#section-4-353 > .ct-section-inner-wrap{padding-bottom:var(--space-xl) }#div_block-6-353{width:50%;text-align:left;align-items:center}#div_block-7-353{width:50%;text-align:left;align-items:center}@media (max-width:991px){#new_columns-5-353> .ct-div-block{width:100% !important}}#headline-10-353{text-align:center;margin-bottom:var(--space-m) }#headline-22-353{text-align:center;margin-bottom:var(--space-m) }#_rich_text-24-353{color:var(--bg-darkblue);width:80%}#_rich_text-14-353{color:var(--bg-darkblue);width:80%}#div_block-23-353{background-image:url(https://knowledgebase.generativesecurity.ai/wp-content/uploads/2025/09/questionmark.jpg);background-size:cover;margin-bottom:var(--space-m) ;width:200px;height:260px}#link-11-353{width:90%}#div_block-15-353{background-image:url(https://knowledgebase.generativesecurity.ai/wp-content/uploads/2025/09/automation-guides-1.jpg);background-size:cover;margin-bottom:var(--space-m) ;width:200px;height:260px}#link-21-353{width:90%}#image-3-353{margin-bottom:var(--space-m) }