From 9070690a7af0ce8efe491c6c04d96d909d2c0d50 Mon Sep 17 00:00:00 2001 From: bender Date: Sat, 25 Apr 2026 08:40:09 +0000 Subject: [PATCH] Update src/app/page.tsx --- src/app/page.tsx | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/src/app/page.tsx b/src/app/page.tsx index c0de9a5..ecce7b0 100644 --- a/src/app/page.tsx +++ b/src/app/page.tsx @@ -52,7 +52,7 @@ export default function LandingPage() { ]} slides={[ { imageSrc: "http://img.b2bpic.net/free-photo/cybersecurity-data-protection-concept_23-2152004046.jpg", imageAlt: "Data Protection" }, - { imageSrc: "http://img.b2bpic.net/free-photo/cyber-security-concept-digital-art_23-2151637784.jpg", imageAlt: "Secure Shield" }, + { imageSrc: "http://img.b2bpic.net/free-photo/cyber-security-concept-digital-art_23-2151637784.jpg?_wi=1", imageAlt: "Secure Shield" }, { imageSrc: "http://img.b2bpic.net/free-photo/programmer-walking-data-center-coding-laptop_482257-124794.jpg", imageAlt: "Server Security" }, ]} /> @@ -89,7 +89,7 @@ export default function LandingPage() { { title: "Zero Trust Architecture", description: "Strict verification and continuous monitoring.", imageSrc: "http://img.b2bpic.net/free-photo/gradient-technology-background_23-2151895855.jpg" }, { title: "Real-time Threat Analytics", description: "Identify and neutralize threats before they scale.", imageSrc: "http://img.b2bpic.net/free-vector/technology-logo-template_23-2150529433.jpg" }, { title: "Threat Intelligence Feeds", description: "Stay ahead of global malicious actors.", imageSrc: "http://img.b2bpic.net/free-photo/technician-using-laptop-data-center-managing-servers_482257-124813.jpg" }, - { title: "Cloud Security Compliance", description: "Multi-cloud environment protection and governance.", imageSrc: "http://img.b2bpic.net/free-photo/cyber-security-concept-digital-art_23-2151637784.jpg" }, + { title: "Cloud Security Compliance", description: "Multi-cloud environment protection and governance.", imageSrc: "http://img.b2bpic.net/free-photo/cyber-security-concept-digital-art_23-2151637784.jpg?_wi=2" }, { title: "Vulnerability Management", description: "Proactive scanning for infrastructure weaknesses.", imageSrc: "http://img.b2bpic.net/free-photo/3d-rendering-futuristic-sci-fi-techno-lights-cool-background_181624-21208.jpg" }, { title: "Network Defense Systems", description: "Hardening your perimeter against modern attacks.", imageSrc: "http://img.b2bpic.net/free-photo/commander-communicating-with-allied-forces-transmitting-data_482257-90016.jpg" } ]} -- 2.49.1