{"total":6,"offset":0,"limit":6,"data":[{"icon":"regional-crises","title":"Simultaneous regional crises become the norm","description":"As enforcement of established norms becomes more selective, regional and emerging powers will pursue objectives more aggressively—and external intervention in internal conflicts will expand.","link":""},{"icon":"connectivity-disruptions","title":"Connectivity disruptions as coercion","description":"Undersea cables, satellite systems, and positioning/navigation/timing infrastructure are becoming strategic targets, with even limited interference capable of cascading across critical sectors.","link":""},{"icon":"ransomware-fragments","title":"Ransomware fragments further","description":"Declining payments will push threat actors toward shorter attack cycles, lower demands, and disruption-focused tactics designed to compel engagement.","link":""},{"icon":"synthetic-identity","title":"The synthetic identity crisis deepens","description":"AI-enabled deepfakes and compromised identity verification systems will make business email compromise and social engineering more convincing and scalable.","link":""},{"icon":"ai-attack-surface","title":"AI becomes the next attack surface","description":"Prompt-based manipulation will increasingly replace code-based exploits as the preferred intrusion method against AI systems.","link":""},{"icon":"quantum-readiness","title":"Quantum readiness moves to spend","description":"Organizations will begin allocating dedicated budgets for cryptographic inventories, vendor transitions, and post-quantum migration pilots.","link":""}],"columns":["icon","title","description","link"],":type":"sheet"}