div.et_pb_section.et_pb_section_3{background-image:url(https://thesisstrategy.com/wp-content/uploads/2025/11/cyber-security-17.png),radial-gradient(circle at top right,#00bfa6 0%,#00bfa6 100%)!important}.et_pb_section_3{overflow-x:visible;overflow-y:visible;z-index:10;position:relative}body #page-container .et_pb_section .et_pb_button_2{color:#00BFA6!important;border-color:#FFFFFF;background-color:#FFFFFF}body #page-container .et_pb_section .et_pb_button_2:hover{color:#FFFFFF!important;border-color:#2A3B5F!important;background-image:initial;background-color:#2A3B5F}.et_pb_button_2{transition:color 300ms ease 0ms,background-color 300ms ease 0ms,border 300ms ease 0ms}.et_pb_button_2,.et_pb_button_2:after{transition:all 300ms ease 0ms}@media only screen and (max-width:980px){body #page-container .et_pb_section .et_pb_button_2:after{display:inline-block;opacity:0}body #page-container .et_pb_section .et_pb_button_2:hover:after{opacity:1}}@media only screen and (max-width:767px){body #page-container .et_pb_section .et_pb_button_2:after{display:inline-block;opacity:0}body #page-container .et_pb_section .et_pb_button_2:hover:after{opacity:1}}