Array
(
    [1536x1536] => Array
        (
            [width] => 1536
            [height] => 1536
            [crop] => 
        )

    [2048x2048] => Array
        (
            [width] => 2048
            [height] => 2048
            [crop] => 
        )

    [rta_thumb_no_cropped_420x] => Array
        (
            [width] => 420
            [height] => 0
            [crop] => 
        )

    [et-pb-gallery-module-image-portrait] => Array
        (
            [width] => 400
            [height] => 300
            [crop] => 1
        )

    [et-pb-post-main-image-fullwidth-large] => Array
        (
            [width] => 0
            [height] => 0
            [crop] => 1
        )

    [et-pb-image--responsive--desktop] => Array
        (
            [width] => 1280
            [height] => 720
            [crop] => 1
        )

    [et-pb-image--responsive--tablet] => Array
        (
            [width] => 980
            [height] => 551
            [crop] => 1
        )

    [et-pb-image--responsive--phone] => Array
        (
            [width] => 480
            [height] => 270
            [crop] => 1
        )

)

Shine a light on the Dark Web [Download Guide]

Shine a light on the Dark Web [Download Guide]

Overview: Dark web monitoring is emerging as a crucial element to a solid, advanced cybersecurity strategy. Unfortunately, many organizations are not aware of the dark web and its dangers. Others don’t take it seriously, thinking it can’t possibly be a threat to their...
Discover More
Staff Cybersecurity Training [Download Complete Guide]

Staff Cybersecurity Training [Download Complete Guide]

Overview: when developing cybersecurity programs, many businesses focus on protecting their infrastructure perimeter and device endpoints. But it’s also important to consider what happens when a threat bypasses perimeter defenses and targets an employee in the form of...
Discover More
Always On Defense [Whitepaper]

Always On Defense [Whitepaper]

Overview: Cyber criminals seek the easiest path to a pay day, often targeting small and medium-sized organizations with high value assets—but with limited security defenses. It’s critical to continuously monitor your endpoints for detection of suspicious activity and...
Discover More