBWKO-festa-radon-amg-spirit-radon-fan-quiet-and-energy-efficient-121-cfm-radon-mitigation-system-inline-fan-5","contentSize":"220769 B","width":4000,"height":4000,"cDNContentUrl":"https://th.bing.com/th/id/R.e37cb83ddfc613ffe09cfb50d90e514c?rik=cp25J0K17uJXZw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"9D9BAF772635485E87886757E2EEB54227B99D72","accentColor":"A82328"},"1BE2BEBD56DC0A5C1C42C89ACC890AC58917ACFA":{"name":"Mitigate migraine","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.rTUV3ZEcv1sRvmRVQisx3AAAAA?pid=Api","datePublished":"2022-07-13T00:32:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://static.toiimg.com/thumb/imgsize-174424,msid-92835377,width-400,resizemode-4/92835377.jpg","hostPageUrl":"https://bangaloremirror.indiatimes.com/opinion/you/mitigate-migraine/articleshow/92835330.cms","contentSize":"21267 B","width":400,"height":300,"cDNContentUrl":"https://th.bing.com/th/id/R.ad3515dd911cbf5b11be6455422b31dc?rik=sS7r22XNoMXBJA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"AFCA71985CA098CCA98C24C1C5A0CD65DBEB2EB1","accentColor":"752021"},"57E1A789309B80E24C5720C60200C4664290E2DA":{"name":"Symptoms, Treatment And Preventative Measures Of Bronchitis | OnlyMyHealth","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.CsFEG53Ve9kk4713xLxj_gHaEK?pid=Api","datePublished":"2022-12-31T04:31:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://images.onlymyhealth.com/imported/images/2022/December/30_Dec_2022/main_copd.jpg","hostPageUrl":"https://www.onlymyhealth.com/symptoms-treatment-and-preventative-measures-of-bronchitis-1672401096","contentSize":"43171 B","width":1200,"height":675,"cDNContentUrl":"https://th.bing.com/th/id/R.0ac1441b9dd57bd924e3bd77c4bc63fe?rik=dR56mAO5CC7EdQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"AD2E0924664C00206C0275C42E08B903987A1E75","accentColor":"C98002"},"4D4C28948D5519DCA2572B9C7C1083367C98F20C":{"name":"World has been discussing global warming and how to mitigate it for the ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.sAr17hoeMr8TaHmOaBWbCwAAAA?pid=Api","datePublished":"2016-01-25T11:26:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://static.toiimg.com/photo/50718482.cms","hostPageUrl":"https://timesofindia.indiatimes.com/videos/news/World-has-been-discussing-global-warming-and-how-to-mitigate-it-for-the-last-one-year-PM-Modi/videoshow/50718482.cms","contentSize":"6805 B","width":365,"height":270,"cDNContentUrl":"https://th.bing.com/th/id/R.b00af5ee1a1e32bf1368798e68159b0b?rik=1MSCSdhVkc0qdQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"C02F89C7633801C7C9B2752ACD9155D84982C4D4","accentColor":"5F3F3E"},"5BDCBA58C39788CFEE83DF1794E9C04D0B6B0394":{"name":"Pre-disaster Mitigation (PDM) grant program icon","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.1zzYHTX7h_Lr_VXo24PbWwAAAA?pid=Api","datePublished":"2021-12-30T16:26:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://emilms.fema.gov/is_0031b/media/388.png","hostPageUrl":"https://emilms.fema.gov/is_0031b/groups/15.html","contentSize":"29449 B","width":110,"height":159,"cDNContentUrl":"https://th.bing.com/th/id/R.d73cd81d35fb87f2ebfd55e8db83db5b?rik=tc2rhTx5iPzuOA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"4930B6B0D40C9E4971FD38EEFC88793C85ABCDB5","accentColor":"C26609"},"BF0D9A5288900E953D5A73B89B6212D18459F021":{"name":"Delhi Govt committed to mitigate sufferings of displaced Kashmiri ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.2-t9oARwZ4xTTiISRGOBPAHaFF?pid=Api","datePublished":"2025-05-26T01:39:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.crosstownnews.in/Banner-Pics/SOOD.jpg","hostPageUrl":"https://www.crosstownnews.in/post/142532/delhi-govt-committed-to-mitigate-sufferings-of-displaced-kps-sood.html","contentSize":"83202 B","width":632,"height":434,"cDNContentUrl":"https://th.bing.com/th/id/R.dbeb7da00470678c534e22124463813c?rik=%2b9CpJYgJ4FnTpQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"120F95481D2126B98B37A5D359E0098825A9D0FB","accentColor":"41306D"},"42B443676C092F13A93972E46215A804F34CA9C6":{"name":"US reciprocal tariffs: India can plan some ’easy wins’ for Trump to ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.4v8L_1MoGSdN9lLmsydOGwHaE7?pid=Api","datePublished":"2025-03-27T11:19:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://i-invdn-com.investing.com/news/LYNXMPEE390KX_L.jpg","hostPageUrl":"https://in.investing.com/news/economy/us-reciprocal-tariffs-india-can-plan-some-easy-wins-for-trump-to-mitigate-larger-impact-4743688","contentSize":"66961 B","width":800,"height":533,"cDNContentUrl":"https://th.bing.com/th/id/R.e2ff0bff532819274df652e6b3274e1b?rik=JEs0dsaQ8jGakw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"6C9AC43F408A51264E27939A31F290C676344B24","accentColor":"A22E29"},"00C43D0F4E53D98AFD2330B2C7CC5C07F336B1B3":{"name":"'Apply updates': Govt issues high risk warning for Google Chrome users ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.SCOZ2DLUxB1n4mub0DUrrgHaEK?pid=Api","datePublished":"2023-08-10T16:42:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://akm-img-a-in.tosshub.com/businesstoday/images/story/202308/google_chrome-sixteen_nine.jpg?size=948:533","hostPageUrl":"https://www.businesstoday.in/latest/story/apply-updates-govt-issues-high-risk-warning-for-google-chrome-users-393682-2023-08-10","contentSize":"17306 B","width":948,"height":533,"cDNContentUrl":"https://th.bing.com/th/id/R.482399d832d4c41d67e26b9bd0352bae?rik=AEzT8OQ1najfMg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"3B1B633F70C5CC7C2B0332DFA89D35E4F0D34C00","accentColor":"C70415"},"62DCAE0D17284C8580091129168C0692EDC9D54B":{"name":"Cash Solution in pune, Cash Solution companies in Lucknow, Cash ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.2JLNwWEG45Rvya0ux-M8zAHaHa?pid=Api","datePublished":"2023-08-26T11:00:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://vankan.co.in/docs/docfile_87478352.webp","hostPageUrl":"https://vankan.co.in/blog/mitigating-risks-with-cash-solutions","contentSize":"114608 B","width":1080,"height":1080,"cDNContentUrl":"https://th.bing.com/th/id/R.d892cdc16106e3946fc9ad2ec7e33ccc?rik=Js3q0HGCxFgIkA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"B45D9CDE2960C8619211900858C48271D0EACD26","accentColor":"C98502"},"E1C8F86D069698EBA8D6B7AFD589774B5B8F2E78":{"name":"TSK Automations || Security Services","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.3ZEYieqgjZdnnJNb9g4mtwHaE8?pid=Api","datePublished":"2024-12-10T03:56:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://tskautomations.com/ContentImg/DatabaseSecurity.jpg","hostPageUrl":"https://tskautomations.com/Securityservices.html","contentSize":"43796 B","width":600,"height":400,"cDNContentUrl":"https://th.bing.com/th/id/R.dd911889eaa08d97679c935bf60e26b7?rik=HoyP1mBpib6KbQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"87E2F8B5B477985DFA7B6D8ABE896960D68F8C1E","accentColor":"1B6AB0"},"80FA889F10A57FF2642111E1BF434076D37ED9F2":{"name":"Identify best practices to mitigate defaulting of vehicle loans ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.Lh9ewSzSaaH3EHl948VXYAHaEK?pid=Api","datePublished":"2022-09-18T07:36:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://i.vimeocdn.com/video/1508765806-a25e1ba818fbaed932bf903cd57558ea7d1771c7aba5e9cceb83dcfcf650e311-d_640.jpg","hostPageUrl":"https://www.mentormind.in/menternships/identify-best-practices-to-mitigate-defaulting-of-vehicle-loans","contentSize":"16492 B","width":640,"height":360,"cDNContentUrl":"https://th.bing.com/th/id/R.2e1f5ec12cd269a1f710797de3c55760?rik=CK%2bI%2bQFa9y9GEg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"2F9DE73D670434FB1E1112462FF75A01F988AF08","accentColor":"C79A04"},"34534BC72AF4908A5901A20786636AFBA6CA704A":{"name":"Brené Brown Quote: “Trust is a product of vulnerability that grows over ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.ppbY0QhZpMI1yskab3vdtwHaEK?pid=Api","datePublished":"2020-08-27T11:55:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://quotefancy.com/media/wallpaper/1600x900/4709011-Bren-Brown-Quote-Trust-is-a-product-of-vulnerability-that-grows.jpg","hostPageUrl":"https://quotefancy.com/quote/777871/Bren-Brown-Trust-is-a-product-of-vulnerability-that-grows-over-time-and-requires-work","contentSize":"89047 B","width":1600,"height":900,"cDNContentUrl":"https://th.bing.com/th/id/R.a696d8d10859a4c235cac91a6f7bddb7?rik=QzW0fKJPCaiVEA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"A407AC6ABFA63668702A1095A8094FA27CB43543","accentColor":"C95E02"},"D7EE475D927A1D99F06392BE46465155318512F7":{"name":"Google: Google says Spanish spyware vendor exploited zero-day ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.2nR534JDcrRWhmLLRFzurAHaEB?pid=Api","datePublished":"2022-12-01T04:30:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://static.toiimg.com/thumb/msid-95902315,width-1070,height-580,imgsize-34850,resizemode-75,overlay-toi_sw,pt-32,y_pad-40/photo.jpg","hostPageUrl":"https://timesofindia.indiatimes.com/gadgets-news/google-says-spanish-spyware-vendor-exploited-zero-day-vulnerabilities-in-chrome-firefox-and-windows/articleshow/95902367.cms","contentSize":"39968 B","width":1068,"height":580,"cDNContentUrl":"https://th.bing.com/th/id/R.da7479df824372b4568662cb445ceeac?rik=fe501Smn0ZkPNg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"7F21581355156464EB29360F99D1A729D574EE7D","accentColor":"C80303"},"428E153C7C2B8625C1BF932414AB835DD79BEF79":{"name":"Cisco Vulnerability Management (formerly Kenna.VM) - Cisco","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.JFE5Zz6-HGS8OatMGD_nxAHaDC?pid=Api","datePublished":"2015-10-19T08:14:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.cisco.com/content/dam/cisco-cdc/site/images/heroes/products/security/vulnerability-management-hero-index-desktop-3200x1312.jpg","hostPageUrl":"https://www.cisco.com/site/in/en/products/security/vulnerability-management/index.html","contentSize":"215639 B","width":3200,"height":1312,"cDNContentUrl":"https://th.bing.com/th/id/R.245139673ebe1c64bc39ab4c183fe7c4?rik=JOhRw8eyaFIc%2bw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"97FEB97DD538BA414239FB1C5268B2C7C351E824","accentColor":"042F76"},"FA860936340BD5369A92F77B61178206C7D8A7D2":{"name":"Chapter 3 Risk Assessments: Understanding Vulnerabilities and ...","thumbnailUrl":"https://tse2.mm.bing.net/th?id=OIF.ZMn%2bzyrPSS7GOTr5c%2fREJA&pid=Api","datePublished":"2026-01-29T20:43:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://website-assets.studocu.com/img/document_thumbnails/00c4763fb6c833a00450fa4f7d912fcf/thumb_1200_1697.png","hostPageUrl":"https://www.studocu.com/ph/document/national-university-philippines/accountancy/chapter-3-risk-assessments-understanding-vulnerabilities-and-mitigation/152017133","contentSize":"206131 B","width":1200,"height":1697,"cDNContentUrl":"https://th.bing.com/th/id/R.6ee2bb1f09a7391d06cb16ce2af668c6?rik=&pid=ImgRaw&r=0","isTransparent":false,"imageId":"2D7A8D7C60287116B77F29A9635DB043639068AF","accentColor":"131313","isFresh":true}},"relatedSearches":[{"text":"Software Vulnerabilities","displayText":"Software Vulnerabilities","webSearchUrl":"https://www.bing.com/images/search?q=Software+Vulnerabilities&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5834.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Software+Vulnerabilities","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Software+Vulnerabilities&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Mitigating Threats","displayText":"Mitigating Threats","webSearchUrl":"https://www.bing.com/images/search?q=Mitigating+Threats&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5836.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Mitigating+Threats","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Mitigating+Threats&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Software Vulnerability","displayText":"Software Vulnerability","webSearchUrl":"https://www.bing.com/images/search?q=Software+Vulnerability&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5838.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Software+Vulnerability","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Software+Vulnerability&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Risk and Mitigation Plan Template","displayText":"Risk and Mitigation Plan Template","webSearchUrl":"https://www.bing.com/images/search?q=Risk+and+Mitigation+Plan+Template&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5840.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Risk+and+Mitigation+Plan+Template","thumbnail":{"thumbnailUrl":"https://tse1.mm.bing.net/th?q=Risk+and+Mitigation+Plan+Template&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Risk Mitigation Techniques","displayText":"Risk Mitigation Techniques","webSearchUrl":"https://www.bing.com/images/search?q=Risk+Mitigation+Techniques&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5842.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Risk+Mitigation+Techniques","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Risk+Mitigation+Techniques&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Hardware Vulnerabilities","displayText":"Hardware Vulnerabilities","webSearchUrl":"https://www.bing.com/images/search?q=Hardware+Vulnerabilities&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5844.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Hardware+Vulnerabilities","thumbnail":{"thumbnailUrl":"https://tse1.mm.bing.net/th?q=Hardware+Vulnerabilities&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Security Vulnerability","displayText":"Security Vulnerability","webSearchUrl":"https://www.bing.com/images/search?q=Security+Vulnerability&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5846.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Security+Vulnerability","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Security+Vulnerability&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Infrastructure Vulnerability","displayText":"Infrastructure Vulnerability","webSearchUrl":"https://www.bing.com/images/search?q=Infrastructure+Vulnerability&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5848.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Infrastructure+Vulnerability","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=Infrastructure+Vulnerability&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Mitigating Ssrf Vulnerabilities Images","displayText":"Mitigating Ssrf Vulnerabilities Images","webSearchUrl":"https://www.bing.com/images/search?q=Mitigating+Ssrf+Vulnerabilities+Images&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5850.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Mitigating+Ssrf+Vulnerabilities+Images","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=Mitigating+Ssrf+Vulnerabilities+Images&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Risk Mitigation Strategies","displayText":"Risk Mitigation Strategies","webSearchUrl":"https://www.bing.com/images/search?q=Risk+Mitigation+Strategies&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5852.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Risk+Mitigation+Strategies","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Risk+Mitigation+Strategies&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Mitigate Vulnerabilities","displayText":"Mitigate Vulnerabilities","webSearchUrl":"https://www.bing.com/images/search?q=Mitigate+Vulnerabilities&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5854.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Mitigate+Vulnerabilities","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Mitigate+Vulnerabilities&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Risks and Vulnerabilities","displayText":"Risks and Vulnerabilities","webSearchUrl":"https://www.bing.com/images/search?q=Risks+and+Vulnerabilities&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5856.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Risks+and+Vulnerabilities","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=Risks+and+Vulnerabilities&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Cyber Threats and Vulnerabilities","displayText":"Cyber Threats and Vulnerabilities","webSearchUrl":"https://www.bing.com/images/search?q=Cyber+Threats+and+Vulnerabilities&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5858.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Cyber+Threats+and+Vulnerabilities","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=Cyber+Threats+and+Vulnerabilities&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Threat Vulnerability Assessment","displayText":"Threat Vulnerability Assessment","webSearchUrl":"https://www.bing.com/images/search?q=Threat+Vulnerability+Assessment&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5860.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Threat+Vulnerability+Assessment","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Threat+Vulnerability+Assessment&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Vulnerability Management","displayText":"Vulnerability Management","webSearchUrl":"https://www.bing.com/images/search?q=Vulnerability+Management&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5862.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Vulnerability+Management","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=Vulnerability+Management&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Framework for Mitigating Open Source Vulnerabilities","displayText":"Framework for Mitigating Open Source Vulnerabilities","webSearchUrl":"https://www.bing.com/images/search?q=Framework+for+Mitigating+Open+Source+Vulnerabilities&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5864.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Framework+for+Mitigating+Open+Source+Vulnerabilities","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Framework+for+Mitigating+Open+Source+Vulnerabilities&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Hardware Vulnerability List","displayText":"Hardware Vulnerability List","webSearchUrl":"https://www.bing.com/images/search?q=Hardware+Vulnerability+List&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5866.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Hardware+Vulnerability+List","thumbnail":{"thumbnailUrl":"https://tse1.mm.bing.net/th?q=Hardware+Vulnerability+List&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Web Application Vulnerabilities","displayText":"Web Application Vulnerabilities","webSearchUrl":"https://www.bing.com/images/search?q=Web+Application+Vulnerabilities&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5868.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Web+Application+Vulnerabilities","thumbnail":{"thumbnailUrl":"https://tse1.mm.bing.net/th?q=Web+Application+Vulnerabilities&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Identify Security Vulnerabilities","displayText":"Identify Security Vulnerabilities","webSearchUrl":"https://www.bing.com/images/search?q=Identify+Security+Vulnerabilities&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5870.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Identify+Security+Vulnerabilities","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Identify+Security+Vulnerabilities&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Standard SLA for Mitigating OWASP Vulnerabilities","displayText":"Standard SLA for Mitigating OWASP Vulnerabilities","webSearchUrl":"https://www.bing.com/images/search?q=Standard+SLA+for+Mitigating+OWASP+Vulnerabilities&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5872.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Standard+SLA+for+Mitigating+OWASP+Vulnerabilities","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Standard+SLA+for+Mitigating+OWASP+Vulnerabilities&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Mitigating Vulnerabilities in Biometric Security Presentation Slides","displayText":"Mitigating Vulnerabilities in Biometric Security Presentation Slides","webSearchUrl":"https://www.bing.com/images/search?q=Mitigating+Vulnerabilities+in+Biometric+Security+Presentation+Slides&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5874.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Mitigating+Vulnerabilities+in+Biometric+Security+Presentation+Slides","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Mitigating+Vulnerabilities+in+Biometric+Security+Presentation+Slides&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Mitigation vs Preparedness","displayText":"Mitigation vs Preparedness","webSearchUrl":"https://www.bing.com/images/search?q=Mitigation+vs+Preparedness&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5876.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Mitigation+vs+Preparedness","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Mitigation+vs+Preparedness&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Threat vs Exploit","displayText":"Threat vs Exploit","webSearchUrl":"https://www.bing.com/images/search?q=Threat+vs+Exploit&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5878.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Threat+vs+Exploit","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Threat+vs+Exploit&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Remediate Vulnerabilities","displayText":"Remediate Vulnerabilities","webSearchUrl":"https://www.bing.com/images/search?q=Remediate+Vulnerabilities&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5880.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Remediate+Vulnerabilities","thumbnail":{"thumbnailUrl":"https://tse1.mm.bing.net/th?q=Remediate+Vulnerabilities&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"EC-Council Web Vulnerabilities","displayText":"EC-Council Web Vulnerabilities","webSearchUrl":"https://www.bing.com/images/search?q=EC-Council+Web+Vulnerabilities&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5882.1","searchLink":"https://www.bing.com/api/v7/images/search?q=EC-Council+Web+Vulnerabilities","thumbnail":{"thumbnailUrl":"https://tse1.mm.bing.net/th?q=EC-Council+Web+Vulnerabilities&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Mitigating Vuklnerabiliuties Images","displayText":"Mitigating Vuklnerabiliuties Images","webSearchUrl":"https://www.bing.com/images/search?q=Mitigating+Vuklnerabiliuties+Images&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5884.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Mitigating+Vuklnerabiliuties+Images","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=Mitigating+Vuklnerabiliuties+Images&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}}],"createdate":1769840767158}
[curl_error] =>
[product_name_used] => Mitigating-Vulnerabilities
[parsed] => Array
(
[name] => mitigating-vulnerabilities inr loc:in
[totalEstimatedMatches] => 259
[nextOffset] => 120
[currentOffset] => 0
[value] => Array
(
[5F9D9FB9DD8C747342CCFE05591104F96426A410] => Array
(
[name] => INR Full Form: What is full form of INR?
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.-HbYAKjSJ-4PC_ZocKUqaAHaEU?pid=Api
[datePublished] => 2022-11-05T12:08:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://st.adda247.com/https://wpassets.adda247.com/wp-content/uploads/multisite/2022/11/05144815/What-is-INR.png
[hostPageUrl] => https://www.bankersadda.com/inr-full-form/
[contentSize] => 35329 B
[width] => 720
[height] => 420
[cDNContentUrl] => https://th.bing.com/th/id/R.f876d800a8d227ee0f0bf66870a52a68?rik=9dn5m93IRzckzA&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 014A62469F40119550EFCC243747C8DD9BF9D9F5
[accentColor] => B71414
)
[472CA413B663384E22D3DB4D66240A4631A4B138] => Array
(
[name] => How to mitigate risks in Business? - Enterslice Private Limited
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.owf7uZo3sdWe_1tcx7XuAgHaE2?pid=Api
[datePublished] => 2021-03-31T06:51:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://enterslice.com/learning/wp-content/uploads/2021/03/image001-58.png
[hostPageUrl] => https://enterslice.com/learning/how-to-mitigate-risks-in-business/
[contentSize] => 48298 B
[width] => 1006
[height] => 660
[cDNContentUrl] => https://th.bing.com/th/id/R.a307fbb99a37b1d59eff5b5cc7b5ee02?rik=dMJKMWs2g%2bQiPQ&pid=ImgRaw&r=0
[isTransparent] => 1
[imageId] => 831B4A1364A04266D4BD3D22E483366B314AC274
[accentColor] => 029E94
)
[EB082A4D62DD3E745D3492781AFD11C52FDEABA5] => Array
(
[name] => Insurance to Mitigate Vulnerabilities
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.Lxh1VC5lGKrQk0u-V3tc5AHaEK?pid=Api
[datePublished] => 2024-10-19T07:33:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.studyiq.com/articles/wp-content/uploads/2024/10/18175806/Insurance-to-Mitigate-Vulnerabilities-blog.png
[hostPageUrl] => https://www.studyiq.com/articles/insurance-to-mitigate-vulnerabilities/
[contentSize] => 627544 B
[width] => 1280
[height] => 720
[cDNContentUrl] => https://th.bing.com/th/id/R.2f1875542e6518aad0934bbe577b5ce4?rik=voCi1Cbd40fVQw&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 5ABAEDF25C11DFA1872943D547E3DD26D4A280BE
[accentColor] => 690F0F
)
[9B67AEEA4AB579B2D331D500CC6E326A45C7CE1F] => Array
(
[name] => ED 25-02: Mitigate Microsoft Exchange Vulnerability | CISA
[thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.fJ-NZUTZOPstRkUnnA85ZwHaEK?pid=Api
[datePublished] => 2025-08-07T17:48:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.cisa.gov/sites/default/files/styles/large/public/2025-08/WEB%2025-0280%20ED%2025-02_08062026_STANDARD%20WEB%20-%20700x394.jpg?itok=PhC8dmg0
[hostPageUrl] => https://www.cisa.gov/news-events/directives/ed-25-02-mitigate-microsoft-exchange-vulnerability
[contentSize] => 77087 B
[width] => 1024
[height] => 576
[cDNContentUrl] => https://th.bing.com/th/id/R.7c9f8d6544d938fb2d4645279c0f3967?rik=uXbqrqRblys9Ew&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => F1EC7C54A623E6CC005D133D2B975BA4AEEA76B9
[accentColor] => AF1C2E
)
[D97F01AE233860EB47FB91979665F1616F1A6422] => Array
(
[name] => Green and Blue Infrastructure as Nature-Based Better Preparedness ...
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.lNRC04BiQZdfRwZhVwIm5QHaDp?pid=Api
[datePublished] => 2022-12-02T17:56:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.mdpi.com/sustainability/sustainability-14-16155/article_deploy/html/images/sustainability-14-16155-g001.png
[hostPageUrl] => https://www.mdpi.com/2071-1050/14/23/16155
[contentSize] => 342821 B
[width] => 3095
[height] => 1524
[cDNContentUrl] => https://th.bing.com/th/id/R.94d442d3806241975f470661570226e5?rik=nfcQ6jKDBr50vw&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 2246A1F6161F56697919BF74BE068332EA10F79D
[accentColor] => 014A95
)
[B33F22511E0499B42D4B6CE4B3B78B25238DC30B] => Array
(
[name] => A guide to implement effective cloud vulnerability scanning | nasscom ...
[thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.1vF25VD0pQBnph3u_9UWJAHaEo?pid=Api
[datePublished] => 2023-05-09T08:58:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://community.nasscom.in/sites/default/files/media/images/Secure-your-cloud-with-vulnerability-scanning-Nasscom.jpg
[hostPageUrl] => https://community.nasscom.in/communities/cyber-security-privacy/guide-implement-effective-cloud-vulnerability-scanning
[contentSize] => 258453 B
[width] => 960
[height] => 600
[cDNContentUrl] => https://th.bing.com/th/id/R.d6f176e550f4a50067a61deeffd51624?rik=O%2fMiFeFAmUvStA&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => B03CD83252B87B3B4EC6B4D24B9940E11522F33B
[accentColor] => C97E02
)
[122F549128D6A6F12EB2D322FBE808F5568EBFD0] => Array
(
[name] => Protect Edge
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.avnfA0Yfgnid7OWLByHr8AHaCL?pid=Api
[datePublished] => 2024-06-14T04:34:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.protectedge.in/img/vulnerability1.jpg
[hostPageUrl] => https://www.protectedge.in/security_assessment_services.html
[contentSize] => 92323 B
[width] => 965
[height] => 285
[cDNContentUrl] => https://th.bing.com/th/id/R.6af9df03461f82789dece58b0721ebf0?rik=IfJFGYJtah%2fiKw&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 0DFBE8655F808EBF223D2BE21F6A6D821945F221
[accentColor] => 0C91BF
)
[52393C74378345BFCEFF6D41DCC644A9A6502A46] => Array
(
[name] => Natural Disasters—Origins, Impacts, Management
[thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.LMyEFNAFLK53hN2_K8p6jwHaFY?pid=Api
[datePublished] => 2021-10-30T09:14:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://pub.mdpi-res.com/encyclopedia/encyclopedia-01-00084/article_deploy/html/images/encyclopedia-01-00084-g008.png?1669875133
[hostPageUrl] => https://www.mdpi.com/2673-8392/1/4/84
[contentSize] => 943601 B
[width] => 2578
[height] => 1872
[cDNContentUrl] => https://th.bing.com/th/id/R.2ccc8414d0052cae7784ddbf2bca7a8f?rik=JZPDR3M4VPvs%2fw&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 64A2056A9A446CCD14D6FFECFB54387347C39325
[accentColor] => CA9901
)
[0D246E7A899F569829A45FCAEA3F9D112D7641BE] => Array
(
[name] => Vulnerability Management Process :: Arpit Mittal
[thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.GvnB_qGlauwMMaWsQRznNgHaEK?pid=Api
[datePublished] => 2023-09-23T09:39:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://0xarpit.in/VM_hu01a84c255eee042d17f08865a630298a_102629_800x600_fit_box_3.png
[hostPageUrl] => https://0xarpit.in/posts/2023/04/vulnerability-management-process/
[contentSize] => 34876 B
[width] => 800
[height] => 450
[cDNContentUrl] => https://th.bing.com/th/id/R.1af9c1fea1a56aec0c31a5ac411ce736?rik=0ELmp5j5ZYmSSg&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => EB1467D211D9F3AEACF54A928965F998A7E642D0
[accentColor] => 0257C9
)
[056EEB5B526FA6BDF050C5CC9E69A5A966F0AE28] => Array
(
[name] => How ESG can Mitigate Risks & Enhance Returns for Investors - Enterslice
[thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.Cpxq4jpgEeaejkEdfXeZeAHaD4?pid=Api
[datePublished] => 2023-04-07T10:10:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://enterslice.com/learning/wp-content/uploads/2023/04/MicrosoftTeams-image-81.jpg
[hostPageUrl] => https://enterslice.com/learning/how-esg-can-mitigate-risks-and-enhance-returns-for-investors/
[contentSize] => 66342 B
[width] => 920
[height] => 483
[cDNContentUrl] => https://th.bing.com/th/id/R.0a9c6ae23a6011e69e8e411d7d779978?rik=UOa%2btSX2atsPBQ&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 82EA0F669A5A96E9CC5C050FDB6AF625B5BEE650
[accentColor] => 084BC3
)
[4596CEC011C63C50B424DFDD018C6E8C6A9D79B7] => Array
(
[name] => CVE-2025-47956: Understanding and Mitigating the Windows Security App ...
[thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.LpdJOPHx_eUS0FLccV7WtAHaLH?pid=Api
[datePublished] => 2025-07-21T01:55:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://cpanel.ogma.in/static/img/cato-sase.png
[hostPageUrl] => https://cpanel.ogma.in/cve-2025-47956-understanding-and-mitigating-the-windows-security-app-spoofing-vulnerability
[contentSize] => 1937709 B
[width] => 1024
[height] => 1536
[cDNContentUrl] => https://th.bing.com/th/id/R.2e974938f1f1fde512d052dc715ed6b4?rik=VGnsDBFswwVLQg&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 7B97D9A6C8E6C810DDFD424B05C36C110CEC6954
[accentColor] => 001F34
)
[1A860B9D6027D090677D31A7625FC9012582B35D] => Array
(
[name] => 15 Ways to Minimize Financial Risks in Business | NetSuite
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP._Gv5QF6PgUilJ7kFjr0sJQHaFd?pid=Api
[datePublished] => 2023-07-28T18:55:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.netsuite.com/portal/assets/img/business-articles/financial-management/infographic-mitigate-financial-risk.jpg
[hostPageUrl] => https://www.netsuite.com/portal/resource/articles/financial-management/minimize-financial-risks.shtml
[contentSize] => 184357 B
[width] => 1930
[height] => 1422
[cDNContentUrl] => https://th.bing.com/th/id/R.fc6bf9405e8f8148a527b9058ebd2c25?rik=oWiw2QZyDQl21w&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => D53B2852109CF5267A13D776090D7206D9B068A1
[accentColor] => BC2E0F
)
[A38952FFAE18525569E12DB7836CE8688434118E] => Array
(
[name] => Mitigating Packet Reordering - NS2 Projects | S-Logix
[thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.pFfV19rBxfOSnbVA6QuqUAHaDN?pid=Api
[datePublished] => 2022-05-07T16:29:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://slogix.in/images/wireless-sensor-networks/mitigating-packet-reordering-for-random-packet-spraying-in-data-center-networks.jpg
[hostPageUrl] => https://slogix.in/wireless-sensor-networks/mitigating-packet-reordering-for-random-packet-spraying-in-data-center-networks/
[contentSize] => 63233 B
[width] => 830
[height] => 360
[cDNContentUrl] => https://th.bing.com/th/id/R.a457d5d7dac1c5f3929db540e90baa50?rik=Opgl%2f%2bqBJVWWHg&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => E8114348868EC6387BD21E96552581EAFF25983A
[accentColor] => 004A95
)
[AF442615FBA968A9C79AF1331C4305E639A3B42E] => Array
(
[name] => A Socio-Ecological Approach to Mitigating Wildfire Vulnerability in the ...
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.5cvR9SjoLIhcEnyIsn1qPAHaFG?pid=Api
[datePublished] => 2019-02-28T12:09:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://pub.mdpi-res.com/fire/fire-02-00009/article_deploy/html/images/fire-02-00009-g002.png?1571072557
[hostPageUrl] => https://www.mdpi.com/2571-6255/2/1/9
[contentSize] => 507954 B
[width] => 3475
[height] => 2390
[cDNContentUrl] => https://th.bing.com/th/id/R.e5cbd1f528e82c885c127c88b27d6a3c?rik=%2bkRiUb%2bahpp8qQ&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => E24B3A936E5034C1331FA97C9A869ABF516244FA
[accentColor] => 3A3A3A
)
[4B64B874FF13117629CEBBC0D482F00B1A2DC44F] => Array
(
[name] => Why Air Quality deserves more attention | CEEW
[thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.f2UWhBTCjIgj2f7qe7gL7gHaDq?pid=Api
[datePublished] => 2022-06-09T10:47:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.ceew.in/sites/default/files/mitigation-infographic.png
[hostPageUrl] => https://www.ceew.in/why-air-quality-deserves-more-attention
[contentSize] => 240994 B
[width] => 2732
[height] => 1354
[cDNContentUrl] => https://th.bing.com/th/id/R.7f65168414c28c8823d9feea7bb80bee?rik=tEaLR%2f8xEWeS7A&pid=ImgRaw&r=0
[isTransparent] => 1
[imageId] => F44CD2A1B00F284D0CBBEC92671131FF478B46B4
[accentColor] => 2C839F
)
[24E39186CE784150BCC9AFF5FFA17C4D0F3A52A1] => Array
(
[name] => Setting up a Broken Web Application pentesting lab Environment
[thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.UGnysvFXu-8LbZI5feyLkwHaDJ?pid=Api
[datePublished] => 2024-02-28T00:05:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwYgiiCAAedFEtChocFP0IHEHXO34vNHf7G_B_jOWQJWTtlMk-E83I9lm0Pvlu092B64Saip9Wa5_SEda-_nROlBFHRK3kPI-KBULrZ9tT_Zxj7taX-mqpWhwboGV47pHZEx99XHGVfnV7wfYuNgNEYTa1hv3pmHLgEN4GgEZkR1p7EuvIpGVqhYnh-r_n/s1881/Picture10.png
[hostPageUrl] => https://www.cybersecmastery.in/2023/07/setting-up-broken-web-application.html
[contentSize] => 418981 B
[width] => 1881
[height] => 800
[cDNContentUrl] => https://th.bing.com/th/id/R.5069f2b2f157bbef0b6d92397dec8b93?rik=Qj4ZaOyHFAXLnA&pid=ImgRaw&r=0
[isTransparent] => 1
[imageId] => 1A25A3F0D4C71AFF5FFA9CCB051487EC68193E42
[accentColor] => 1F3663
)
[E5DDA17B954637CE0DDD6D41DCC644A9A6502A46] => Array
(
[name] => Natural Disasters—Origins, Impacts, Management
[thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.Jq7088UNPZvXC74I-qtMawHaEX?pid=Api
[datePublished] => 2021-10-30T09:14:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://pub.mdpi-res.com/encyclopedia/encyclopedia-01-00084/article_deploy/html/images/encyclopedia-01-00084-g001.png?1669875138
[hostPageUrl] => https://www.mdpi.com/2673-8392/1/4/84
[contentSize] => 2021933 B
[width] => 3399
[height] => 2001
[cDNContentUrl] => https://th.bing.com/th/id/R.26aef4f3c50d3d9bd70bbe08faab4c6b?rik=Xt0at1lkc%2bzQ3Q&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 64A2056A9A446CCD14D6DDD0EC736459B71ADD5E
[accentColor] => C40707
)
[78E6495267EF74A82106DFDD018C6E8C6A9D79B7] => Array
(
[name] => CVE-2025-47956: Understanding and Mitigating the Windows Security App ...
[thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.cuzLtZmfzOSOtWrmGwaHcwHaHa?pid=Api
[datePublished] => 2025-07-21T01:55:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://cpanel.ogma.in/static/img/bas-ad.png
[hostPageUrl] => https://cpanel.ogma.in/cve-2025-47956-understanding-and-mitigating-the-windows-security-app-spoofing-vulnerability
[contentSize] => 256034 B
[width] => 540
[height] => 540
[cDNContentUrl] => https://th.bing.com/th/id/R.72eccbb5999fcce48eb56ae61b068773?rik=h26UJXb%2bR4oSYA&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 7B97D9A6C8E6C810DDFD60128A47FE7625946E87
[accentColor] => 6B19B2
)
[BE9399325E00C821704DFAB63157593B278F85EC] => Array
(
[name] => Understanding and Mitigating CVE-2025-26679: RPC Endpoint Mapper ...
[thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.8KxZr-HRUiRp-V0Ls8yf4AHaLH?pid=Api
[datePublished] => 2025-04-27T10:57:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.ogma.in/static/img/cato-fwaas.png
[hostPageUrl] => https://ogma.in/understanding-and-mitigating-cve-2025-26679-rpc-endpoint-mapper-service-vulnerability
[contentSize] => 2371872 B
[width] => 1024
[height] => 1536
[cDNContentUrl] => https://th.bing.com/th/id/R.f0ac59afe1d1522469f95d0bb3cc9fe0?rik=6zmZI%2bUAjBIH1A&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => CE58F872B39575136BAFD407128C00E5239939EB
[accentColor] => CBA000
)
[BBD1F68B7A020B987D11ABB12F19C48B43288CB3] => Array
(
[name] => Understanding and Mitigating CVE-2025-32433: Erlang/OTP SSH Vulnerability
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.0gbq3b7rv2eVQ5QZL4ESGwHaHa?pid=Api
[datePublished] => 2025-04-20T18:50:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.ogma.in/static/img/renew-fortigate.png
[hostPageUrl] => https://www.ogma.in/understanding-and-mitigating-cve-2025-32433-erlang-otp-ssh-vulnerability
[contentSize] => 215044 B
[width] => 540
[height] => 540
[cDNContentUrl] => https://th.bing.com/th/id/R.d206eaddbeebbf67954394192f81121b?rik=ux1vuKcgsInXEQ&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 3BC88234B84C91F21BBA11D789B020A7B86F1DBB
[accentColor] => C90202
)
[5E155E515B319A3E3F9EAFDF292B19128B2D8FC7] => Array
(
[name] => Mitigating Bias in Artificial Intelligence
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.mn3zy1WnekcDbpTf6YGohgAAAA?pid=Api
[datePublished] => 2021-10-19T16:20:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://d12aarmt01l54a.cloudfront.net/cms/images/Media-20210901112956/288-305.png
[hostPageUrl] => https://indiaai.gov.in/research-reports/mitigating-bias-in-artificial-intelligence
[contentSize] => 12359 B
[width] => 288
[height] => 305
[cDNContentUrl] => https://th.bing.com/th/id/R.9a7df3cb55a77a47036e94dfe981a886?rik=5VHlFbUTqePz6Q&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 7CF8D2B82191B292FDFAE9F3E3A913B515E551E5
[accentColor] => 1881B3
)
[1CEEE659B19352989E542322383C2ABA3779C56E] => Array
(
[name] => Hackers target Microsoft SharePoint again with critical zero-days, over ...
[thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.ANbKgMW4Ch5LNK7mDLnsFwHaEN?pid=Api
[datePublished] => 2025-07-21T04:37:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://static.digit.in/Microsoft-SharePoint-Vulnerability-Mitigation-1024x582.png
[hostPageUrl] => https://www.digit.in/news/general/hackers-target-microsoft-sharepoint-again-with-critical-zero-days-over-85-servers-hit.html
[contentSize] => 66340 B
[width] => 1024
[height] => 582
[cDNContentUrl] => https://th.bing.com/th/id/R.00d6ca80c5b80a1e4b34aee60cb9ec17?rik=we5ulRs5JYnpRQ&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => E65C9773ABA2C383223245E98925391B956EEEC1
[accentColor] => 3A6E91
)
[5CF98614BB72FED82E6410D4D17B68C16B6961CE] => Array
(
[name] => Case Study - : Mitigating Cybersecurity Threats through Ethical Hacking ...
[thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.-rH2TtYzC3gTSybAUX0-VAHaKe?pid=Api
[datePublished] => 2023-08-31T04:38:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://d20ohkaloyme4g.cloudfront.net/img/document_thumbnails/0422e5c52c56307f813e62a2d12f366c/thumb_1200_1698.png
[hostPageUrl] => https://www.studocu.com/in/document/dr-babasaheb-ambedkar-marathwada-university/ethical-hacking/case-study-mitigating-cybersecurity-threats-through-ethical-hacking-and-vulnerability/68046951
[contentSize] => 204030 B
[width] => 1200
[height] => 1698
[cDNContentUrl] => https://th.bing.com/th/id/R.fab1f64ed6330b78134b26c0517d3e54?rik=xZ9oQbsn743iRg&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => EC1696B61C86B71D4D0146E28DEF27BB41689FC5
[accentColor] => 666666
)
[3FA8603EDD0106056322BF9F3851BF533319824F] => Array
(
[name] => TSA developed the Transportation Worker Identification Credential (TWIC ...
[thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.7SBa22i2eM2YNlzpmBheSQAAAA?pid=Api
[datePublished] => 2023-10-15T15:57:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.pdffiller.com/preview/426/522/426522968.png
[hostPageUrl] => https://www.pdffiller.com/426522968--TSA-developed-the-Transportation-Worker-Identification-Credential-TWIC-program-to-mitigate-threats-and-vulnerabilities-in-vessels-and-facilities-regulated-pursuant-to-the-Maritime-Transportation-Security-Act-of-2002-MT
[contentSize] => 16614 B
[width] => 298
[height] => 386
[cDNContentUrl] => https://th.bing.com/th/id/R.ed205adb68b678cd98365ce998185e49?rik=84oG490QYFA2Ig&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => F428913335FB1583F9FB2236506010DDE3068AF3
[accentColor] => 474747
)
[F84C87D9D01254A9EA7DFAB63157593B278F85EC] => Array
(
[name] => Understanding and Mitigating CVE-2025-26679: RPC Endpoint Mapper ...
[thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.6IvgPis9_b2diMiqOIVEaQHaLH?pid=Api
[datePublished] => 2025-04-27T10:57:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.ogma.in/static/img/cato-ztna.png
[hostPageUrl] => https://ogma.in/understanding-and-mitigating-cve-2025-26679-rpc-endpoint-mapper-service-vulnerability
[contentSize] => 2187720 B
[width] => 1024
[height] => 1536
[cDNContentUrl] => https://th.bing.com/th/id/R.e88be03e2b3dfdbd9d88c8aa38854469?rik=j8R4nQ0hRZqu1w&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => CE58F872B39575136BAFD7AE9A45210D9D78C48F
[accentColor] => 014961
)
[5BFD3CC13C9789179EF2498033733A34C0CDDB46] => Array
(
[name] => Mitigating Vulnerability to High and Volatile Oil Prices (Directions in ...
[thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.GbSN2F7zS3W1sBFxGQcI8QAAAA?pid=Api
[datePublished] => 2020-09-21T12:09:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://m.media-amazon.com/images/I/51pwDu0u85L._SX342_SY445_.jpg
[hostPageUrl] => https://www.amazon.in/Mitigating-Vulnerability-Volatile-Directions-Development-ebook/dp/B008EH8DRS
[contentSize] => 17023 B
[width] => 342
[height] => 443
[cDNContentUrl] => https://th.bing.com/th/id/R.19b48dd85ef34b75b5b01171190708f1?rik=td%2fDHMN5mHHpLw&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 64BDDC0C43A3373308942FE9719879C31CC3DFB5
[accentColor] => BE5E0D
)
[678244D9BAD57A6FFBFD6F23C8FBC210DB2A7335] => Array
(
[name] => Techniques for Disaster Risk Management and Mitigation (Geophysical ...
[thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.8qYjRoftrFHtOSgzIifesQAAAA?pid=Api
[datePublished] => 2025-01-23T23:45:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://m.media-amazon.com/images/I/51Efwkn2tyL.jpg
[hostPageUrl] => https://www.amazon.in/Techniques-Management-Mitigation-Geophysical-Monograph-ebook/dp/B087X54KX3
[contentSize] => 43621 B
[width] => 371
[height] => 500
[cDNContentUrl] => https://th.bing.com/th/id/R.f2a6234687edac51ed3928332227deb1?rik=dihEnatdp%2fa%2f3w&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 5337A2BD012CBF8C32F6DFBFF6A75DAB9D442876
[accentColor] => C89603
)
[DA057193C0A24066C53811B165C9B3147699E985] => Array
(
[name] => Risk Mitigating Strategies For Walled City Ahmedabad | CEPT - Portfolio
[thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.INrJRaNiY_oE3jrMf7STGgAAAA?pid=Api
[datePublished] => 2021-06-10T23:46:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://portfolio.cept.ac.in/assets/projects/feature_images/2021/featureimage_210512014715_2080572731.jpeg
[hostPageUrl] => https://portfolio.cept.ac.in/2021/S/fp/city-infrastructure-plan-ui4005-spring-2021/risk-mitigating-strategies-for-walled-city-ahmedabad-spring-2021-pui20213
[contentSize] => 60322 B
[width] => 334
[height] => 286
[cDNContentUrl] => https://th.bing.com/th/id/R.20dac945a36263fa04de3acc7fb4931a?rik=rVAXOQwqBGZcgw&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 589E9967413B9C561B11835C66042A0C391750AD
[accentColor] => 666666
)
[C9C4A38B161FB71241E2F1331C4305E639A3B42E] => Array
(
[name] => A Socio-Ecological Approach to Mitigating Wildfire Vulnerability in the ...
[thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.-p7P9ntXIiKqx2zFe8N5SQHaEn?pid=Api
[datePublished] => 2019-02-28T12:09:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.mdpi.com/fire/fire-02-00009/article_deploy/html/images/fire-02-00009-g007.png
[hostPageUrl] => https://www.mdpi.com/2571-6255/2/1/9
[contentSize] => 3533694 B
[width] => 3760
[height] => 2346
[cDNContentUrl] => https://th.bing.com/th/id/R.fa9ecff67b572222aac76cc57bc37949?rik=nEw6uGHxeyEULg&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => E24B3A936E5034C1331F2E14217BF161B83A4C9C
[accentColor] => C84903
)
[C3FEF0372FA6DBE634525CF4A248B930635B755F] => Array
(
[name] => Climate Change Adaptation and Mitigation, Types, Strategies
[thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.tL9y1SIa0B9Y4VsPOgYr7AHaEK?pid=Api
[datePublished] => 2023-10-11T10:32:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.studyiq.com/articles/wp-content/uploads/2023/10/11151914/Climate-Change-Adaptation-and-Mitigation-1.jpg
[hostPageUrl] => https://www.studyiq.com/articles/climate-change-adaptation-and-mitigation/
[contentSize] => 757505 B
[width] => 1280
[height] => 720
[cDNContentUrl] => https://th.bing.com/th/id/R.b4bf72d5221ad01f58e15b0f3a062bec?rik=PO8Pc%2fJqvW5DJQ&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => F557B536039B842A4FC525436EBD6AF2730FEF3C
[accentColor] => 807A27
)
[63528941DC5FC1CD01D3F1331C4305E639A3B42E] => Array
(
[name] => A Socio-Ecological Approach to Mitigating Wildfire Vulnerability in the ...
[thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.MgFm5JQwgKMQcG6zKmt3eAHaEM?pid=Api
[datePublished] => 2019-02-28T12:09:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.mdpi.com/fire/fire-02-00009/article_deploy/html/images/fire-02-00009-g001-550.jpg
[hostPageUrl] => https://www.mdpi.com/2571-6255/2/1/9
[contentSize] => 34316 B
[width] => 550
[height] => 312
[cDNContentUrl] => https://th.bing.com/th/id/R.320166e4943080a310706eb32a6b7778?rik=NiWYFM31HNwQPQ&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => E24B3A936E5034C1331F3D10DC1CF5CD14982536
[accentColor] => C0C308
)
[DCFCD7E48521F2858318232B8DCD1B0F4F1772CC] => Array
(
[name] => What are mitigating circumstances Doc Template | pdfFiller
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.j4zw_eX6VFxzm-7VFE5NawAAAA?pid=Api
[datePublished] => 2020-11-19T15:06:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.pdffiller.com/preview/423/578/423578502.png
[hostPageUrl] => https://www.pdffiller.com/423578502--What-are-mitigating-circumstances-
[contentSize] => 8618 B
[width] => 298
[height] => 386
[cDNContentUrl] => https://th.bing.com/th/id/R.8f8cf0fde5fa545c739beed5144e4d6b?rik=zc99TlgSL1g4gQ&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => CC2771F4F0B1DCD8B2328138582F12584E7DCFCD
[accentColor] => 676465
)
[C9102C6DE7C7F343AA365009EC026C2F1559E663] => Array
(
[name] => Mitigating Circumstances for University Doc Template | pdfFiller
[thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.-zcZzyOQr9E-6gh9wXBRhgAAAA?pid=Api
[datePublished] => 2023-11-13T03:09:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.pdffiller.com/preview/693/459/693459143.png
[hostPageUrl] => https://www.pdffiller.com/693459143--Mitigating-Circumstances-Form-for-University-
[contentSize] => 26472 B
[width] => 298
[height] => 386
[cDNContentUrl] => https://th.bing.com/th/id/R.fb3719cf2390afd13eea087dc1705186?rik=nAHC1n58PzSqYw&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 366E9551F2C620CE900563AA343F7C7ED6C2019C
[accentColor] => 0202C9
)
[D6645F9DEA210B68710882CADC93181F51B4A459] => Array
(
[name] => Vulnerability of a Northeast Mediterranean Island to Soil Loss. Can ...
[thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.lxC6gRNLt7V25Bx-GDXdqQHaDq?pid=Api
[datePublished] => 2019-07-18T09:40:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://pub.mdpi-res.com/water/water-11-01491/article_deploy/html/images/water-11-01491-g005.png?1564756217
[hostPageUrl] => https://www.mdpi.com/2073-4441/11/7/1491
[contentSize] => 432527 B
[width] => 2935
[height] => 1453
[cDNContentUrl] => https://th.bing.com/th/id/R.9710ba81134bb7b576e41c7e1835dda9?rik=bUb12a4SsIYXgA&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 954A4B15F18139CDAC28801786B012AED9F5466D
[accentColor] => 158BB1
)
[24069108ECD8970C35FBF1331C4305E639A3B42E] => Array
(
[name] => A Socio-Ecological Approach to Mitigating Wildfire Vulnerability in the ...
[thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.JR1uN4KLW_-Lg8NORpl3UgHaEr?pid=Api
[datePublished] => 2019-02-28T12:09:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.mdpi.com/fire/fire-02-00009/article_deploy/html/images/fire-02-00009-g005-550.jpg
[hostPageUrl] => https://www.mdpi.com/2571-6255/2/1/9
[contentSize] => 58720 B
[width] => 550
[height] => 348
[cDNContentUrl] => https://th.bing.com/th/id/R.251d6e37828b5bff8b83c34e46997752?rik=QmAZgM6NecBTvw&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => E24B3A936E5034C1331FBF53C0798DCE80196042
[accentColor] => B98E12
)
[AF978F96F10B922DD4B33415F79C4DC5661A2F92] => Array
(
[name] => SAPSMART {Mitigating Security Vulnerabilities on Google Cloud Platform ...
[thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.9WbYmxKRTSdbZ2G9k7PO9QAAAA?pid=Api
[datePublished] => 2022-05-18T07:51:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => http://rukmini1.flixcart.com/image/300/300/kqy3rm80/educational-media/v/a/o/mitigating-security-vulnerabilities-on-google-cloud-platform-original-imag4u7szt2csnj2.jpeg
[hostPageUrl] => https://www.flipkart.com/sapsmart-mitigating-security-vulnerabilities-google-cloud-platform-certificate/p/itm8f693b049a57c
[contentSize] => 45085 B
[width] => 300
[height] => 300
[cDNContentUrl] => https://th.bing.com/th/id/R.f566d89b12914d275b6761bd93b3cef5?rik=%2bnn4aR%2bwKdJNOw&riu=http%3a%2f%2frukmini1.flixcart.com%2fimage%2f300%2f300%2fkqy3rm80%2feducational-media%2fv%2fa%2fo%2fmitigating-security-vulnerabilities-on-google-cloud-platform-original-imag4u7szt2csnj2.jpeg&ehk=LwdXEQGBLbfa8WpyZX4KKd49Tt%2fTo8IiCBAI63SJr8Q%3d&risl=&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 29F2A1665CD4C97F51433B4DD229B01F69F879FA
[accentColor] => A35228
)
[E317EF534C6DDBE71580AB3E23F885AFF485DE50] => Array
(
[name] => ED 26-01: Mitigate Vulnerabilities in F5 Devices | CISA
[thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.N-bcgzrKZQl_r2F_fdapYQAAAA?pid=Api
[datePublished] => 2025-10-15T15:59:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.cisa.gov/profiles/cisad8_gov/themes/custom/gesso/dist/images/us_flag_small.png
[hostPageUrl] => https://www.cisa.gov/news-events/directives/ed-26-01-mitigate-vulnerabilities-f5-devices
[contentSize] => 545 B
[width] => 64
[height] => 44
[cDNContentUrl] => https://th.bing.com/th/id/R.37e6dc833aca65097faf617f7dd6a961?rik=PnH%2bNcTWvX5RCA&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 05ED584FFA588F32E3BA08517EBDD6C435FE713E
[accentColor] => B23219
)
[F4313791C7C339B66BF8AB3E23F885AFF485DE50] => Array
(
[name] => ED 26-01: Mitigate Vulnerabilities in F5 Devices | CISA
[thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.c6vYZiTKTAmjgOFNX2DiWAAAAA?pid=Api
[datePublished] => 2025-10-15T15:59:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.cisa.gov/profiles/cisad8_gov/themes/custom/gesso/dist/images/icon-https.svg
[hostPageUrl] => https://www.cisa.gov/news-events/directives/ed-26-01-mitigate-vulnerabilities-f5-devices
[contentSize] => 720 B
[width] => 64
[height] => 64
[cDNContentUrl] => https://th.bing.com/th/id/R.73abd86624ca4c09a380e14d5f60e258?rik=TxNzGXw8k2u2jw&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 05ED584FFA588F32E3BA8FB66B933C7C1973134F
[accentColor] => 719F29
)
[AA066304552D2D327580ABB12F19C48B43288CB3] => Array
(
[name] => Understanding and Mitigating CVE-2025-32433: Erlang/OTP SSH Vulnerability
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.XJ23FU6052RBURRPUYnl-wHaHa?pid=Api
[datePublished] => 2025-04-20T18:50:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.ogma.in/static/img/managed-soc.png
[hostPageUrl] => https://www.ogma.in/understanding-and-mitigating-cve-2025-32433-erlang-otp-ssh-vulnerability
[contentSize] => 316194 B
[width] => 540
[height] => 540
[cDNContentUrl] => https://th.bing.com/th/id/R.5c9db7154eb4e7644151144f5189e5fb?rik=qmA2QFXS0iNXCA&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 3BC88234B84C91F21BBA085723D2D255403660AA
[accentColor] => 099DC2
)
[B1F06B8B88BC63166D9A33E21111C158940FF9FF] => Array
(
[name] => Understanding and Mitigating CVE-2025-32728: OpenSSH DisableForwarding ...
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.VZGMBhcHccyxD9pES7DtEgAAAA?pid=Api
[datePublished] => 2025-05-13T21:13:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.ogma.in/static/img/ogma-logo-white.png
[hostPageUrl] => https://ogma.in/understanding-and-mitigating-cve-2025-32728-openssh-disableforwarding-directive-vulnerability
[contentSize] => 16961 B
[width] => 283
[height] => 106
[cDNContentUrl] => https://th.bing.com/th/id/R.55918c06170771ccb10fda444bb0ed12?rik=Gw%2b2uIjLNmHWqQ&pid=ImgRaw&r=0
[isTransparent] => 1
[imageId] => FF9FF049851C11112E33A9D66136CB88B8B60F1B
[accentColor] => 666666
)
[53BCE98C2A67BA8801A5BEB790468781B9F74930] => Array
(
[name] => Government has an 'important warning' on Zoom calls - Times of India
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.DRXJa22aIqKRfEfaJERmRQAAAA?pid=Api
[datePublished] => 2024-04-19T07:54:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://static.toiimg.com/thumb/msid-109427912,imgsize-421532,width-400,resizemode-4/109427912.jpg
[hostPageUrl] => https://timesofindia.indiatimes.com/technology/tech-news/government-has-issued-an-important-warning-for-zoom-video-conferencing-app-details/articleshow/109427912.cms
[contentSize] => 52709 B
[width] => 400
[height] => 300
[cDNContentUrl] => https://th.bing.com/th/id/R.0d15c96b6d9a22a2917c47da24446645?rik=NcueyKJ2q4gQWg&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 03947F9B187864097BEB5A1088AB76A2C89ECB35
[accentColor] => 0048CC
)
[0F222900B18F37F5591CAB3E23F885AFF485DE50] => Array
(
[name] => ED 26-01: Mitigate Vulnerabilities in F5 Devices | CISA
[thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.QrSsRoWXI5o9ltsEw2MnfgAAAA?pid=Api
[datePublished] => 2025-10-15T15:59:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.cisa.gov/profiles/cisad8_gov/themes/custom/gesso/dist/images/icon-dot-gov.svg
[hostPageUrl] => https://www.cisa.gov/news-events/directives/ed-26-01-mitigate-vulnerabilities-f5-devices
[contentSize] => 800 B
[width] => 64
[height] => 64
[cDNContentUrl] => https://th.bing.com/th/id/R.42b4ac468597239a3d96db04c363277e?rik=8CKSABv4c1%2bVwQ&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 05ED584FFA588F32E3BAC1955F73F81B009222F0
[accentColor] => 206AAB
)
[C6605BDD93E6ED42E1708BE4B685A2EFB273B8C6] => Array
(
[name] => Home- AITECH LABS
[thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.PAjPX7xaMVasih1mgJSEHQAAAA?pid=Api
[datePublished] => 2022-06-22T05:03:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => http://aitechlabs.co.in/images/home/harness1.png
[hostPageUrl] => http://aitechlabs.co.in/
[contentSize] => 17358 B
[width] => 353
[height] => 275
[cDNContentUrl] => https://th.bing.com/th/id/R.3c08cf5fbc5a3156ac8a1d668094841d?rik=bAa13Tlu3iQeBw&riu=http%3a%2f%2faitechlabs.co.in%2fimages%2fhome%2fharness1.png&ehk=cG2z526IUVHwCk5VkjuNE%2fMuI5NnHrcD2dWU9MDUH00%3d&risl=&pid=ImgRaw&r=0
[isTransparent] => 1
[imageId] => 6C8B372BFE2A586B4EB8071E24DE6E39DDB5066C
[accentColor] => 4401CA
)
[682376800113B4205C40D501A4B9816F322CFB5E] => Array
(
[name] => Exploit Forge
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.7r2gvPXTGqwZ1g704hjAowHaGW?pid=Api
[datePublished] => 2023-06-03T21:11:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZNLcSaUe_tKv1lvCjqe1BrAlJhlohtmWNaRcNW4csb3uof2WCp_WWWiL97wlwhrAwelNtyh3ry8C8G1JbLSnEs9bpE-k5RJ_Ox27KrY9GYjocBRED08dNOfMYbAFR0MHoa-DwCfPVLPl8CzatayrgBVtP1oIyH0ZrP2QZ9_Yx2noeJADU6ZLpAForjeQ/w1600/common-web-application-vulnerabilities.jpg
[hostPageUrl] => https://pygurutricks.in/
[contentSize] => 53106 B
[width] => 700
[height] => 600
[cDNContentUrl] => https://th.bing.com/th/id/R.eebda0bcf5d31aac19d60ef4e218c0a3?rik=hjJnCBAxSwLFBA&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => E5BFC223F6189B4A105D04C5024B311008673286
[accentColor] => B01B2E
)
[54EB71E50A768B1C58E6939F89C0F9CC3AE9F0F1] => Array
(
[name] => Mitigating Circumstances 2015-16. Template for Mitigating Circumstances ...
[thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.9REWu0FrH3Bs5SLYiiCLfwAAAA?pid=Api
[datePublished] => 2023-11-08T15:18:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.pdffiller.com/preview/692/472/692472881.png
[hostPageUrl] => https://www.pdffiller.com/692472881--Mitigating-Circumstances-Form-2015-16-Template-form-for-Mitigating-Circumstances-
[contentSize] => 10595 B
[width] => 298
[height] => 386
[cDNContentUrl] => https://th.bing.com/th/id/R.f51116bb416b1f706ce522d88a208b7f?rik=Rb4XXqBnuMGFbg&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 1F0F9EA3CC9F0C98F9396E85C1B867A05E17BE45
[accentColor] => 474784
)
[D54E6BE14331261C5034CDA7991EBB15BEF93120] => Array
(
[name] => What is OWASP? Latest Top 10 OWASP Vulnerabilities
[thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.Kbc2_fS8w-5bKVntLszfgAHaE8?pid=Api
[datePublished] => 2021-06-29T18:06:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://simpliskills.in/wp-content/uploads/2021/07/Owasp-top-10-vulnerabilities.png
[hostPageUrl] => https://simpliskills.in/owasp-top-ten-vulnerabilities/
[contentSize] => 86634 B
[width] => 900
[height] => 600
[cDNContentUrl] => https://th.bing.com/th/id/R.29b736fdf4bcc3ee5b2959ed2eccdf80?rik=XeS2HjQTYsEFQw&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 02139FEB51BBE1997ADC4305C16213341EB6E45D
[accentColor] => 104F88
)
[E5FADDF1B3F747E2DE7E1BC50CAE7A3A373293BD] => Array
(
[name] => Flood Vulnerability Mapping Using MaxEnt Machine Learning and ...
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.eB6QivY34DfuiTGgMI41mAHaFk?pid=Api
[datePublished] => 2023-04-11T07:58:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.mdpi.com/environsciproc/environsciproc-25-00073/article_deploy/html/images/environsciproc-25-00073-g004.png
[hostPageUrl] => https://www.mdpi.com/2673-4931/25/1/73
[contentSize] => 297212 B
[width] => 1665
[height] => 1251
[cDNContentUrl] => https://th.bing.com/th/id/R.781e908af637e037ee8931a0308e3598?rik=Xq%2fdHzt%2fdC7t5w&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => DB392373A3A7EAC05CB1E7ED2E747F3B1FDDAF5E
[accentColor] => CC9600
)
[5CE7FDA5AFA435D995AF27D48206EF6D3A3725CE] => Array
(
[name] => NVIDIA releases drivers mitigating Spectre CPU vulnerabilities | Digit
[thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.dj9WFAeQChQL7ZmygK5hjQHaEQ?pid=Api
[datePublished] => 2019-04-20T01:16:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://static.digit.in/default/ee947f4f90a26134daf1a300aae2dbfbc2af42a5.jpeg
[hostPageUrl] => https://www.digit.in/news/general/nvidia-releases-drivers-mitigating-cpu-spectre-vulnerabilities-39077.html
[contentSize] => 31491 B
[width] => 940
[height] => 540
[cDNContentUrl] => https://th.bing.com/th/id/R.763f561407900a140bed99b280ae618d?rik=xX7fWvpKU51Z%2bg&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => EC5273A3D6FE60284D72FA599D534AFA5ADF7EC5
[accentColor] => 977434
)
[536EE195964BE41F1ACDD01D9BFA19BF9F6332EC] => Array
(
[name] => Microsoft says 92% of vulnerable Exchange servers patched, mitigated ...
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.OpMa_s-eKWWXsZgE9wHIJQHaEK?pid=Api
[datePublished] => 2021-03-28T06:01:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://images.hindustantimes.com/tech/img/2021/03/28/1600x900/_b2b2e57c-a0fa-11e6-b234-3982876c2dbb_1616911051526.jpg
[hostPageUrl] => https://tech.hindustantimes.com/tech/news/microsoft-says-92-of-vulnerable-exchange-servers-patched-mitigated-71616910978415.html
[contentSize] => 166990 B
[width] => 1600
[height] => 900
[cDNContentUrl] => https://th.bing.com/th/id/R.3a931afecf9e296597b19804f701c825?rik=NeYeWWm0TvGh3A&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => CE2336F9FB91AFB9D10DDCA1F14EB469591EE635
[accentColor] => 0171CA
)
[284625C8D9FDC3964E0AE713AC700D41CB160838] => Array
(
[name] => Death penalty: SC refers case to 5-judge bench on framing rules for ...
[thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.8061_CZfCcdb9OwnN7t5owHaD4?pid=Api
[datePublished] => 2022-09-19T09:42:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://s01.sgp1.cdn.digitaloceanspaces.com/article/105589-lrcnwalobl-1663578295.jpg
[hostPageUrl] => https://scroll.in/latest/1033172/death-penalty-five-judge-constitution-bench-to-frame-rules-on-mitigating-circumstances
[contentSize] => 55581 B
[width] => 1200
[height] => 630
[cDNContentUrl] => https://th.bing.com/th/id/R.f34eb5fc265f09c75bf4ec2737bb79a3?rik=gmRSjJ3fPGnkoA&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 838061BC14D007CA317EA0E4693CDF9D8C526482
[accentColor] => A26129
)
[8E1CB5AA98FFF10D2815071CA0DC10FA2D99DB9D] => Array
(
[name] => Secure critical supply chains with the #1 AI CRM - Salesforce.com
[thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.5tnIN3O6o7HifIXOsf2vrAHaHa?pid=Api
[datePublished] => 2025-02-22T04:28:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.salesforce.com/content/dam/web/en_us/www/images/form/industries/government/request-supplier-relationship-mgmt.png
[hostPageUrl] => https://www.salesforce.com/form/industries/government/supplier-relationship-management-white-paper/
[contentSize] => 31715 B
[width] => 720
[height] => 720
[cDNContentUrl] => https://th.bing.com/th/id/R.e6d9c83773baa3b1e27c85ceb1fdafac?rik=6MFbqon%2fH9CCUQ&pid=ImgRaw&r=0
[isTransparent] => 1
[imageId] => D9BD99D2AF01CD0AC1705182D01FFF89AA5BC1E8
[accentColor] => 018DCA
)
[307B02CE75AE080AAF037C913CE9E1A2037D45E9] => Array
(
[name] => Popular apps have vulnerabilities in how they connect to the cloud. At ...
[thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.kRJyBkyXcQp_jETyLSIP6gHaFj?pid=Api
[datePublished] => 2021-05-19T19:47:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://img.etimg.com/thumb/msid-82780550,width-1015,height-761,imgsize-316261,resizemode-8,quality-100/prime/technology-and-startups/popular-apps-have-vulnerabilities-in-how-they-connect-to-the-cloud-at-risk-is-users-personal-data-.jpg
[hostPageUrl] => https://economictimes.indiatimes.com/prime/technology-and-startups/popular-apps-have-vulnerabilities-in-how-they-connect-to-the-cloud-at-risk-is-users-personal-data-/primearticleshow/82780550.cms
[contentSize] => 120024 B
[width] => 1015
[height] => 761
[cDNContentUrl] => https://th.bing.com/th/id/R.911272064c97710a7f8c44f22d220fea?rik=A7cg7FfqgKD6MA&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 9E54D7302A1E9EC319C730FAA080EA57EC20B703
[accentColor] => 9F622C
)
[2E2E0DC0A7975B634FCF505980A05023CCACAACC] => Array
(
[name] => Pacemaker Vulnerabilities Case Study - 21CSC308T SRMP Report - Studocu
[thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.rx-6yQJzDns_zWNCYTSQLAHaEK?pid=Api
[datePublished] => 2025-11-15T11:57:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://website-assets.studocu.com/img/document_thumbnails/9c713b035efc30bc34367b40997caaa1/thumb_784_441.png
[hostPageUrl] => https://www.studocu.com/in/document/srm-institute-of-science-and-technology/security-risk-management-principles/pacemaker-vulnerabilities-case-study-21csc308t-srmp-report/145585548
[contentSize] => 19335 B
[width] => 784
[height] => 441
[cDNContentUrl] => https://th.bing.com/th/id/R.af1fbac902730e7b3fcd63426134902c?rik=4uLQDHp5tTb0%2fA&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => CCAACACC32050A089505FCF436B5797A0CD0E2E2
[accentColor] => 212121
)
[9BEE676E1692CC285AC630DB546AC9F794D11B43] => Array
(
[name] => Uranium bioremediation using microbial for mitigating its pollution
[thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.9H4BZkUiyDlT0Qe3JFA-8QAAAA?pid=Api
[datePublished] => 2019-12-20T16:10:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.projectguru.in/publications/wp-content/uploads/2017/06/uranium.jpg
[hostPageUrl] => https://www.projectguru.in/uranium-bioremediation-using-microbial-mitigating-pollution/
[contentSize] => 17141 B
[width] => 397
[height] => 196
[cDNContentUrl] => https://th.bing.com/th/id/R.f47e01664522c83953d107b724503ef1?rik=ue525mEpzIKlbA&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 34B11D497F9CA645BD036CA582CC2961E676EEB9
[accentColor] => 191719
)
[9E053CC02FF57704AC60FCAEA9D9845AA7842C21] => Array
(
[name] => Buy Climate Change India in Focus Mitigating Impact of Global Warming ...
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.qy_HntZJHiCRZ1F5ELqXVQAAAA?pid=Api
[datePublished] => 2020-09-24T22:45:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://m.media-amazon.com/images/I/21vGVt+SdyL.jpg
[hostPageUrl] => https://www.amazon.in/Climate-Change-Mitigating-Impact-Warming/dp/817658066X
[contentSize] => 4815 B
[width] => 100
[height] => 150
[cDNContentUrl] => https://th.bing.com/th/id/R.ab2fc79ed6491e209167517910ba9755?rik=6VDDDPJfd0DKBg&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 12C2487AA5489D9AEACF06CA40775FF20CC350E9
[accentColor] => AF891C
)
[6489352DE2B3A83232B0F4EC8F26E5053169351E] => Array
(
[name] => Buy Integrated Approach of Mitigating Seedling Mortality of Chilli ...
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.6d0Vxbgf9jDv6GXWYulEngHaK2?pid=Api
[datePublished] => 2024-04-15T03:48:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://m.media-amazon.com/images/I/71uCZKhCRbL.jpg
[hostPageUrl] => https://www.desertcart.in/products/113176714-integrated-approach-of-mitigating-seedling-mortality-of-chilli-using-trichoderma-harzianum-and-chaetomium-globosum
[contentSize] => 138734 B
[width] => 1182
[height] => 1732
[cDNContentUrl] => https://th.bing.com/th/id/R.e9dd15c5b81ff630efe865d662e9449e?rik=RphT0i47iiMjCw&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => E1539613505E62F8CE4F0B23238A3B2ED2539846
[accentColor] => AC1F21
)
[F292D3F376326B48AA5DF358AE3C1A7142E75393] => Array
(
[name] => Flood Mitigation to Begin in Tamil Nadu
[thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.RHHfVPQWGxzWAsnyUpEmbAHaE8?pid=Api
[datePublished] => 2022-05-30T09:01:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://static.india.com/wp-content/uploads/2022/05/flood.jpg
[hostPageUrl] => https://www.india.com/tamil-nadu/tamil-nadu-govt-allocates-rs-392-16-crore-for-flood-mitigation-work-5422062/
[contentSize] => 126240 B
[width] => 1200
[height] => 800
[cDNContentUrl] => https://th.bing.com/th/id/R.4471df54f4161b1cd602c9f25291266c?rik=Lyk9P2cjtoSq1Q&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 39357E2417A1C3EA853FD5AA84B623673F3D292F
[accentColor] => A98622
)
[84310132DC712911596C271F3079A99616F07241] => Array
(
[name] => CrowdStrike launches AI Red Team services to secure AI systems against ...
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.Ug5u6Jdozb8f7-8AvzOngwHaEu?pid=Api
[datePublished] => 2024-11-08T00:00:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://etimg.etb2bimg.com/thumb/msid-115050634,imgsize-20202,width-1200,height=765,overlay-etciosea/news/security/crowdstrike-launches-ai-red-team-services-to-secure-ai-systems-against-emerging-threats.jpg
[hostPageUrl] => https://ciosea.economictimes.indiatimes.com/news/security/crowdstrike-launches-ai-red-team-services-to-secure-ai-systems-against-emerging-threats/115050634
[contentSize] => 71392 B
[width] => 1200
[height] => 765
[cDNContentUrl] => https://th.bing.com/th/id/R.520e6ee89768cdbf1fefef00bf33a783?rik=SBMQI80XkhGVxg&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 14270F61699A9703F172C695119217CD23101348
[accentColor] => 23495F
)
[1C0BFBFA369FFAF3E88737020177E6EF9AA341C5] => Array
(
[name] => mumbai pollution: Mobilising clusters for waste treatment can help ...
[thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.smW4RqXmM8iWURGARWQX_gHaEA?pid=Api
[datePublished] => 2023-02-04T10:37:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://img.etimg.com/thumb/msid-97602886,width-1070,height-580,overlay-economictimes/videoshow.jpg
[hostPageUrl] => https://economictimes.indiatimes.com/news/india/mobilising-clusters-for-waste-treatment-can-help-mitigate-mumbais-pollution-problem-says-fm-sitharaman/videoshow/97602886.cms
[contentSize] => 52860 B
[width] => 1070
[height] => 580
[cDNContentUrl] => https://th.bing.com/th/id/R.b265b846a5e633c896511180456417fe?rik=wbC%2fr2P5rz%2bOeA&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 5C143AA9FE6E77102073788E3FAFF963AFBFB0C1
[accentColor] => B01B20
)
[3B0B547507FB706C0D30409EBB792C1598F1EEC6] => Array
(
[name] => India's Climate Vulnerability
[thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.T3YKBDd9bXjxfUywthjCGQHaEv?pid=Api
[datePublished] => 2023-04-21T17:11:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://s3-ap-south-1.amazonaws.com/adda247jobs-wp-assets-adda247/articles/wp-content/uploads/2023/04/21183312/Indias-Climate-Vulnerability.jpg
[hostPageUrl] => https://www.studyiq.com/articles/stats-iq-indias-climate-vulnerability/
[contentSize] => 533864 B
[width] => 1200
[height] => 768
[cDNContentUrl] => https://th.bing.com/th/id/R.4f760a04377d6d78f17d4cb0b618c219?rik=s7BFV3C%2fB8bQAw&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 6CEE1F8951C297BBE90403D0C607BF705745B0B3
[accentColor] => C98B02
)
[85A9EA4FD756DF373A1FEDC5F2AF5EADBC228F71] => Array
(
[name] => Factors Affecting Risk Management in Industrial Companies in Jordan
[thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.zCE2WJnFATpPYq5wrxLG7wHaFk?pid=Api
[datePublished] => 2023-05-12T15:49:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.mdpi.com/admsci/admsci-13-00132/article_deploy/html/images/admsci-13-00132-g002.png
[hostPageUrl] => https://www.mdpi.com/2076-3387/13/5/132
[contentSize] => 194130 B
[width] => 1935
[height] => 1456
[cDNContentUrl] => https://th.bing.com/th/id/R.cc21365899c5013a4f62ae70af12c6ef?rik=WJqu9H1l%2fXOj8Q&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 17F822CBDAE5FA2F5CDEF1A373FD657DF4AE9A58
[accentColor] => C89803
)
[350184B327E55CAA7361E5AB3BECE4D7BFB8CB41] => Array
(
[name] => AI in Penetration Testing - Revolutionizing Security Assessments - Yeah Hub
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.kPyZJfoe__UqWRDTEDPbGQHaE4?pid=Api
[datePublished] => 2025-01-09T04:54:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.yeahhub.com/wp-content/uploads/2025/01/Security-Assessments.jpg
[hostPageUrl] => https://www.yeahhub.com/ai-in-penetration-testing-revolutionizing-security-assessments/
[contentSize] => 262099 B
[width] => 1392
[height] => 918
[cDNContentUrl] => https://th.bing.com/th/id/R.90fc9925fa1efff52a5910d31033db19?rik=UxBIO3Jexao3Fg&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 14BC8BFB7D4ECEB3BA5E1637AAC55E723B481053
[accentColor] => 1C5D38
)
[5EDDA927333CBC114952FC3C8037E9CCD47BBFCA] => Array
(
[name] => STRESS MANAGEMENT: Understanding and Mitigating Stress for a Balanced ...
[thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.4Y46-H23T1j6DLeaIC4uwwAAAA?pid=Api
[datePublished] => 2025-06-14T03:54:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://m.media-amazon.com/images/I/41ziw+t+zrL._SY445_SX342_.jpg
[hostPageUrl] => https://www.amazon.in/STRESS-MANAGEMENT-Understanding-Mitigating-Balanced-ebook/dp/B0CQYV76VP
[contentSize] => 25688 B
[width] => 279
[height] => 445
[cDNContentUrl] => https://th.bing.com/th/id/R.e18e3af87db74f58fa0cb79a202e2ec3?rik=5d2acjPDyxGUJQ&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => ACFBB74DCC9E7308C3CF259411CBC333729ADDE5
[accentColor] => 484D5B
)
[3E536ADAA971EC4D7053D93F0C633A4A12918B39] => Array
(
[name] => Find ways to mitigate flood situation: Gadkari to officials
[thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.K1YkYJzv1_Sqjum1aYx5PgHaE8?pid=Api
[datePublished] => 2022-11-04T16:21:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://media.dtnext.in/imported/import/Images/Article/201709101209474549_Find-ways-to-mitigate-flood-situation-Gadkari-to-officials_SECVPF.gif
[hostPageUrl] => https://www.dtnext.in/national/2017/09/10/find-ways-to-mitigate-flood-situation-gadkari-to-officials
[contentSize] => 32440 B
[width] => 620
[height] => 414
[cDNContentUrl] => https://th.bing.com/th/id/R.2b5624609cefd7f4aa8ee9b5698c793e?rik=4zWmrZoXztQHNQ&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 93B81921A4A336C0F39D3507D4CE179AADA635E3
[accentColor] => 424A5A
)
[D2E4DC21B6D364DC81449D05B865FC2DD7BA72F9] => Array
(
[name] => Helping to Mitigate Risk in GenAI Tools for CDS
[thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.PdjaFzeN5U41k0lounj4bgHaFX?pid=Api
[datePublished] => 2024-08-01T17:53:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://images.ctfassets.net/zlnfaxb2lcqx/3iVgcfy5v5YZKpKL68gxF4/e0c80d92d095b5c73ffd09bdcdc30f8c/Helping_to_Mitigate_Risk_in_GenAI_Tools_for_CDS.png?w=1200&q=75
[hostPageUrl] => https://www.elsevier.com/en-in/resources/helping-to-mitigate-risk-in-genai-tools-for-cds
[contentSize] => 1033500 B
[width] => 1200
[height] => 870
[cDNContentUrl] => https://th.bing.com/th/id/R.3dd8da17378de54e35934968ba78f86e?rik=LU7NEms9Rs0YRA&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 9F27AB7DD2CF568B50D94418CD463D6B12CD4E2D
[accentColor] => 406E8B
)
[36EA672D5328F109C55A6F87F2F819983927DB64] => Array
(
[name] => Editorial: Reciprocal tariffs and risk mitigation
[thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.LfTlLlnYoZPP25CDLTnc1QHaEc?pid=Api
[datePublished] => 2025-04-03T01:10:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://media.dtnext.in/h-upload/2025/02/13/856712-donald.jpg
[hostPageUrl] => https://www.dtnext.in/edit/editorial-reciprocal-tariffs-and-risk-mitigation-828681
[contentSize] => 94219 B
[width] => 1500
[height] => 900
[cDNContentUrl] => https://th.bing.com/th/id/R.2df4e52e59d8a193cfdb90832d39dcd5?rik=Y6520jWCH5BcpQ&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 46BD729389918F2F78F6A55C901F8235D276AE63
[accentColor] => 2A3964
)
[F3AB360519AF3985B6C280DD7D793A14EECF80CD] => Array
(
[name] => Top 5 Penetration Testing Methodologies to Follow in 2025 - Yeah Hub
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.QFAAgU281thP5tZSaXRwtwHaEk?pid=Api
[datePublished] => 2025-01-08T14:04:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.yeahhub.com/wp-content/uploads/2025/01/Penetration-Testing-Methodologies.jpg
[hostPageUrl] => https://www.yeahhub.com/top-5-penetration-testing-methodologies-to-follow-in-2025/
[contentSize] => 391308 B
[width] => 1481
[height] => 913
[cDNContentUrl] => https://th.bing.com/th/id/R.405000814dbcd6d84fe6d652697470b7?rik=P7pjUJH6k1hrLA&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => DC08FCEE41A397D7DD082C6B5893FA915063BA3F
[accentColor] => 6215B6
)
[B66ED866BBB1683FD5FBC155D58D3BBE55EE78E0] => Array
(
[name] => Rs 488 crore approved for Uttar Pradesh, Punjab and Goa under State ...
[thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.xuD0oydoV0qA2NxyGrn0swHaEu?pid=Api
[datePublished] => 2022-10-01T07:22:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://etimg.etb2bimg.com/thumb/msid-94579625,imgsize-22812,width-1200,height=765,overlay-etgovernment/news/governance/rs-488-crore-approved-for-uttar-pradesh-punjab-and-goa-under-the-state-disaster-mitigation-fund.jpg
[hostPageUrl] => https://government.economictimes.indiatimes.com/news/governance/rs-488-crore-approved-for-uttar-pradesh-punjab-and-goa-under-the-state-disaster-mitigation-fund/94579625
[contentSize] => 56876 B
[width] => 1200
[height] => 765
[cDNContentUrl] => https://th.bing.com/th/id/R.c6e0f4a32768574a80d8dc721ab9f4b3?rik=a%2baNZrsbhvNdvw&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 0E87EE55EBB3D85D551CBF5DF3861BBB668DE66B
[accentColor] => A33228
)
[71053FB16E11DAF520473AE11B9C716DD879B09B] => Array
(
[name] => Blog: Data Breaches in the Cloud - EE Times India
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.uI25MV9YJQthufzJNx6PFAHaDN?pid=Api
[datePublished] => 2020-02-14T06:40:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.eetindia.co.in/wp-content/uploads/sites/4/2020/04/cloud-shared-responsibility.jpg
[hostPageUrl] => https://www.eetindia.co.in/Blog-Data-Breaches-in-the-Cloud/
[contentSize] => 90423 B
[width] => 1000
[height] => 434
[cDNContentUrl] => https://th.bing.com/th/id/R.b88db9315f58250b61b9fcc9371e8f14?rik=F1DzG%2bYRrV8CdA&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => B90B978DD617C9B11EA374025FAD11E61BF35017
[accentColor] => 072838
)
[A83CBC472B28DB494B449077C65471B0D2AAB025] => Array
(
[name] => Press Release: Press Information Bureau
[thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.2L7L4dif9nwa-smLXeS_4QHaE7?pid=Api
[datePublished] => 2023-05-25T12:32:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://static.pib.gov.in/WriteReadData/userfiles/image/G20-1Y4CE.jpg
[hostPageUrl] => https://pib.gov.in/PressReleseDetailm.aspx?PRID=1927253
[contentSize] => 123012 B
[width] => 1280
[height] => 852
[cDNContentUrl] => https://th.bing.com/th/id/R.d8becbe1d89ff67c1afac98b5de4bfe1?rik=isPLdLKCvZS0RA&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 520BAA2D0B17456C770944B494BD82B274CBC38A
[accentColor] => 976934
)
[F18197ED3F87CB411165DE4B17CBD5DFC2FB8677] => Array
(
[name] => Ensuring fairness and mitigating bias with AI-powered HR decisions ...
[thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.Q-JoYc_7z_IbXSLV-DVJoQHaEV?pid=Api
[datePublished] => 2024-10-07T10:55:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://contentstatic.timesjobs.com/photo/114012490/leaders-talk/ensuring-fairness-and-mitigating-bias-with-ai-powered-hr-decisions.jpg
[hostPageUrl] => https://content.timesjobs.com/ensuring-fairness-and-mitigating-bias-with-ai-powered-hr-decisions/articleshow/114012490.cms
[contentSize] => 330539 B
[width] => 744
[height] => 435
[cDNContentUrl] => https://th.bing.com/th/id/R.43e26861cffbcff21b5d22d5f83549a1?rik=Hxh53vN4vBQRVg&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 7768BF2CFD5DBC71B4ED561114BC78F3DE79181F
[accentColor] => C00B0E
)
[801F967911ABE0046957E759689E29B437A2F54D] => Array
(
[name] => Innovation - Top strategies to protect your business during the novel ...
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.8IfCnSnsVNJlc-sXLarPngHaFj?pid=Api
[datePublished] => 2020-07-27T12:00:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://img.etimg.com/thumb/msid-77194936,width-640,resizemode-4,imgsize-123976/mitigating-risk.jpg
[hostPageUrl] => https://economictimes.indiatimes.com/news/company/corporate-trends/top-strategies-to-protect-your-business-during-the-novel-coronavirus-pandemic/innovation/slideshow/77195003.cms
[contentSize] => 28051 B
[width] => 640
[height] => 480
[cDNContentUrl] => https://th.bing.com/th/id/R.f087c29d29ec54d26573eb172daacf9e?rik=CPFplxG6DkCWdQ&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => D45F2A734B92E986957E7596400EBA119769F108
[accentColor] => B41719
)
[72C2C714397DED77E3F80BC9E474F0D3E9AB6103] => Array
(
[name] => How to Identify and Mitigate the Risks on Construction Sites | Wehouse.in
[thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.drpCBHfPeZ0ASTQfAZ0wxAHaEK?pid=Api
[datePublished] => 2022-06-10T11:57:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://wehouse.in/assets/blog/blog-image-june10.jpg
[hostPageUrl] => https://www.wehouse.in/blog-details/how-to-identify-and-mitigate-the-risks-on-construction-sites-wehouse-in
[contentSize] => 282688 B
[width] => 1599
[height] => 899
[cDNContentUrl] => https://th.bing.com/th/id/R.76ba420477cf799d0049341f019d30c4?rik=Jyx8QZPX3nc%2bjw&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 3016BA9E3D0F474E9CB08F3E77DED793417C2C27
[accentColor] => BD7D0E
)
[A2E4A4C2BA1D3EA5A48F1BA04C1E9204D1D8D07E] => Array
(
[name] => Falcon Spotlight: Scanless Vulnerability Management
[thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.of8b3X11NVhg2ceuez6OJwHaDo?pid=Api
[datePublished] => 2021-03-06T17:33:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.crowdstrike.com/wp-content/uploads/2020/04/falcon-spotlight-vulnerability-assessment-dashboard.png
[hostPageUrl] => https://www.electroon.com/cyber-security/antiviruses/falcon-spotlight-scanless-vulnerability-management/
[contentSize] => 162767 B
[width] => 1600
[height] => 784
[cDNContentUrl] => https://th.bing.com/th/id/R.a1ff1bdd7d75355860d9c7ae7b3e8e27?rik=Kk5KLKvR41pK%2bA&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => E70D8D1D4029E1C40AB1F84A5AE3D1AB2C4A4E2A
[accentColor] => C28B09
)
[767ED3F60E198C614735CA454F7B6C8AF8343B2F] => Array
(
[name] => UPCCCE-Uttar Pradesh Climate Change and Clean Environment
[thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.JfJ1Y6T1lfwJVP1Byr_MEwHaFj?pid=Api
[datePublished] => 2022-10-14T12:59:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => http://upccce.org/public/images/blog/gov.jpg
[hostPageUrl] => http://upccce.org/government-organizations
[contentSize] => 35596 B
[width] => 480
[height] => 360
[cDNContentUrl] => https://th.bing.com/th/id/R.25f27563a4f595fc0954fd41cabfcc13?rik=Z%2bc9b%2bCRyBZ0Uw&riu=http%3a%2f%2fupccce.org%2fpublic%2fimages%2fblog%2fgov.jpg&ehk=zb9SeI6gRnCCdebdAZXgA3em6YoC4PpAChwnW%2f82vLc%3d&risl=&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => F2B3438FA8C6B7F454AC537416C891E06F3DE767
[accentColor] => C0610B
)
[03F2D432BE90318FC6B92B88C6AC6824CC83B77F] => Array
(
[name] => Siang project not just for generating power but mitigating flood risks ...
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.hrNyf4d9Hry6xgdJDzvA8wHaE8?pid=Api
[datePublished] => 2024-12-29T05:20:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://media.dtnext.in/imported/import/Images/Article/201607272222269263_Arunachal-CM-reviews-flood-situation_SECVPF.gif
[hostPageUrl] => https://www.dtnext.in/news/national/siang-project-not-just-for-generating-power-but-mitigating-flood-risks-posed-by-china-arunachal-cm-817183
[contentSize] => 47972 B
[width] => 620
[height] => 414
[cDNContentUrl] => https://th.bing.com/th/id/R.86b3727f877d1ebcbac607490f3bc0f3?rik=MC9NI%2bsJE%2fhsmw&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => F77B38CC4286CA6C88B29B6CF81309EB234D2F30
[accentColor] => 2E4077
)
[397F77E6B90C09FFB027394CED660B63327C7CF2] => Array
(
[name] => 7 Types of Security Testing - QATestLab Blog
[thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.ogHTTAI2P6bny1C_7U38ZgHaED?pid=Api
[datePublished] => 2018-07-21T03:06:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://blog.qatestlab.com/wp-content/uploads/2017/02/Penetration-Testing.jpg
[hostPageUrl] => https://blog.qatestlab.com/2020/09/07/security-testing-types/
[contentSize] => 63551 B
[width] => 885
[height] => 484
[cDNContentUrl] => https://th.bing.com/th/id/R.a201d34c02363fa6e7cb50bfed4dfc66?rik=k%2fd3bpvAkP8Lcg&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 2FC7C72336B066DEC493720BFF90C09B6E77F793
[accentColor] => B34618
)
[347B5BDAC764ADDD6668C75C11C9B91396059A72] => Array
(
[name] => DevSecOps Solution
[thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.F_pO_rfk1gwlvgjUyL-rCAHaHa?pid=Api
[datePublished] => 2024-08-20T07:56:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://codesecure.in/images/solutions/dev2.png
[hostPageUrl] => https://codesecure.in/solutions/devsecops-solution
[contentSize] => 575122 B
[width] => 1080
[height] => 1080
[cDNContentUrl] => https://th.bing.com/th/id/R.17fa4efeb7e4d60c25be08d4c8bfab08?rik=Q7e1rXxG2t1mhg&pid=ImgRaw&r=0
[isTransparent] => 1
[imageId] => 27A95069319B9C11C57C8666DDDA467CADB5B743
[accentColor] => 14B7AD
)
[59E7056452287F5FAAB0094A8CBF5B986EC890E6] => Array
(
[name] => Cyber Security - Hacktronian
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.2fqCwpdrvCbnjcnT58cRdQHaHa?pid=Api
[datePublished] => 2024-10-22T09:30:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://hacktronian.in/assets/images/services/about/cybersecurity.webp
[hostPageUrl] => https://hacktronian.in/cybersecurity
[contentSize] => 44596 B
[width] => 1000
[height] => 1000
[cDNContentUrl] => https://th.bing.com/th/id/R.d9fa82c2976bbc26e78dc9d3e7c71175?rik=lX5QRiWC9%2fWqCw&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 6E098CE689B5FBC8A4900BAAF5F7822546507E95
[accentColor] => 15B683
)
[866C0EFFF8FCD499445E094A8CBF5B986EC890E6] => Array
(
[name] => Cyber Security - Hacktronian
[thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.8DZx2Q0BKSSfvV5wR-vfMQAAAA?pid=Api
[datePublished] => 2024-10-22T09:30:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://hacktronian.in/assets/images/services/cysec2.webp
[hostPageUrl] => https://hacktronian.in/cybersecurity
[contentSize] => 4270 B
[width] => 300
[height] => 300
[cDNContentUrl] => https://th.bing.com/th/id/R.f03671d90d0129249fbd5e7047ebdf31?rik=aMbg%2f4%2fPTZlE5Q&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 6E098CE689B5FBC8A490E544994DCF8FFFE0C668
[accentColor] => 048963
)
[075A8F42873C69946AC71BB7C976BD01303B32E0] => Array
(
[name] => D'source Design Case study on Mobile Solution for Mitigating Ocean ...
[thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.l47UUlYd0RUW5q0IzUL1HQAAAA?pid=Api
[datePublished] => 2025-08-29T17:58:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://dsource.idc.iitb.ac.in/sites/default/files/case-study/mobile-solution-mitigating-ocean-plastic-waste/logo/Index_170.jpg
[hostPageUrl] => https://dsource.idc.iitb.ac.in/case-study/mobile-solution-mitigating-ocean-plastic-waste
[contentSize] => 9432 B
[width] => 170
[height] => 170
[cDNContentUrl] => https://th.bing.com/th/id/R.978ed452561dd11516e6ad08cd42f51d?rik=cKX4JHjDlkmmfA&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 0E23B30310DB679C7BB17CA64996C37824F8A570
[accentColor] => 284867
)
[C5D8556444FC37E0E07217118E38A5576AB18D45] => Array
(
[name] => Network Penetration Testing Company in Chennai | Codesecure Solutions
[thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.jvg95UwRpyOOADtnmfMM6wHaHa?pid=Api
[datePublished] => 2022-05-22T17:06:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://codesecure.in/images/ab.png
[hostPageUrl] => https://codesecure.in/about
[contentSize] => 919394 B
[width] => 1080
[height] => 1080
[cDNContentUrl] => https://th.bing.com/th/id/R.8ef83de54c11a7238e003b6799f30ceb?rik=XI1VRkTPcw4OJw&pid=ImgRaw&r=0
[isTransparent] => 1
[imageId] => 54D81BA6755A83E81171270E0E73CF4446558D5C
[accentColor] => 385E4B
)
[F7D8DB8197DBBF5F6360B7AFD589774B5B8F2E78] => Array
(
[name] => TSK Automations || Security Services
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.OfZdbKGGWYjMyfuz1SvSYAHaE8?pid=Api
[datePublished] => 2024-12-10T03:56:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://tskautomations.com/ContentImg/SIEM.jpg
[hostPageUrl] => https://tskautomations.com/Securityservices.html
[contentSize] => 38012 B
[width] => 600
[height] => 400
[cDNContentUrl] => https://th.bing.com/th/id/R.39f65d6ca1865988ccc9fbb3d52bd260?rik=f429GHm9%2b%2fU2Bg&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 87E2F8B5B477985DFA7B0636F5FBBD7918BD8D7F
[accentColor] => BE980D
)
[FC1F1A207C4ECD1754F09A2C75A8D2313B4C77FE] => Array
(
[name] => Coastal Vegetation to mitigate Tsunami and Coastal Flood Impacts ...
[thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.9eSIxeou6CH3chEjBozEUAHaFp?pid=Api
[datePublished] => 2025-02-24T04:58:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://rnd.iitb.ac.in/sites/default/files/logo.png
[hostPageUrl] => https://rnd.iitb.ac.in/coastal_vegetation_to_mitigate_tsunami_and_coastal_flood_impacts
[contentSize] => 94702 B
[width] => 572
[height] => 436
[cDNContentUrl] => https://th.bing.com/th/id/R.f5e488c5ea2ee821f7721123068cc450?rik=z%2fGhAsfk3HFFDw&pid=ImgRaw&r=0
[isTransparent] => 1
[imageId] => EF77C4B3132D8A57C2A90F4571DCE4C702A1F1CF
[accentColor] => 666666
)
[B2A2C07A94DEAD19D72692218E37A6E19C1FC88B] => Array
(
[name] => Siang project not just for generating power but mitigating flood risks ...
[thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.vitox7pDwMejpoLYz-1Z-wHaEj?pid=Api
[datePublished] => 2024-12-29T06:04:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://english.varthabharati.in/storage/uploads/india/andhra-cm_vb_38.jpeg
[hostPageUrl] => https://english.varthabharati.in/india/siang-project-not-just-for-generating-power-but-mitigating-flood-risks-posed-by-china-arunachal-cm
[contentSize] => 200998 B
[width] => 650
[height] => 400
[cDNContentUrl] => https://th.bing.com/th/id/R.be2b68c7ba43c0c7a3a682d8cfed59fb?rik=KyoMp0nt2pF9Yg&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => B88CF1C91E6A73E81229627D91DAED49A70C2A2B
[accentColor] => 853078
)
[A9F23952989851A4283341A6DE6F3FDE0FF8CD00] => Array
(
[name] => Without mitigating measures, the health effects of heat stress will ...
[thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.n34whd9K8D9Gtx2ZoyggoAHaDV?pid=Api
[datePublished] => 2022-09-30T14:00:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://s01.sgp1.cdn.digitaloceanspaces.com/inline/pqaphgamnh-1664100861.jpg
[hostPageUrl] => https://scroll.in/article/1033616/without-mitigating-measures-the-health-effects-of-heat-stress-will-worsen-considerably-in-india
[contentSize] => 109451 B
[width] => 2048
[height] => 923
[cDNContentUrl] => https://th.bing.com/th/id/R.9f7e3085df4af03f46b71d99a32820a0?rik=mi%2bTJYmJFUqCMw&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 00DC8FF0EDF3F6ED6A1433824A15898925932F9A
[accentColor] => 6E4E5F
)
[8EC2A9F9C1A46B4E0DFA1BA04C1E9204D1D8D07E] => Array
(
[name] => Falcon Spotlight: Scanless Vulnerability Management
[thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.OkJqm154b9_i-YXFkhs95QHaG7?pid=Api
[datePublished] => 2021-03-06T17:33:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.crowdstrike.com/wp-content/uploads/2020/04/falcon-spotlight-scan-free-dashboard-image.png
[hostPageUrl] => https://www.electroon.com/cyber-security/antiviruses/falcon-spotlight-scanless-vulnerability-management/
[contentSize] => 342450 B
[width] => 1378
[height] => 1290
[cDNContentUrl] => https://th.bing.com/th/id/R.3a426a9b5e786fdfe2f985c5921b3de5?rik=6CyanxxKtuTQrw&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => E70D8D1D4029E1C40AB1AFD0E4B64A1C9F9A2CE8
[accentColor] => AF3F1C
)
[6632522C1866E6B4C446D0CDE986F4BDC45A318D] => Array
(
[name] => CSIR-CSIO
[thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.2ekIYZPdWvWEpLzudxSwqAHaFj?pid=Api
[datePublished] => 2018-10-10T04:42:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.csio.res.in/upload/images/155518215Dust%20Mitigation%20and%20Environment%20Protection%20Device.jpg
[hostPageUrl] => https://csio.res.in/home.php
[contentSize] => 211513 B
[width] => 1280
[height] => 961
[cDNContentUrl] => https://th.bing.com/th/id/R.d9e9086193dd5af584a4bcee7714b0a8?rik=ZiMlwoFmbktMZA&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => D813A54CDB4F689EDC0D644C4B6E6681C2252366
[accentColor] => 702D22
)
[B38937120B5E00D652666D98F54541CA0E53873B] => Array
(
[name] => Mastering Threat and Vulnerability Management; A Comprehensive ...
[thumbnailUrl] => https://tse1.mm.bing.net/th?id=OIF.Wnccvpo%2b4%2bsgvxwmu8eolw&pid=Api
[datePublished] => 2026-01-29T10:09:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://cdn11.bigcommerce.com/s-ilcoov/images/stencil/1280x1280/products/566488/623675/Mastering_Threat_and_Vulnerability_Management_A_Comprehensive_Framework_for_Identifying_and_Mitigating_Risk__61468.1767356633.png?c=2
[hostPageUrl] => https://store.theartofservice.com/mastering-threat-and-vulnerability-management-a-comprehensive-framework-for-identifying-and-mitigating-risk/
[contentSize] => 291237 B
[width] => 1280
[height] => 905
[cDNContentUrl] => https://th.bing.com/th/id/R.ae135c54e390d1f433f03aea23b9a9a3?rik=&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => B37835E0AC14545F89D666256D00E5B02173983B
[accentColor] => C69605
[isFresh] => 1
)
[1B277822CB4D1317A4C75BE74630C5B7402DE2F3] => Array
(
[name] => Hacking vs Ethical Hacking: Check Key Differences and Similarities
[thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.tCw96pH8d49m1j70IWP9wAHaEK?pid=Api
[datePublished] => 2022-11-03T05:43:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://img.jagranjosh.com/images/2022/November/3112022/hacking.webp
[hostPageUrl] => https://www.jagranjosh.com/general-knowledge/hacking-vs-ethical-hacking-check-key-differences-and-similarities-1667455060-1
[contentSize] => 39638 B
[width] => 1200
[height] => 675
[cDNContentUrl] => https://th.bing.com/th/id/R.b42c3dea91fc778f66d63ef42163fdc0?rik=sXKHIrzUMXFKfA&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 3F2ED2047B5C03647EB57C4A7131D4BC228772B1
[accentColor] => C20909
)
[9CA8BA4C4427C2D55B5579A138F40BF1FC17D280] => Array
(
[name] => PREVENT 2025 Puts India at the Center of Global Cybersecurity Innovation
[thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.PediHzDxMcsmzDhLaR1i6AHaFD?pid=Api
[datePublished] => 2025-02-24T07:10:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://aniportalimages.s3.amazonaws.com/media/details/ANI-20250224064823.jpg
[hostPageUrl] => https://www.aninews.in/news/business/prevent-2025-puts-india-at-the-center-of-global-cybersecurity-innovation20250224123847/
[contentSize] => 116590 B
[width] => 1166
[height] => 797
[cDNContentUrl] => https://th.bing.com/th/id/R.3de7621f30f131cb26cc384b691d62e8?rik=yYqrxERyLF21VQ&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 082D71CF1FB04F831A9755B55D2C7244C4AB8AC9
[accentColor] => 00A3CB
)
[579F379802DF87E4C8D999C030F963D9ADCD3DF9] => Array
(
[name] => Petition · Demand stern action and policies to mitigate man-animal ...
[thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.4xidP2kCnPpMYQI49LG8OAHaEK?pid=Api
[datePublished] => 2020-11-23T19:15:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://assets.change.org/photos/8/bo/wt/OcBowtgecrwPDWl-800x450-noPad.jpg?1591366108
[hostPageUrl] => https://www.change.org/p/government-of-india-forest-department-demand-stern-action-and-policies-to-mitigate-man-animal-conflict-in-india
[contentSize] => 23458 B
[width] => 681
[height] => 383
[cDNContentUrl] => https://th.bing.com/th/id/R.e3189d3f69029cfa4c610238f4b1bc38?rik=dflziSD9eE6MnQ&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 9FD3DCDA9D369F030C999D8C4E78FD208973F975
[accentColor] => 4A5B2C
)
[603467AEFEF035FA6EE31BBBD9194A682E2C8274] => Array
(
[name] => Working with Splunk Support Guide | Splunk
[thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP._aAt7JAvZwUQMYWvollCQQAAAA?pid=Api
[datePublished] => 2022-03-31T15:23:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.splunk.com/content/dam/splunk2/en_us/images/icon-library/color-black/mitigating-security-risks.svg
[hostPageUrl] => https://www.splunk.com/en_us/resources/working-with-splunk-support.html
[contentSize] => 1969 B
[width] => 192
[height] => 192
[cDNContentUrl] => https://th.bing.com/th/id/R.fda02dec902f6705103185afa2594241?rik=BkN26u8PU6%2fmPg&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 4728C2E286A4919DBBB13EE6AF530FEFEA764306
[accentColor] => 666666
)
[4E1FCEF5D7F5CF36D29391ED88E16D6B2A4C1BBB] => Array
(
[name] => Integrated Mycotoxin Management - Trouw Nutrition
[thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.9erSbq7DwBn6qU0YU04FfgHaG7?pid=Api
[datePublished] => 2022-07-08T05:55:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.trouwnutritionasiapacific.com/contentassets/68c2437a34974b7e888af86f1e319b99/pic3.3.jpg?v=49ecc4
[hostPageUrl] => https://www.trouwnutritionasiapacific.com/en-in/7.0-tn-In-news-and-events/highlighted-stories/2021/integrated-mycotoxin-management/
[contentSize] => 70547 B
[width] => 927
[height] => 867
[cDNContentUrl] => https://th.bing.com/th/id/R.f5ead26eaec3c019faa94d18534e057e?rik=5PHsX31f%2fGMtOQ&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => BBB1C4A2B6D61E88DE19392D63FC5F7D5FECF1E4
[accentColor] => C70404
)
[22C432242B2D12ADBED170276BDD68E1FA01B53A] => Array
(
[name] => Army Cannot Throw Up Hands On Grounds Of Road Width; If Landslides ...
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.pN5HxoVZfZcoBhq54yxxQgHaEc?pid=Api
[datePublished] => 2021-11-11T15:41:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.livelaw.in/h-upload/2021/07/03/750x450_396020-kk-venugopal-and-sc.jpg
[hostPageUrl] => https://www.livelaw.in/top-stories/supreme-court-char-dham-highway-expansion-project-ag-kk-venugopal-india-china-border-185352
[contentSize] => 377424 B
[width] => 750
[height] => 450
[cDNContentUrl] => https://th.bing.com/th/id/R.a4de47c685597d9728061ab9e32c7142?rik=IkwjQrLSIdrrHQ&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => A35B10AF1E86DDB672071DEBDA21D2B242234C22
[accentColor] => A34728
)
[279AD719782A0B7DEA441F1DABC9E0C3478AA650] => Array
(
[name] => East Luwu Mahalona Transmigrant Alternatives in Mitigating Poverty Imp ...
[thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.hGRFBPRTgC9MdxHU7fspzwAAAA?pid=Api
[datePublished] => 2024-11-12T06:07:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://store.whitefalconpublishing.com/cdn/shop/files/East_Luwu_Mahalona_CoverF_large.jpg?v=1731390713
[hostPageUrl] => https://store.whitefalconpublishing.com/products/east-luwu-mahalona-transmigrant-alternatives-in-mitigating-poverty-impact
[contentSize] => 29382 B
[width] => 310
[height] => 480
[cDNContentUrl] => https://th.bing.com/th/id/R.84644504f453802f4c7711d4edfb29cf?rik=cql9kYeisNeuRA&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 056AA8743C0E9CBAD1F144AED7B0A287917DA972
[accentColor] => 835348
)
[C6CC1BFBBDF27DC7DF1BB2CA8AA626130925C50E] => Array
(
[name] => Security Services: HP launches security services - Times of India
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.rKQwbIlTG084WlflFTKg7QAAAA?pid=Api
[datePublished] => 2021-01-09T19:07:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://static.toiimg.com/thumb/msid-9025762,imgsize-2725,width-400,resizemode-4/9025762.jpg
[hostPageUrl] => https://timesofindia.indiatimes.com/it-services/HP-launches-security-services/articleshow/9025762.cms
[contentSize] => 9146 B
[width] => 400
[height] => 267
[cDNContentUrl] => https://th.bing.com/th/id/R.aca4306c89531b4f385a57e51532a0ed?rik=bMyxv9sv13z9sQ&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => E05C529031626AA8AC2BB1FD7CD72FDBBFB1CC6C
[accentColor] => 186695
)
[1062C8BDCD6563106E38D34BACDBF4AA7F3D05AC] => Array
(
[name] => BDS | Retrofittings | Micro-Concrete with Jacketing
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.48eUxRmzfNA2LZLO3YZl1QHaEK?pid=Api
[datePublished] => 2023-03-01T10:58:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.bdsindia.com/images/Corrosion-Mitigation-System-S2e.jpg
[hostPageUrl] => https://www.bdsindia.com/retrofittings_corrosion_mitigation_system.html
[contentSize] => 180563 B
[width] => 1920
[height] => 1080
[cDNContentUrl] => https://th.bing.com/th/id/R.e3c794c519b37cd0362d92cedd8665d5?rik=ASaM29xWNgHmgw&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => CA50D3F7AA4FBDCAB43D83E6013656DCDB8C2601
[accentColor] => 1F2041
)
[C4792C03B3CDF1A28A1D3F76804EF735FD01FFED] => Array
(
[name] => CleanML Python Dataset: Privacy Risk Scoring 2026
[thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.j9Q1VnTY09SZ-SyZA0dUSgHaHa?pid=Api
[datePublished] => 2025-11-22T13:43:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://johal.in/content/images/2025/08/logo-1.png
[hostPageUrl] => https://johal.in/cleanml-python-dataset-privacy-risk-scoring-2026/
[contentSize] => 1411915 B
[width] => 1024
[height] => 1024
[cDNContentUrl] => https://th.bing.com/th/id/R.8fd4355674d8d3d499f92c990347544a?rik=TJfCMDvcHyqo0Q&pid=ImgRaw&r=0
[isTransparent] => 1
[imageId] => DEFF10DF537FE40867F3D1A82A1FDC3B30C2974C
[accentColor] => 0054AC
)
[2CC973E0026636C771C7995119AC436BCA4ECFB3] => Array
(
[name] => Atlassian Addresses High-Severity Vulnerabilities in Confluence ...
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.uNnkXDPqCQtd-zbA7S9jmAHaEL?pid=Api
[datePublished] => 2024-06-20T10:39:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://techhyme.com/wp-content/uploads/2024/06/VMware-vCenter-Vulnerabilities.jpg
[hostPageUrl] => https://techhyme.com/atlassian-addresses-high-severity-vulnerabilities-in-confluence-crucible-and-jira/
[contentSize] => 35523 B
[width] => 1352
[height] => 764
[cDNContentUrl] => https://th.bing.com/th/id/R.b8d9e45c33ea090b5dfb36c0ed2f6398?rik=wpw3DiBmY3wXfA&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 3BFCE4ACB634CA9115997C177C6366200E379CC2
[accentColor] => 0C4A7B
)
[FA42A68D46903FC3B7721A83D9BF069A843C2681] => Array
(
[name] => Divecha Centre for Climate Change
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.WvhuY8JIApdAfrkSVkDNWQHaEK?pid=Api
[datePublished] => 2022-07-19T06:43:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => http://dccc.iisc.ac.in/assets/images/IMG_27_JAN_2022.jpg
[hostPageUrl] => http://dccc.iisc.ac.in/gallery_2022.html
[contentSize] => 161344 B
[width] => 1280
[height] => 720
[cDNContentUrl] => https://th.bing.com/th/id/R.5af86e63c2480297407eb9125640cd59?rik=ryRq2GQJ8zx7Jw&riu=http%3a%2f%2fdccc.iisc.ac.in%2fassets%2fimages%2fIMG_27_JAN_2022.jpg&ehk=sklc9Y0uBR%2bCthE9jfdHH1pVVJnsC9nMDNpxtclAtts%3d&risl=&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 1862C348A960FB9D38A1277B3CF30964D86A24AF
[accentColor] => 4B6880
)
[7D1A40EEA0031340FA215A95FB549D64761715FB] => Array
(
[name] => Delhi's Winter Air Pollution Case Study | Delhi Smog Case Study
[thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.t1q0qzNjUhPcNFjL2XQpRgHaKd?pid=Api
[datePublished] => 2022-06-09T06:54:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.ceew.in/sites/default/files/AQ_0.png
[hostPageUrl] => https://www.ceew.in/publications/delhi-winter-pollution-2021-case-study-on-air-quality-management
[contentSize] => 281957 B
[width] => 586
[height] => 828
[cDNContentUrl] => https://th.bing.com/th/id/R.b75ab4ab33635213dc3458cbd9742946?rik=16EE7gowMQSvEg&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => BF51716746D945BF59A512AF0431300AEE04A1D7
[accentColor] => 1985B2
)
[B5CC9E1041FEAA9E090F30D4BB50307A5BBAB25F] => Array
(
[name] => Current multilateral system failing to mitigate climate change: India
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.N_ae2pJklbSupL4GMoZC-wHaFK?pid=Api
[datePublished] => 2025-03-05T13:49:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB1hRljP.img?w=768&h=536&m=6&x=1580&y=852&s=1224&d=1224
[hostPageUrl] => https://www.msn.com/en-in/news/India/current-multilateral-system-failing-to-mitigate-climate-change-india/ar-AA1AiH8m
[contentSize] => 65536 B
[width] => 768
[height] => 536
[cDNContentUrl] => https://th.bing.com/th/id/R.37f69eda926495b4aea4be06328642fb?rik=W8zpARTvqumQ8A&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => F52BABB5A70305BB4D03F090E9AAEF1401E9CC5B
[accentColor] => 1454B7
)
[972DDB89DFC27973C36E582E61DE9D5E19C0AF1A] => Array
(
[name] => Mapping Vulnerabilities | Economic and Political Weekly
[thumbnailUrl] => https://tse3.mm.bing.net/th?id=OIF.1%2bfVV9xyJX1aJZy45%2fdnBA&pid=Api
[datePublished] => 2026-01-30T06:25:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.epw.in/themes/contrib/epw/images/paywall.jpg
[hostPageUrl] => https://www.epw.in/journal/special-articles/mapping-vulnerabilities.html
[contentSize] => 355314 B
[width] => 2362
[height] => 1653
[cDNContentUrl] => https://th.bing.com/th/id/R.8a478eb56327fd9c1269bd5e968f9cad?rik=&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => A1FA0C91E5D9ED16E285E63C37972CFD98BDD279
[accentColor] => AA2124
[isFresh] => 1
)
[73BCFDCD99EB8F4144FE5DF7C7B6495C26C7A4ED] => Array
(
[name] => IIT Researchers develop new method to mitigate Acid Mine Drainage from ...
[thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.wHDSzw9e0ukS6TyfmjtlTgHaEK?pid=Api
[datePublished] => 2022-06-30T14:41:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://akm-img-a-in.tosshub.com/lingo/itne/images/photo_gallery/202206/iit-researcher.jpg
[hostPageUrl] => https://www.indiatodayne.in/assam/photo/iit-researchers-develop-new-method-mitigate-acid-mine-drainage-northeastern-coalfields-418489-2022-06-28
[contentSize] => 145013 B
[width] => 1200
[height] => 675
[cDNContentUrl] => https://th.bing.com/th/id/R.c070d2cf0f5ed2e912e93c9f9a3b654e?rik=N8vf3Jm%2b%2bBRE7w&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => DE4A7C62C5946B7C7FD5EF4414F8BE99DCDFCB37
[accentColor] => 184480
)
[27D99B72245BEE2E75768878E584536277FAB9D9] => Array
(
[name] => Buy Festa Radon AMG Spirit Radon Fan - Quiet and Energy Efficient 121 ...
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.43y4Pd_GE__gnPtQ2Q5RTAHaHa?pid=Api
[datePublished] => 2022-09-22T06:43:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://i5.walmartimages.com/asr/b1fe0aa5-04ad-4491-bdb4-5da26cce9883.08ad3c16be7e167def23ac8da5bad5cf.jpeg
[hostPageUrl] => https://www.ubuy.co.in/product/5BTZSBWKO-festa-radon-amg-spirit-radon-fan-quiet-and-energy-efficient-121-cfm-radon-mitigation-system-inline-fan-5
[contentSize] => 220769 B
[width] => 4000
[height] => 4000
[cDNContentUrl] => https://th.bing.com/th/id/R.e37cb83ddfc613ffe09cfb50d90e514c?rik=cp25J0K17uJXZw&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 9D9BAF772635485E87886757E2EEB54227B99D72
[accentColor] => A82328
)
[1BE2BEBD56DC0A5C1C42C89ACC890AC58917ACFA] => Array
(
[name] => Mitigate migraine
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.rTUV3ZEcv1sRvmRVQisx3AAAAA?pid=Api
[datePublished] => 2022-07-13T00:32:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://static.toiimg.com/thumb/imgsize-174424,msid-92835377,width-400,resizemode-4/92835377.jpg
[hostPageUrl] => https://bangaloremirror.indiatimes.com/opinion/you/mitigate-migraine/articleshow/92835330.cms
[contentSize] => 21267 B
[width] => 400
[height] => 300
[cDNContentUrl] => https://th.bing.com/th/id/R.ad3515dd911cbf5b11be6455422b31dc?rik=sS7r22XNoMXBJA&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => AFCA71985CA098CCA98C24C1C5A0CD65DBEB2EB1
[accentColor] => 752021
)
[57E1A789309B80E24C5720C60200C4664290E2DA] => Array
(
[name] => Symptoms, Treatment And Preventative Measures Of Bronchitis | OnlyMyHealth
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.CsFEG53Ve9kk4713xLxj_gHaEK?pid=Api
[datePublished] => 2022-12-31T04:31:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://images.onlymyhealth.com/imported/images/2022/December/30_Dec_2022/main_copd.jpg
[hostPageUrl] => https://www.onlymyhealth.com/symptoms-treatment-and-preventative-measures-of-bronchitis-1672401096
[contentSize] => 43171 B
[width] => 1200
[height] => 675
[cDNContentUrl] => https://th.bing.com/th/id/R.0ac1441b9dd57bd924e3bd77c4bc63fe?rik=dR56mAO5CC7EdQ&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => AD2E0924664C00206C0275C42E08B903987A1E75
[accentColor] => C98002
)
[4D4C28948D5519DCA2572B9C7C1083367C98F20C] => Array
(
[name] => World has been discussing global warming and how to mitigate it for the ...
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.sAr17hoeMr8TaHmOaBWbCwAAAA?pid=Api
[datePublished] => 2016-01-25T11:26:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://static.toiimg.com/photo/50718482.cms
[hostPageUrl] => https://timesofindia.indiatimes.com/videos/news/World-has-been-discussing-global-warming-and-how-to-mitigate-it-for-the-last-one-year-PM-Modi/videoshow/50718482.cms
[contentSize] => 6805 B
[width] => 365
[height] => 270
[cDNContentUrl] => https://th.bing.com/th/id/R.b00af5ee1a1e32bf1368798e68159b0b?rik=1MSCSdhVkc0qdQ&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => C02F89C7633801C7C9B2752ACD9155D84982C4D4
[accentColor] => 5F3F3E
)
[5BDCBA58C39788CFEE83DF1794E9C04D0B6B0394] => Array
(
[name] => Pre-disaster Mitigation (PDM) grant program icon
[thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.1zzYHTX7h_Lr_VXo24PbWwAAAA?pid=Api
[datePublished] => 2021-12-30T16:26:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://emilms.fema.gov/is_0031b/media/388.png
[hostPageUrl] => https://emilms.fema.gov/is_0031b/groups/15.html
[contentSize] => 29449 B
[width] => 110
[height] => 159
[cDNContentUrl] => https://th.bing.com/th/id/R.d73cd81d35fb87f2ebfd55e8db83db5b?rik=tc2rhTx5iPzuOA&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 4930B6B0D40C9E4971FD38EEFC88793C85ABCDB5
[accentColor] => C26609
)
[BF0D9A5288900E953D5A73B89B6212D18459F021] => Array
(
[name] => Delhi Govt committed to mitigate sufferings of displaced Kashmiri ...
[thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.2-t9oARwZ4xTTiISRGOBPAHaFF?pid=Api
[datePublished] => 2025-05-26T01:39:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.crosstownnews.in/Banner-Pics/SOOD.jpg
[hostPageUrl] => https://www.crosstownnews.in/post/142532/delhi-govt-committed-to-mitigate-sufferings-of-displaced-kps-sood.html
[contentSize] => 83202 B
[width] => 632
[height] => 434
[cDNContentUrl] => https://th.bing.com/th/id/R.dbeb7da00470678c534e22124463813c?rik=%2b9CpJYgJ4FnTpQ&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 120F95481D2126B98B37A5D359E0098825A9D0FB
[accentColor] => 41306D
)
[42B443676C092F13A93972E46215A804F34CA9C6] => Array
(
[name] => US reciprocal tariffs: India can plan some ’easy wins’ for Trump to ...
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.4v8L_1MoGSdN9lLmsydOGwHaE7?pid=Api
[datePublished] => 2025-03-27T11:19:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://i-invdn-com.investing.com/news/LYNXMPEE390KX_L.jpg
[hostPageUrl] => https://in.investing.com/news/economy/us-reciprocal-tariffs-india-can-plan-some-easy-wins-for-trump-to-mitigate-larger-impact-4743688
[contentSize] => 66961 B
[width] => 800
[height] => 533
[cDNContentUrl] => https://th.bing.com/th/id/R.e2ff0bff532819274df652e6b3274e1b?rik=JEs0dsaQ8jGakw&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 6C9AC43F408A51264E27939A31F290C676344B24
[accentColor] => A22E29
)
[00C43D0F4E53D98AFD2330B2C7CC5C07F336B1B3] => Array
(
[name] => 'Apply updates': Govt issues high risk warning for Google Chrome users ...
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.SCOZ2DLUxB1n4mub0DUrrgHaEK?pid=Api
[datePublished] => 2023-08-10T16:42:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://akm-img-a-in.tosshub.com/businesstoday/images/story/202308/google_chrome-sixteen_nine.jpg?size=948:533
[hostPageUrl] => https://www.businesstoday.in/latest/story/apply-updates-govt-issues-high-risk-warning-for-google-chrome-users-393682-2023-08-10
[contentSize] => 17306 B
[width] => 948
[height] => 533
[cDNContentUrl] => https://th.bing.com/th/id/R.482399d832d4c41d67e26b9bd0352bae?rik=AEzT8OQ1najfMg&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 3B1B633F70C5CC7C2B0332DFA89D35E4F0D34C00
[accentColor] => C70415
)
[62DCAE0D17284C8580091129168C0692EDC9D54B] => Array
(
[name] => Cash Solution in pune, Cash Solution companies in Lucknow, Cash ...
[thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.2JLNwWEG45Rvya0ux-M8zAHaHa?pid=Api
[datePublished] => 2023-08-26T11:00:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://vankan.co.in/docs/docfile_87478352.webp
[hostPageUrl] => https://vankan.co.in/blog/mitigating-risks-with-cash-solutions
[contentSize] => 114608 B
[width] => 1080
[height] => 1080
[cDNContentUrl] => https://th.bing.com/th/id/R.d892cdc16106e3946fc9ad2ec7e33ccc?rik=Js3q0HGCxFgIkA&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => B45D9CDE2960C8619211900858C48271D0EACD26
[accentColor] => C98502
)
[E1C8F86D069698EBA8D6B7AFD589774B5B8F2E78] => Array
(
[name] => TSK Automations || Security Services
[thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.3ZEYieqgjZdnnJNb9g4mtwHaE8?pid=Api
[datePublished] => 2024-12-10T03:56:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://tskautomations.com/ContentImg/DatabaseSecurity.jpg
[hostPageUrl] => https://tskautomations.com/Securityservices.html
[contentSize] => 43796 B
[width] => 600
[height] => 400
[cDNContentUrl] => https://th.bing.com/th/id/R.dd911889eaa08d97679c935bf60e26b7?rik=HoyP1mBpib6KbQ&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 87E2F8B5B477985DFA7B6D8ABE896960D68F8C1E
[accentColor] => 1B6AB0
)
[80FA889F10A57FF2642111E1BF434076D37ED9F2] => Array
(
[name] => Identify best practices to mitigate defaulting of vehicle loans ...
[thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.Lh9ewSzSaaH3EHl948VXYAHaEK?pid=Api
[datePublished] => 2022-09-18T07:36:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://i.vimeocdn.com/video/1508765806-a25e1ba818fbaed932bf903cd57558ea7d1771c7aba5e9cceb83dcfcf650e311-d_640.jpg
[hostPageUrl] => https://www.mentormind.in/menternships/identify-best-practices-to-mitigate-defaulting-of-vehicle-loans
[contentSize] => 16492 B
[width] => 640
[height] => 360
[cDNContentUrl] => https://th.bing.com/th/id/R.2e1f5ec12cd269a1f710797de3c55760?rik=CK%2bI%2bQFa9y9GEg&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 2F9DE73D670434FB1E1112462FF75A01F988AF08
[accentColor] => C79A04
)
[34534BC72AF4908A5901A20786636AFBA6CA704A] => Array
(
[name] => Brené Brown Quote: “Trust is a product of vulnerability that grows over ...
[thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.ppbY0QhZpMI1yskab3vdtwHaEK?pid=Api
[datePublished] => 2020-08-27T11:55:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://quotefancy.com/media/wallpaper/1600x900/4709011-Bren-Brown-Quote-Trust-is-a-product-of-vulnerability-that-grows.jpg
[hostPageUrl] => https://quotefancy.com/quote/777871/Bren-Brown-Trust-is-a-product-of-vulnerability-that-grows-over-time-and-requires-work
[contentSize] => 89047 B
[width] => 1600
[height] => 900
[cDNContentUrl] => https://th.bing.com/th/id/R.a696d8d10859a4c235cac91a6f7bddb7?rik=QzW0fKJPCaiVEA&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => A407AC6ABFA63668702A1095A8094FA27CB43543
[accentColor] => C95E02
)
[D7EE475D927A1D99F06392BE46465155318512F7] => Array
(
[name] => Google: Google says Spanish spyware vendor exploited zero-day ...
[thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.2nR534JDcrRWhmLLRFzurAHaEB?pid=Api
[datePublished] => 2022-12-01T04:30:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://static.toiimg.com/thumb/msid-95902315,width-1070,height-580,imgsize-34850,resizemode-75,overlay-toi_sw,pt-32,y_pad-40/photo.jpg
[hostPageUrl] => https://timesofindia.indiatimes.com/gadgets-news/google-says-spanish-spyware-vendor-exploited-zero-day-vulnerabilities-in-chrome-firefox-and-windows/articleshow/95902367.cms
[contentSize] => 39968 B
[width] => 1068
[height] => 580
[cDNContentUrl] => https://th.bing.com/th/id/R.da7479df824372b4568662cb445ceeac?rik=fe501Smn0ZkPNg&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 7F21581355156464EB29360F99D1A729D574EE7D
[accentColor] => C80303
)
[428E153C7C2B8625C1BF932414AB835DD79BEF79] => Array
(
[name] => Cisco Vulnerability Management (formerly Kenna.VM) - Cisco
[thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.JFE5Zz6-HGS8OatMGD_nxAHaDC?pid=Api
[datePublished] => 2015-10-19T08:14:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.cisco.com/content/dam/cisco-cdc/site/images/heroes/products/security/vulnerability-management-hero-index-desktop-3200x1312.jpg
[hostPageUrl] => https://www.cisco.com/site/in/en/products/security/vulnerability-management/index.html
[contentSize] => 215639 B
[width] => 3200
[height] => 1312
[cDNContentUrl] => https://th.bing.com/th/id/R.245139673ebe1c64bc39ab4c183fe7c4?rik=JOhRw8eyaFIc%2bw&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 97FEB97DD538BA414239FB1C5268B2C7C351E824
[accentColor] => 042F76
)
[FA860936340BD5369A92F77B61178206C7D8A7D2] => Array
(
[name] => Chapter 3 Risk Assessments: Understanding Vulnerabilities and ...
[thumbnailUrl] => https://tse2.mm.bing.net/th?id=OIF.ZMn%2bzyrPSS7GOTr5c%2fREJA&pid=Api
[datePublished] => 2026-01-29T20:43:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://website-assets.studocu.com/img/document_thumbnails/00c4763fb6c833a00450fa4f7d912fcf/thumb_1200_1697.png
[hostPageUrl] => https://www.studocu.com/ph/document/national-university-philippines/accountancy/chapter-3-risk-assessments-understanding-vulnerabilities-and-mitigation/152017133
[contentSize] => 206131 B
[width] => 1200
[height] => 1697
[cDNContentUrl] => https://th.bing.com/th/id/R.6ee2bb1f09a7391d06cb16ce2af668c6?rik=&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 2D7A8D7C60287116B77F29A9635DB043639068AF
[accentColor] => 131313
[isFresh] => 1
)
)
[relatedSearches] => Array
(
[0] => Array
(
[text] => Software Vulnerabilities
[displayText] => Software Vulnerabilities
[webSearchUrl] => https://www.bing.com/images/search?q=Software+Vulnerabilities&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5834.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Software+Vulnerabilities
[thumbnail] => Array
(
[thumbnailUrl] => https://tse4.mm.bing.net/th?q=Software+Vulnerabilities&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[1] => Array
(
[text] => Mitigating Threats
[displayText] => Mitigating Threats
[webSearchUrl] => https://www.bing.com/images/search?q=Mitigating+Threats&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5836.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Mitigating+Threats
[thumbnail] => Array
(
[thumbnailUrl] => https://tse3.mm.bing.net/th?q=Mitigating+Threats&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[2] => Array
(
[text] => Software Vulnerability
[displayText] => Software Vulnerability
[webSearchUrl] => https://www.bing.com/images/search?q=Software+Vulnerability&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5838.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Software+Vulnerability
[thumbnail] => Array
(
[thumbnailUrl] => https://tse4.mm.bing.net/th?q=Software+Vulnerability&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[3] => Array
(
[text] => Risk and Mitigation Plan Template
[displayText] => Risk and Mitigation Plan Template
[webSearchUrl] => https://www.bing.com/images/search?q=Risk+and+Mitigation+Plan+Template&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5840.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Risk+and+Mitigation+Plan+Template
[thumbnail] => Array
(
[thumbnailUrl] => https://tse1.mm.bing.net/th?q=Risk+and+Mitigation+Plan+Template&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[4] => Array
(
[text] => Risk Mitigation Techniques
[displayText] => Risk Mitigation Techniques
[webSearchUrl] => https://www.bing.com/images/search?q=Risk+Mitigation+Techniques&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5842.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Risk+Mitigation+Techniques
[thumbnail] => Array
(
[thumbnailUrl] => https://tse4.mm.bing.net/th?q=Risk+Mitigation+Techniques&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[5] => Array
(
[text] => Hardware Vulnerabilities
[displayText] => Hardware Vulnerabilities
[webSearchUrl] => https://www.bing.com/images/search?q=Hardware+Vulnerabilities&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5844.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Hardware+Vulnerabilities
[thumbnail] => Array
(
[thumbnailUrl] => https://tse1.mm.bing.net/th?q=Hardware+Vulnerabilities&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[6] => Array
(
[text] => Security Vulnerability
[displayText] => Security Vulnerability
[webSearchUrl] => https://www.bing.com/images/search?q=Security+Vulnerability&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5846.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Security+Vulnerability
[thumbnail] => Array
(
[thumbnailUrl] => https://tse3.mm.bing.net/th?q=Security+Vulnerability&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[7] => Array
(
[text] => Infrastructure Vulnerability
[displayText] => Infrastructure Vulnerability
[webSearchUrl] => https://www.bing.com/images/search?q=Infrastructure+Vulnerability&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5848.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Infrastructure+Vulnerability
[thumbnail] => Array
(
[thumbnailUrl] => https://tse2.mm.bing.net/th?q=Infrastructure+Vulnerability&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[8] => Array
(
[text] => Mitigating Ssrf Vulnerabilities Images
[displayText] => Mitigating Ssrf Vulnerabilities Images
[webSearchUrl] => https://www.bing.com/images/search?q=Mitigating+Ssrf+Vulnerabilities+Images&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5850.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Mitigating+Ssrf+Vulnerabilities+Images
[thumbnail] => Array
(
[thumbnailUrl] => https://tse2.mm.bing.net/th?q=Mitigating+Ssrf+Vulnerabilities+Images&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[9] => Array
(
[text] => Risk Mitigation Strategies
[displayText] => Risk Mitigation Strategies
[webSearchUrl] => https://www.bing.com/images/search?q=Risk+Mitigation+Strategies&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5852.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Risk+Mitigation+Strategies
[thumbnail] => Array
(
[thumbnailUrl] => https://tse4.mm.bing.net/th?q=Risk+Mitigation+Strategies&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[10] => Array
(
[text] => Mitigate Vulnerabilities
[displayText] => Mitigate Vulnerabilities
[webSearchUrl] => https://www.bing.com/images/search?q=Mitigate+Vulnerabilities&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5854.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Mitigate+Vulnerabilities
[thumbnail] => Array
(
[thumbnailUrl] => https://tse3.mm.bing.net/th?q=Mitigate+Vulnerabilities&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[11] => Array
(
[text] => Risks and Vulnerabilities
[displayText] => Risks and Vulnerabilities
[webSearchUrl] => https://www.bing.com/images/search?q=Risks+and+Vulnerabilities&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5856.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Risks+and+Vulnerabilities
[thumbnail] => Array
(
[thumbnailUrl] => https://tse2.mm.bing.net/th?q=Risks+and+Vulnerabilities&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[12] => Array
(
[text] => Cyber Threats and Vulnerabilities
[displayText] => Cyber Threats and Vulnerabilities
[webSearchUrl] => https://www.bing.com/images/search?q=Cyber+Threats+and+Vulnerabilities&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5858.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Cyber+Threats+and+Vulnerabilities
[thumbnail] => Array
(
[thumbnailUrl] => https://tse2.mm.bing.net/th?q=Cyber+Threats+and+Vulnerabilities&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[13] => Array
(
[text] => Threat Vulnerability Assessment
[displayText] => Threat Vulnerability Assessment
[webSearchUrl] => https://www.bing.com/images/search?q=Threat+Vulnerability+Assessment&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5860.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Threat+Vulnerability+Assessment
[thumbnail] => Array
(
[thumbnailUrl] => https://tse3.mm.bing.net/th?q=Threat+Vulnerability+Assessment&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[14] => Array
(
[text] => Vulnerability Management
[displayText] => Vulnerability Management
[webSearchUrl] => https://www.bing.com/images/search?q=Vulnerability+Management&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5862.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Vulnerability+Management
[thumbnail] => Array
(
[thumbnailUrl] => https://tse2.mm.bing.net/th?q=Vulnerability+Management&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[15] => Array
(
[text] => Framework for Mitigating Open Source Vulnerabilities
[displayText] => Framework for Mitigating Open Source Vulnerabilities
[webSearchUrl] => https://www.bing.com/images/search?q=Framework+for+Mitigating+Open+Source+Vulnerabilities&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5864.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Framework+for+Mitigating+Open+Source+Vulnerabilities
[thumbnail] => Array
(
[thumbnailUrl] => https://tse4.mm.bing.net/th?q=Framework+for+Mitigating+Open+Source+Vulnerabilities&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[16] => Array
(
[text] => Hardware Vulnerability List
[displayText] => Hardware Vulnerability List
[webSearchUrl] => https://www.bing.com/images/search?q=Hardware+Vulnerability+List&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5866.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Hardware+Vulnerability+List
[thumbnail] => Array
(
[thumbnailUrl] => https://tse1.mm.bing.net/th?q=Hardware+Vulnerability+List&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[17] => Array
(
[text] => Web Application Vulnerabilities
[displayText] => Web Application Vulnerabilities
[webSearchUrl] => https://www.bing.com/images/search?q=Web+Application+Vulnerabilities&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5868.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Web+Application+Vulnerabilities
[thumbnail] => Array
(
[thumbnailUrl] => https://tse1.mm.bing.net/th?q=Web+Application+Vulnerabilities&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[18] => Array
(
[text] => Identify Security Vulnerabilities
[displayText] => Identify Security Vulnerabilities
[webSearchUrl] => https://www.bing.com/images/search?q=Identify+Security+Vulnerabilities&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5870.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Identify+Security+Vulnerabilities
[thumbnail] => Array
(
[thumbnailUrl] => https://tse3.mm.bing.net/th?q=Identify+Security+Vulnerabilities&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[19] => Array
(
[text] => Standard SLA for Mitigating OWASP Vulnerabilities
[displayText] => Standard SLA for Mitigating OWASP Vulnerabilities
[webSearchUrl] => https://www.bing.com/images/search?q=Standard+SLA+for+Mitigating+OWASP+Vulnerabilities&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5872.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Standard+SLA+for+Mitigating+OWASP+Vulnerabilities
[thumbnail] => Array
(
[thumbnailUrl] => https://tse4.mm.bing.net/th?q=Standard+SLA+for+Mitigating+OWASP+Vulnerabilities&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[20] => Array
(
[text] => Mitigating Vulnerabilities in Biometric Security Presentation Slides
[displayText] => Mitigating Vulnerabilities in Biometric Security Presentation Slides
[webSearchUrl] => https://www.bing.com/images/search?q=Mitigating+Vulnerabilities+in+Biometric+Security+Presentation+Slides&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5874.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Mitigating+Vulnerabilities+in+Biometric+Security+Presentation+Slides
[thumbnail] => Array
(
[thumbnailUrl] => https://tse3.mm.bing.net/th?q=Mitigating+Vulnerabilities+in+Biometric+Security+Presentation+Slides&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[21] => Array
(
[text] => Mitigation vs Preparedness
[displayText] => Mitigation vs Preparedness
[webSearchUrl] => https://www.bing.com/images/search?q=Mitigation+vs+Preparedness&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5876.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Mitigation+vs+Preparedness
[thumbnail] => Array
(
[thumbnailUrl] => https://tse3.mm.bing.net/th?q=Mitigation+vs+Preparedness&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[22] => Array
(
[text] => Threat vs Exploit
[displayText] => Threat vs Exploit
[webSearchUrl] => https://www.bing.com/images/search?q=Threat+vs+Exploit&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5878.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Threat+vs+Exploit
[thumbnail] => Array
(
[thumbnailUrl] => https://tse3.mm.bing.net/th?q=Threat+vs+Exploit&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[23] => Array
(
[text] => Remediate Vulnerabilities
[displayText] => Remediate Vulnerabilities
[webSearchUrl] => https://www.bing.com/images/search?q=Remediate+Vulnerabilities&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5880.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Remediate+Vulnerabilities
[thumbnail] => Array
(
[thumbnailUrl] => https://tse1.mm.bing.net/th?q=Remediate+Vulnerabilities&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[24] => Array
(
[text] => EC-Council Web Vulnerabilities
[displayText] => EC-Council Web Vulnerabilities
[webSearchUrl] => https://www.bing.com/images/search?q=EC-Council+Web+Vulnerabilities&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5882.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=EC-Council+Web+Vulnerabilities
[thumbnail] => Array
(
[thumbnailUrl] => https://tse1.mm.bing.net/th?q=EC-Council+Web+Vulnerabilities&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[25] => Array
(
[text] => Mitigating Vuklnerabiliuties Images
[displayText] => Mitigating Vuklnerabiliuties Images
[webSearchUrl] => https://www.bing.com/images/search?q=Mitigating+Vuklnerabiliuties+Images&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5884.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Mitigating+Vuklnerabiliuties+Images
[thumbnail] => Array
(
[thumbnailUrl] => https://tse2.mm.bing.net/th?q=Mitigating+Vuklnerabiliuties+Images&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
)
[createdate] => 1769840767158
)
[json_error] => No error
[products_count] => 120
[related_searches_count] => 26
[first_product_sample] => Array
(
[name] => INR Full Form: What is full form of INR?
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.-HbYAKjSJ-4PC_ZocKUqaAHaEU?pid=Api
[datePublished] => 2022-11-05T12:08:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://st.adda247.com/https://wpassets.adda247.com/wp-content/uploads/multisite/2022/11/05144815/What-is-INR.png
[hostPageUrl] => https://www.bankersadda.com/inr-full-form/
[contentSize] => 35329 B
[width] => 720
[height] => 420
[cDNContentUrl] => https://th.bing.com/th/id/R.f876d800a8d227ee0f0bf66870a52a68?rik=9dn5m93IRzckzA&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 014A62469F40119550EFCC243747C8DD9BF9D9F5
[accentColor] => B71414
)
)
[skipped_products] => Array
(
)
)