[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"nav-categories":3,"article-asset-risk-management-securing-your-business-against-cyber-attacks":70},{"data":4},[5,37,57,64],{"name":6,"slug":7,"categories":8},"Productivity","productivity",[9,13,17,21,25,29,33],{"id":10,"title":11,"slug":12},17,"Branding","branding",{"id":14,"title":15,"slug":16},19,"Marketing","marketing",{"id":18,"title":19,"slug":20},20,"Work","work",{"id":22,"title":23,"slug":24},34,"Community","community",{"id":26,"title":27,"slug":28},21,"For newbies","for-newbies",{"id":30,"title":31,"slug":32},24,"Investment","investment",{"id":34,"title":35,"slug":36},22,"Finance","finance",{"name":38,"slug":39,"categories":40},"Tech","tech",[41,45,49,53],{"id":42,"title":43,"slug":44},28,"Technology","technology",{"id":46,"title":47,"slug":48},32,"Artificial Intelligence","artificial-intelligence",{"id":50,"title":51,"slug":52},26,"Security and protection","security-and-protection",{"id":54,"title":55,"slug":56},31,"YouTube Blog","youtube-blog",{"name":58,"slug":59,"categories":60},"News","news",[61],{"id":62,"title":58,"slug":63},18,"quasanews",{"name":65,"slug":66,"categories":67},"Business","business",[68],{"id":69,"title":65,"slug":66},16,{"post":71,"published_news":96,"popular_news":160,"categories":229},{"title":72,"description":73,"meta_title":72,"meta_description":73,"meta_keywords":72,"text":74,"slug":75,"created_at":76,"publish_at":77,"formatted_created_at":78,"category_id":50,"links":79,"view_type":84,"video_url":85,"views":86,"likes":87,"lang":88,"comments_count":89,"category":90},"Asset Risk Management: Securing Your Business Against Cyber Attacks","The first security metric we would like to highlight is the attack surface.","\u003Cp>Hello!\u003C/p>\n\n\u003Cp>In early 2017 the medical community was shaken when an organized ransomware cyber-attack was executed against a major healthcare group in the United Kingdom. The attack resulted in medical equipment, critical for sustaining the life of their patients, failing, endangering the lives of hundreds of patients.\u003C/p>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-1/0-fi-14.webp\" type=\"image/webp\">\u003Cimg alt=\"Asset Risk Management: Securing Your Business Against Cyber Attacks\" class=\"image-align-left\" height=\"150\" src=\"https://cdn.quasa.io/photos/foto-1/0-fi-14.jpeg\" width=\"250\" />\u003C/picture>Although cyber-attacks are not normally life-threatening, they have the capability of causing catastrophic damage to organizations and industries.\u003C/p>\n\n\u003Cp>The acts of securing organizational assets, applications, and outward-facing and SaaS ecosystems, are essential cyber security vertices.\u003C/p>\n\n\u003Cp>Our example of what transpired at the NHS, highlights the need for an Asset Risk platform, like&nbsp;sepiocyber, for example, which is designed to actively monitor all networked devices, both those established on the network as well as those temporarily joining the network. IoT devices are a good example of the latter.\u003C/p>\n\n\u003Ch4>Securing Assets on Your Network\u003C/h4>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-16/ffff-11.webp\" type=\"image/webp\">\u003Cimg alt=\"Asset Risk Management: Securing Your Business Against Cyber Attacks\" class=\"image-align-left\" height=\"168\" src=\"https://cdn.quasa.io/photos/foto-16/ffff-11.jpeg\" width=\"300\" />\u003C/picture>To secure your organization from \u003Ca href=\"https://quasa.io/media/a-look-into-recent-cyber-attacks-and-the-lessons-we-learned\">cyber-attacks\u003C/a>, there are a few basic metrics that need to be addressed as part of the asset risk management initiative of your organization.\u003C/p>\n\n\u003Cp>These metrics are seen as layers to an effective cyber asset risk management strategy. Improving your organization&rsquo;s overall cyber security posture.\u003C/p>\n\n\u003Ch4>Attack Surface Management\u003C/h4>\n\n\u003Cp>The first security metric we would like to highlight is the attack surface. The attack surface can be defined as A set of points on the perimeter of a network, system, system element, or cloud ecosystem from which an attacker can attempt to penetrate, influence, or extract data from.\u003C/p>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-16/ffff-12.webp\" type=\"image/webp\">\u003Cimg alt=\"Asset Risk Management: Securing Your Business Against Cyber Attacks\" class=\"image-align-left\" height=\"169\" src=\"https://cdn.quasa.io/photos/foto-16/ffff-12.jpeg\" width=\"300\" />\u003C/picture>Attack surface testing is done only from&nbsp;the perspective of the attacker, not from the point of view of the organization. Managing your attack surface means continually identifying potential targets in your organization&rsquo;s cyber presence.\u003C/p>\n\n\u003Cp>Organizations must actively seek out and determine the true extent of their attack surface and assess potential risk based on the opportunities presented to threat actors.\u003C/p>\n\n\u003Cp>Knowing which assets are part of your organization&rsquo;s cyber presence is the first step to effective asset risk management. B should strive to be transparent about its networks and connected services. By discovering assets on your network, AI-driven monitoring software can intervene and apply security rules to protect both your connected assets and your network.\u003C/p>\n\n\u003Ch4>Least Privilege &amp; Zero Trust\u003C/h4>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-16/ffff-13.webp\" type=\"image/webp\">\u003Cimg alt=\"Asset Risk Management: Securing Your Business Against Cyber Attacks\" class=\"image-align-left\" height=\"172\" src=\"https://cdn.quasa.io/photos/foto-16/ffff-13.jpeg\" width=\"294\" />\u003C/picture>These two practices are closely related, and both protect access points and implement access management along with access control to attain comprehensive asset policy enforcement.\u003C/p>\n\n\u003Cp>According to the NIST, Least privilege is&nbsp;a fundamental IT security concept&nbsp;that promotes limited access to specific data, applications, and network components only for those who need the privilege to perform their job or function.\u003C/p>\n\n\u003Cp>Zero trust, on the other hand, is a concept that eliminates all implied trust, regardless of who is accessing what. No one is trusted in this model, so internal and external access must be validated and authenticated every time access to the organization&rsquo;s ecosystem is requested. This includes assets such as users, services, and \u003Ca href=\"https://quasa.io/media/how-to-can-change-iot-to-wealth-management\">IoT\u003C/a>.\u003C/p>\n\n\u003Ch4>Recovering From A Security Breach\u003C/h4>\n\n\u003Cp>The final metric relating to asset risk management we would like to present is your organization&rsquo;s ability to address a security breach and recover from any possible damage inflicted.\u003C/p>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-16/ffff-14.webp\" type=\"image/webp\">\u003Cimg alt=\"Asset Risk Management: Securing Your Business Against Cyber Attacks\" class=\"image-align-left\" height=\"166\" src=\"https://cdn.quasa.io/photos/foto-16/ffff-14.jpg\" width=\"300\" />\u003C/picture>The third silo of the Cyber Security Triad is availability. It is a critical foundation of any network security program. Services and data must be available at all times to enable organizations to continuously respond to the demands of their customers and other stakeholders.\u003C/p>\n\n\u003Cp>Organizations face all kinds of cyber threats that can disrupt operations or take them offline completely. There are steps you can take to protect your business, and a tested business continuity plan can be essential. After a \u003Ca href=\"https://quasa.io/media/what-is-the-future-of-cyber-attacks\">cyberattack\u003C/a>, the organization&rsquo;s SOC must be able to determine exactly how the attack was carried out and networked assets were compromised. Speeding up the recovery during the aftermath of an attack.\u003C/p>\n\n\u003Chr />\n\u003Cp>\u003Cstrong>Also read:\u003C/strong>\u003C/p>\n\n\u003Cul>\n\t\u003Cli>\u003Ca href=\"https://quasa.io/media/why-job-hopping-can-impact-your-investment-strategy\">Why Job Hopping Can Impact Your Investment Strategy\u003C/a>\u003C/li>\n\t\u003Cli>\u003Ca href=\"https://quasa.io/media/how-to-add-the-facebook-pixel-to-shopify\">How to Add the Facebook Pixel to Shopify\u003C/a>\u003C/li>\n\t\u003Cli>\u003Ca href=\"https://quasa.io/media/top-6-effective-methods-on-how-to-collect-data-with-examples\">Top 6 Effective Methods on How to Collect Data with Examples\u003C/a>\u003C/li>\n\u003C/ul>\n\n\u003Chr />\n\u003Ch4>In Conclusion\u003C/h4>\n\n\u003Cp>Despite the unfortunate fact that organizations cannot completely protect themselves from threats or cyber-attacks, layering security mechanisms provides the best defense.&nbsp;\u003C/p>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-16/ffff-15.webp\" type=\"image/webp\">\u003Cimg alt=\"Asset Risk Management: Securing Your Business Against Cyber Attacks\" class=\"image-align-left\" height=\"172\" src=\"https://cdn.quasa.io/photos/foto-16/ffff-15.jpeg\" width=\"293\" />\u003C/picture>Security monitoring systems&nbsp;that run autonomously in the background have become an industry standard.\u003C/p>\n\n\u003Cp>Organizations can have peace of mind knowing their network is monitored no matter how many assets are connected by using an asset risk monitoring solution implemented as a \u003Ca href=\"https://quasa.io/media/saas-companies-can-take-the-lead-with-6-time-tested-sales-tactics-in-2022\">SaaS\u003C/a> service. This is especially helpful in the healthcare industry.\u003C/p>\n\n\u003Cp>Thank you!\u003Cbr />\nJoin us on social media!\u003Cbr />\nSee you!\u003C/p>","asset-risk-management-securing-your-business-against-cyber-attacks","2022-11-30T14:03:49.000000Z","2022-12-01T08:30:00.000000Z","01.12.2022",{"image":80,"image_webp":81,"thumb":82,"thumb_webp":83},"https://cdn.quasa.io/images/news/bvwcioimEb6fAlGxLMFToxXkFjri673mipLgxw38.jpg","https://cdn.quasa.io/images/news/bvwcioimEb6fAlGxLMFToxXkFjri673mipLgxw38.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/bvwcioimEb6fAlGxLMFToxXkFjri673mipLgxw38.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/bvwcioimEb6fAlGxLMFToxXkFjri673mipLgxw38.webp","large",null,1852,1,"en",0,{"id":50,"title":51,"slug":52,"meta_title":91,"meta_description":92,"meta_keywords":93,"deleted_at":85,"created_at":94,"updated_at":95,"lang":88},"Quasa media blog on growth hacking in Security and Protection","Trends and forecasts. Facts and incredible life hacks in Quasa Media about security and protection.","Security and protection, hacker, hackers, hacking, technology, cybersecurity","2022-04-17T21:18:28.000000Z","2024-08-25T15:38:18.000000Z",[97,111,122,134,147],{"title":98,"description":99,"slug":100,"created_at":101,"publish_at":101,"formatted_created_at":102,"category":103,"links":104,"view_type":109,"video_url":85,"views":62,"likes":89,"lang":88,"comments_count":89,"is_pinned":110},"Cloudflare Just Made Email a First-Class Citizen for AI Agents — And Traditional Email Services Are Feeling It","On April 17, 2026, Cloudflare quietly turned a long-standing dream into reality: it moved Email Service into public beta and added full Email Sending alongside the years-old Email Routing.","cloudflare-just-made-email-a-first-class-citizen-for-ai-agents-and-traditional-email-services-are-feeling-it","2026-04-19T18:41:05.000000Z","19.04.2026",{"title":43,"slug":44},{"image":105,"image_webp":106,"thumb":107,"thumb_webp":108},"https://cdn.quasa.io/images/news/BL8rqDdPh380Xfk5TP00aXBFWdOVXI5BUQ1TuSaC.jpg","https://cdn.quasa.io/images/news/BL8rqDdPh380Xfk5TP00aXBFWdOVXI5BUQ1TuSaC.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/BL8rqDdPh380Xfk5TP00aXBFWdOVXI5BUQ1TuSaC.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/BL8rqDdPh380Xfk5TP00aXBFWdOVXI5BUQ1TuSaC.webp","small",false,{"title":112,"description":113,"slug":114,"created_at":115,"publish_at":115,"formatted_created_at":102,"category":116,"links":117,"view_type":109,"video_url":85,"views":22,"likes":89,"lang":88,"comments_count":89,"is_pinned":110},"Mozilla Nails It: Thunderbolt Brings “ChatGPT at Home” to the Enterprise — Without Vendor Lock-In","While OpenAI and Anthropic race to sell their proprietary AI platforms to big corporations, Mozilla’s subsidiary MZLA Technologies has taken a very different route.","mozilla-nails-it-thunderbolt-brings-chatgpt-at-home-to-the-enterprise-without-vendor-lock-in","2026-04-19T15:37:27.000000Z",{"title":58,"slug":63},{"image":118,"image_webp":119,"thumb":120,"thumb_webp":121},"https://cdn.quasa.io/images/news/qaAODXSpJy6qpJc0eO9DQ2Y6ccJR1tlL5i3mN0kV.jpg","https://cdn.quasa.io/images/news/qaAODXSpJy6qpJc0eO9DQ2Y6ccJR1tlL5i3mN0kV.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/qaAODXSpJy6qpJc0eO9DQ2Y6ccJR1tlL5i3mN0kV.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/qaAODXSpJy6qpJc0eO9DQ2Y6ccJR1tlL5i3mN0kV.webp",{"title":123,"description":124,"slug":125,"created_at":126,"publish_at":126,"formatted_created_at":102,"category":127,"links":128,"view_type":109,"video_url":85,"views":133,"likes":89,"lang":88,"comments_count":89,"is_pinned":110},"X Is Finally Cracking Down on Unlabeled Ads — And It’s Personal","For years, X (formerly Twitter) has been a playground for undisclosed promotions, coordinated spam networks, and “native” advertising that masquerades as organic content.","x-is-finally-cracking-down-on-unlabeled-ads-and-it-s-personal","2026-04-19T15:07:48.000000Z",{"title":65,"slug":66},{"image":129,"image_webp":130,"thumb":131,"thumb_webp":132},"https://cdn.quasa.io/images/news/CQJ1gdssFGyJpfhfmRU2X4WT5fk5Boc8APXsjWX6.jpg","https://cdn.quasa.io/images/news/CQJ1gdssFGyJpfhfmRU2X4WT5fk5Boc8APXsjWX6.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/CQJ1gdssFGyJpfhfmRU2X4WT5fk5Boc8APXsjWX6.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/CQJ1gdssFGyJpfhfmRU2X4WT5fk5Boc8APXsjWX6.webp",36,{"title":135,"description":136,"slug":137,"created_at":138,"publish_at":139,"formatted_created_at":102,"category":140,"links":141,"view_type":109,"video_url":85,"views":146,"likes":89,"lang":88,"comments_count":89,"is_pinned":110},"Bitcoin Developers Propose BIP-361: Quantum-Proof Migration That Would Freeze Millions of Legacy Coins","In a move that could reshape the security of Bitcoin’s unspent transaction outputs forever, Bitcoin developers have introduced BIP-361 — officially titled “Post Quantum Migration and Legacy Signature Sunset.”","bitcoin-developers-propose-bip-361-quantum-proof-migration-that-would-freeze-millions-of-legacy-coins","2026-04-17T11:38:06.000000Z","2026-04-19T11:29:00.000000Z",{"title":43,"slug":44},{"image":142,"image_webp":143,"thumb":144,"thumb_webp":145},"https://cdn.quasa.io/images/news/XW07GuAbFLRaVskP2iUsv0witLmM4GwiSlwMPZpp.jpg","https://cdn.quasa.io/images/news/XW07GuAbFLRaVskP2iUsv0witLmM4GwiSlwMPZpp.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/XW07GuAbFLRaVskP2iUsv0witLmM4GwiSlwMPZpp.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/XW07GuAbFLRaVskP2iUsv0witLmM4GwiSlwMPZpp.webp",57,{"title":148,"description":149,"slug":150,"created_at":151,"publish_at":152,"formatted_created_at":102,"category":153,"links":154,"view_type":109,"video_url":85,"views":159,"likes":89,"lang":88,"comments_count":89,"is_pinned":110},"Thomas Peterffy’s Bold Vision for Prediction Markets: Why Interactive Brokers Is Betting Big on “Useful” Bets","In a wide-ranging conversation on Bloomberg’s Odd Lots podcast, Thomas Peterffy — founder, chairman, and CEO of Interactive Brokers (IBKR) — sat down to discuss one of the most intriguing projects in his company’s 50-year history: IBKR ForecastTrader, the brokerage giant’s freshly launched prediction market platform.","thomas-peterffy-s-bold-vision-for-prediction-markets-why-interactive-brokers-is-betting-big-on-useful-bets","2026-04-16T18:39:15.000000Z","2026-04-19T09:31:00.000000Z",{"title":65,"slug":66},{"image":155,"image_webp":156,"thumb":157,"thumb_webp":158},"https://cdn.quasa.io/images/news/48nr7BL364AeGyF1lbFbh13tx14RNr0P2uUnbVe0.jpg","https://cdn.quasa.io/images/news/48nr7BL364AeGyF1lbFbh13tx14RNr0P2uUnbVe0.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/48nr7BL364AeGyF1lbFbh13tx14RNr0P2uUnbVe0.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/48nr7BL364AeGyF1lbFbh13tx14RNr0P2uUnbVe0.webp",68,[161,174,189,201,215],{"title":162,"description":163,"slug":164,"created_at":165,"publish_at":166,"formatted_created_at":167,"category":168,"links":169,"view_type":109,"video_url":85,"views":172,"likes":173,"lang":88,"comments_count":89,"is_pinned":110},"The Anatomy of an Entrepreneur","Entrepreneur is a French word that means an enterpriser. Enterprisers are people who undertake a business or enterprise with the chance of earning profits or suffering from loss.","the-anatomy-of-an-entrepreneur","2021-08-04T15:18:21.000000Z","2025-12-14T06:09:00.000000Z","14.12.2025",{"title":65,"slug":66},{"image":170,"image_webp":85,"thumb":171,"thumb_webp":171},"https://cdn.quasa.io/images/news/mVsXPTMuHZuI7UXCsENgL1Qwp1uSOf7Rz3uVPMfm.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/mVsXPTMuHZuI7UXCsENgL1Qwp1uSOf7Rz3uVPMfm.webp",70833,2,{"title":175,"description":176,"slug":177,"created_at":178,"publish_at":179,"formatted_created_at":180,"category":181,"links":182,"view_type":84,"video_url":85,"views":187,"likes":188,"lang":88,"comments_count":89,"is_pinned":110},"Advertising on QUASA","QUASA MEDIA is read by more than 400 thousand people a month. We offer to place your article, add a link or order the writing of an article for publication.","advertising-on-quasa","2022-07-06T07:33:02.000000Z","2025-12-15T17:33:02.000000Z","15.12.2025",{"title":58,"slug":63},{"image":183,"image_webp":184,"thumb":185,"thumb_webp":186},"https://cdn.quasa.io/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.jpg","https://cdn.quasa.io/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.webp",70597,4,{"title":190,"description":191,"slug":192,"created_at":193,"publish_at":194,"formatted_created_at":195,"category":196,"links":197,"view_type":109,"video_url":85,"views":200,"likes":188,"lang":88,"comments_count":89,"is_pinned":110},"What is a Startup?","A startup is not a new company, not a tech company, nor a new tech company. You can be a new tech company, if your goal is not to grow high and fast; then, you are not a startup. ","what-is-a-startup","2021-08-04T12:05:17.000000Z","2025-12-17T13:02:00.000000Z","17.12.2025",{"title":65,"slug":66},{"image":198,"image_webp":85,"thumb":199,"thumb_webp":199},"https://cdn.quasa.io/images/news/EOsQhSW3VXyG7a6NPdE1oZd00xfJXe3bjY5aJGb7.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/EOsQhSW3VXyG7a6NPdE1oZd00xfJXe3bjY5aJGb7.webp",68230,{"title":202,"description":203,"slug":204,"created_at":205,"publish_at":206,"formatted_created_at":207,"category":208,"links":209,"view_type":109,"video_url":85,"views":214,"likes":173,"lang":88,"comments_count":87,"is_pinned":110},"Top 5 Tips to Make More Money as a Content Creator","Content creators are one of the most desired job titles right now. Who wouldn’t want to earn a living online?","top-5-tips-to-make-more-money-as-a-content-creator","2022-01-17T17:31:51.000000Z","2026-01-17T11:30:00.000000Z","17.01.2026",{"title":19,"slug":20},{"image":210,"image_webp":211,"thumb":212,"thumb_webp":213},"https://cdn.quasa.io/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.jpg","https://cdn.quasa.io/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.webp",42207,{"title":216,"description":217,"slug":218,"created_at":219,"publish_at":220,"formatted_created_at":221,"category":222,"links":223,"view_type":84,"video_url":85,"views":228,"likes":173,"lang":88,"comments_count":89,"is_pinned":110},"8 Logo Design Tips for Small Businesses","Your logo tells the story of your business and the values you stand for.","8-logo-design-tips-for-small-businesses","2021-12-04T21:59:52.000000Z","2025-05-05T03:30:00.000000Z","05.05.2025",{"title":15,"slug":16},{"image":224,"image_webp":225,"thumb":226,"thumb_webp":227},"https://cdn.quasa.io/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.jpg","https://cdn.quasa.io/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.webp",41302,[230,231,232,233,234,235,236,237,238,239,240,241,242],{"title":23,"slug":24},{"title":47,"slug":48},{"title":55,"slug":56},{"title":43,"slug":44},{"title":51,"slug":52},{"title":31,"slug":32},{"title":35,"slug":36},{"title":27,"slug":28},{"title":19,"slug":20},{"title":15,"slug":16},{"title":58,"slug":63},{"title":11,"slug":12},{"title":65,"slug":66}]