.et-db #et-boc .et-l.et-l--header .et_builder_inner_content{z-index:auto}.et_pb_section_0_tb_body{border-top-left-radius:10px;border-top-right-radius:10px;border-bottom-left-radius:10px;border-bottom-right-radius:10px;border-width:0px;border-color:#333;border-style:solid;overflow:hidden}.et-l--footer>.et_builder_inner_content .et_pb_section.et_pb_section_0_tb_footer{background-color:#374151!important}.et_pb_post_slider_0.et_pb_slider,.et_pb_post_slider_0.et_pb_slider.et_pb_bg_layout_dark{background-color:var(--gcid-primary-color)}.et_pb_post_slider_0 .et_pb_slide .et_pb_slide_description{text-align:center}.et_pb_post_content_0_tb_body{font-family:var(--et_global_body_font);font-weight:300;font-size:18px;line-height:1.8em;margin-top:0px;padding-top:0px}.et_pb_post_content_0_tb_body h2{font-family:var(--et_global_heading_font);font-weight:500;line-height:2em}.et_pb_section_1.et_pb_section{padding-top:11px}.et_pb_row_1_tb_body.et_pb_row{margin-top:-40px!important}.et_pb_row_1_tb_body{flex-wrap:nowrap}.et_pb_text_9,.et_pb_text_10{text-align:start}@media only screen and (max-width:980px){.et_pb_post_slide-5963{background-image:url(https://oktalink.fr/wp-content/uploads/2026/05/10-bonnes-pratiques-cybersecurite-oktalink-scaled.jpg)!important;background-color:var(--gcid-primary-color)!important}.et_pb_post_slide-5960{background-image:url(https://oktalink.fr/wp-content/uploads/2026/05/cybersecurite-entreprise-oktalink-scaled.jpg)!important;background-color:var(--gcid-primary-color)!important}.et_pb_post_slide-5956{background-image:url(https://oktalink.fr/wp-content/uploads/2026/05/cyberattaque-ankama.webp)!important;background-color:var(--gcid-primary-color)!important}.et_pb_post_slide-5952{background-image:url(https://oktalink.fr/wp-content/uploads/2026/04/FFBB-cyberattaque.jpg)!important;background-color:var(--gcid-primary-color)!important}.et_pb_post_slide-5948{background-image:url(https://oktalink.fr/wp-content/uploads/2026/04/ants-cyberattaque.webp)!important;background-color:var(--gcid-primary-color)!important}.et_pb_post_slide-5935{background-image:url(https://oktalink.fr/wp-content/uploads/2026/04/Phishing.jpg)!important;background-color:var(--gcid-primary-color)!important}.et_pb_post_slide-5898{background-image:url(https://oktalink.fr/wp-content/uploads/2026/04/cerballiance-victime-dun-nouveau-piratage-scaled.jpg)!important;background-color:var(--gcid-primary-color)!important}.et_pb_post_slide-5891{background-image:url(https://oktalink.fr/wp-content/uploads/2026/04/basic-fit-fuite-de-donnees-scaled.jpeg)!important;background-color:var(--gcid-primary-color)!important}.et_pb_post_slide-5875{background-image:url(https://oktalink.fr/wp-content/uploads/2026/04/changer-son-adresse-gmail.jpg)!important;background-color:var(--gcid-primary-color)!important}.et_pb_post_slide-5872{background-image:url(https://oktalink.fr/wp-content/uploads/2026/04/evolution-prix-ddr5-2026.webp)!important;background-color:var(--gcid-primary-color)!important}.et_pb_post_content_0_tb_body h2{line-height:1.8em}}@media only screen and (max-width:767px){.et_pb_post_slide-5963{background-image:url(https://oktalink.fr/wp-content/uploads/2026/05/10-bonnes-pratiques-cybersecurite-oktalink-scaled.jpg)!important;background-color:var(--gcid-primary-color)!important}.et_pb_post_slide-5960{background-image:url(https://oktalink.fr/wp-content/uploads/2026/05/cybersecurite-entreprise-oktalink-scaled.jpg)!important;background-color:var(--gcid-primary-color)!important}.et_pb_post_slide-5956{background-image:url(https://oktalink.fr/wp-content/uploads/2026/05/cyberattaque-ankama.webp)!important;background-color:var(--gcid-primary-color)!important}.et_pb_post_slide-5952{background-image:url(https://oktalink.fr/wp-content/uploads/2026/04/FFBB-cyberattaque.jpg)!important;background-color:var(--gcid-primary-color)!important}.et_pb_post_slide-5948{background-image:url(https://oktalink.fr/wp-content/uploads/2026/04/ants-cyberattaque.webp)!important;background-color:var(--gcid-primary-color)!important}.et_pb_post_slide-5935{background-image:url(https://oktalink.fr/wp-content/uploads/2026/04/Phishing.jpg)!important;background-color:var(--gcid-primary-color)!important}.et_pb_post_slide-5898{background-image:url(https://oktalink.fr/wp-content/uploads/2026/04/cerballiance-victime-dun-nouveau-piratage-scaled.jpg)!important;background-color:var(--gcid-primary-color)!important}.et_pb_post_slide-5891{background-image:url(https://oktalink.fr/wp-content/uploads/2026/04/basic-fit-fuite-de-donnees-scaled.jpeg)!important;background-color:var(--gcid-primary-color)!important}.et_pb_post_slide-5875{background-image:url(https://oktalink.fr/wp-content/uploads/2026/04/changer-son-adresse-gmail.jpg)!important;background-color:var(--gcid-primary-color)!important}.et_pb_post_slide-5872{background-image:url(https://oktalink.fr/wp-content/uploads/2026/04/evolution-prix-ddr5-2026.webp)!important;background-color:var(--gcid-primary-color)!important}.et_pb_post_content_0_tb_body h2{line-height:1.4em}}.et_pb_section_0_tb_body{border-top-left-radius:10px;border-top-right-radius:10px;border-bottom-left-radius:10px;border-bottom-right-radius:10px;border-width:0px;border-color:#333;border-style:solid;overflow:hidden}.et-l--footer>.et_builder_inner_content .et_pb_section.et_pb_section_0_tb_footer{background-color:#374151!important}.et_pb_post_slider_0.et_pb_slider,.et_pb_post_slider_0.et_pb_slider.et_pb_bg_layout_dark{background-color:var(--gcid-primary-color)}.et_pb_post_slider_0 .et_pb_slide .et_pb_slide_description{text-align:center}.et_pb_post_content_0_tb_body{font-family:var(--et_global_body_font);font-weight:300;font-size:18px;line-height:1.8em;margin-top:0px;padding-top:0px}.et_pb_post_content_0_tb_body h2{font-family:var(--et_global_heading_font);font-weight:500;line-height:2em}.et_pb_section_1.et_pb_section{padding-top:11px}.et_pb_row_1_tb_body.et_pb_row{margin-top:-40px!important}.et_pb_row_1_tb_body{flex-wrap:nowrap}.et_pb_text_9,.et_pb_text_10{text-align:start}@media only screen and (max-width:980px){.et_pb_post_slide-5963{background-image:url(https://oktalink.fr/wp-content/uploads/2026/05/10-bonnes-pratiques-cybersecurite-oktalink-scaled.jpg)!important;background-color:var(--gcid-primary-color)!important}.et_pb_post_slide-5960{background-image:url(https://oktalink.fr/wp-content/uploads/2026/05/cybersecurite-entreprise-oktalink-scaled.jpg)!important;background-color:var(--gcid-primary-color)!important}.et_pb_post_slide-5956{background-image:url(https://oktalink.fr/wp-content/uploads/2026/05/cyberattaque-ankama.webp)!important;background-color:var(--gcid-primary-color)!important}.et_pb_post_slide-5952{background-image:url(https://oktalink.fr/wp-content/uploads/2026/04/FFBB-cyberattaque.jpg)!important;background-color:var(--gcid-primary-color)!important}.et_pb_post_slide-5948{background-image:url(https://oktalink.fr/wp-content/uploads/2026/04/ants-cyberattaque.webp)!important;background-color:var(--gcid-primary-color)!important}.et_pb_post_slide-5935{background-image:url(https://oktalink.fr/wp-content/uploads/2026/04/Phishing.jpg)!important;background-color:var(--gcid-primary-color)!important}.et_pb_post_slide-5898{background-image:url(https://oktalink.fr/wp-content/uploads/2026/04/cerballiance-victime-dun-nouveau-piratage-scaled.jpg)!important;background-color:var(--gcid-primary-color)!important}.et_pb_post_slide-5891{background-image:url(https://oktalink.fr/wp-content/uploads/2026/04/basic-fit-fuite-de-donnees-scaled.jpeg)!important;background-color:var(--gcid-primary-color)!important}.et_pb_post_slide-5875{background-image:url(https://oktalink.fr/wp-content/uploads/2026/04/changer-son-adresse-gmail.jpg)!important;background-color:var(--gcid-primary-color)!important}.et_pb_post_slide-5872{background-image:url(https://oktalink.fr/wp-content/uploads/2026/04/evolution-prix-ddr5-2026.webp)!important;background-color:var(--gcid-primary-color)!important}.et_pb_post_content_0_tb_body h2{line-height:1.8em}}@media only screen and (max-width:767px){.et_pb_post_slide-5963{background-image:url(https://oktalink.fr/wp-content/uploads/2026/05/10-bonnes-pratiques-cybersecurite-oktalink-scaled.jpg)!important;background-color:var(--gcid-primary-color)!important}.et_pb_post_slide-5960{background-image:url(https://oktalink.fr/wp-content/uploads/2026/05/cybersecurite-entreprise-oktalink-scaled.jpg)!important;background-color:var(--gcid-primary-color)!important}.et_pb_post_slide-5956{background-image:url(https://oktalink.fr/wp-content/uploads/2026/05/cyberattaque-ankama.webp)!important;background-color:var(--gcid-primary-color)!important}.et_pb_post_slide-5952{background-image:url(https://oktalink.fr/wp-content/uploads/2026/04/FFBB-cyberattaque.jpg)!important;background-color:var(--gcid-primary-color)!important}.et_pb_post_slide-5948{background-image:url(https://oktalink.fr/wp-content/uploads/2026/04/ants-cyberattaque.webp)!important;background-color:var(--gcid-primary-color)!important}.et_pb_post_slide-5935{background-image:url(https://oktalink.fr/wp-content/uploads/2026/04/Phishing.jpg)!important;background-color:var(--gcid-primary-color)!important}.et_pb_post_slide-5898{background-image:url(https://oktalink.fr/wp-content/uploads/2026/04/cerballiance-victime-dun-nouveau-piratage-scaled.jpg)!important;background-color:var(--gcid-primary-color)!important}.et_pb_post_slide-5891{background-image:url(https://oktalink.fr/wp-content/uploads/2026/04/basic-fit-fuite-de-donnees-scaled.jpeg)!important;background-color:var(--gcid-primary-color)!important}.et_pb_post_slide-5875{background-image:url(https://oktalink.fr/wp-content/uploads/2026/04/changer-son-adresse-gmail.jpg)!important;background-color:var(--gcid-primary-color)!important}.et_pb_post_slide-5872{background-image:url(https://oktalink.fr/wp-content/uploads/2026/04/evolution-prix-ddr5-2026.webp)!important;background-color:var(--gcid-primary-color)!important}.et_pb_post_content_0_tb_body h2{line-height:1.4em}}.et-db #et-boc .et-l.et-l--footer .et_builder_inner_content{z-index:auto}