{"id":4020,"date":"2026-05-15T03:33:31","date_gmt":"2026-05-15T08:33:31","guid":{"rendered":"https:\/\/cmitsolutions.com\/charleston-sc-1165\/?p=4020"},"modified":"2026-05-11T03:43:44","modified_gmt":"2026-05-11T08:43:44","slug":"why-understanding-context-matters-more-than-speed-in-cve-response","status":"publish","type":"post","link":"https:\/\/cmitsolutions.com\/charleston-sc-1165\/blog\/why-understanding-context-matters-more-than-speed-in-cve-response\/","title":{"rendered":"Why Understanding Context Matters More Than Speed in CVE Response"},"content":{"rendered":"<p><span style=\"font-weight: 400\">Cybersecurity threats are evolving rapidly.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">New vulnerabilities are discovered every day.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">Security teams are under constant pressure to respond quickly.<\/span><\/p>\n<p><span style=\"font-weight: 400\">For many businesses in Charleston, vulnerability management has become a race against time, especially with rising<\/span><a href=\"https:\/\/cmitsolutions.com\/charleston-sc-1165\/blog\/top-cybersecurity-trends-every-charleston-business-should-know\/\"> <b>cybersecurity trends<\/b><\/a><span style=\"font-weight: 400\">.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Patch fast.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">Fix immediately.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">Respond as quickly as possible.<\/span><\/p>\n<p><span style=\"font-weight: 400\">But speed alone is not enough.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Sometimes the mindset is:<\/span><\/p>\n<p><i><span style=\"font-weight: 400\">&#8220;Apply every patch as soon as it\u2019s released.&#8221;<\/span><\/i><\/p>\n<p><span style=\"font-weight: 400\">That approach seems safe\u00a0 \u00a0until it creates new problems.<\/span><\/p>\n<p><span style=\"font-weight: 400\">In reality, responding to Common Vulnerabilities and Exposures (CVEs) without understanding context can lead to unnecessary risks, wasted resources, and operational disruptions.<\/span><\/p>\n<p>For businesses across Charleston SC, the difference between effective security and reactive chaos often comes down to one thing: context.<\/p>\n<h2><b>What Is a CVE and Why It Matters<\/b><\/h2>\n<p><span style=\"font-weight: 400\">A CVE (Common Vulnerabilities and Exposures) is a publicly disclosed security flaw in software or hardware.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Each CVE represents a potential risk that attackers can exploit.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Organizations rely on CVE databases to:<\/span><\/p>\n<p><span style=\"font-weight: 400\">Identify vulnerabilities<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">Assess risk levels<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">Apply patches and updates<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">Strengthen security posture<\/span><\/p>\n<p><span style=\"font-weight: 400\">With thousands of CVEs disclosed each year, businesses must decide which ones to address \u2014 and how quickly, especially in the face of<\/span><a href=\"https:\/\/cmitsolutions.com\/charleston-sc-1165\/blog\/ai-driven-threats-are-rising-how-smbs-can-defend-themselves\/\"> <b>AI-driven threats<\/b><\/a><span style=\"font-weight: 400\">.<\/span><\/p>\n<h2><b>The Problem with a \u201cSpeed-First\u201d Approach<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Many organizations prioritize speed above everything else.<\/span><\/p>\n<p><span style=\"font-weight: 400\">The goal is simple: patch vulnerabilities as quickly as possible.<\/span><\/p>\n<p><span style=\"font-weight: 400\">While this sounds effective, it often creates new challenges.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Not all vulnerabilities pose the same level of risk.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">Not all systems are equally exposed.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">Not all patches are risk-free.<\/span><\/p>\n<p><span style=\"font-weight: 400\">When businesses rush to respond without context, they may:<\/span><\/p>\n<p><span style=\"font-weight: 400\">Apply unnecessary patches<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">Disrupt critical systems<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">Introduce compatibility issues<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">Waste time on low-risk vulnerabilities<\/span><\/p>\n<p><span style=\"font-weight: 400\">In fast-paced environments like Charleston\u2019s growing business ecosystem, these disruptions can impact operations and productivity, especially without proper<\/span><a href=\"https:\/\/cmitsolutions.com\/charleston-sc-1165\/blog\/preventing-costly-downtime-strategies-for-business-continuity\/\"> <b>business continuity planning<\/b><\/a><span style=\"font-weight: 400\">.<\/span><\/p>\n<h2><b>Why Context Matters in CVE Response<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Context helps organizations understand the real impact of a vulnerability.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Instead of asking:<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><i><span style=\"font-weight: 400\">&#8220;How fast can we patch this?&#8221;<\/span><\/i><\/p>\n<p><span style=\"font-weight: 400\">Businesses should ask:<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><i><span style=\"font-weight: 400\">&#8220;How relevant is this vulnerability to our environment?&#8221;<\/span><\/i><\/p>\n<p><span style=\"font-weight: 400\">Context includes factors such as:<\/span><\/p>\n<p><span style=\"font-weight: 400\">Whether the affected system is in use<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">If the system is exposed to external networks<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">The sensitivity of the data involved<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">The likelihood of exploitation<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">The potential business impact<\/span><\/p>\n<p><span style=\"font-weight: 400\">By evaluating these factors, organizations can prioritize vulnerabilities more effectively.<\/span><\/p>\n<h2><b>Real-World Example of Context in Action<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Consider two vulnerabilities:<\/span><\/p>\n<p><span style=\"font-weight: 400\">One affects a publicly exposed web application handling customer data.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">The other affects an internal system with limited access.<\/span><\/p>\n<p><span style=\"font-weight: 400\">A speed-first approach may treat both as equally urgent.<\/span><\/p>\n<p><span style=\"font-weight: 400\">A context-driven approach recognizes that the first vulnerability poses a higher risk and should be addressed immediately.<\/span><\/p>\n<p><span style=\"font-weight: 400\">This allows businesses to allocate resources where they matter most.<\/span><\/p>\n<h2><b>The Risks of Ignoring Context<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Failing to consider context can lead to serious consequences.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Unnecessary Downtime<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">Applying patches without testing can disrupt systems and halt operations.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Resource Misallocation<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">Teams spend time fixing low-risk issues while critical vulnerabilities remain unaddressed.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Security Gaps<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">Focusing on speed can cause organizations to overlook more dangerous threats.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Operational Disruption<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">Frequent, unplanned updates can impact productivity and user experience.<\/span><\/p>\n<p><span style=\"font-weight: 400\">For Charleston businesses, these risks can affect both efficiency and customer trust, especially when facing<\/span><a href=\"https:\/\/cmitsolutions.com\/charleston-sc-1165\/blog\/ransomware-3-0-the-new-era-of-smarter-faster-attacks\/\"> <b>ransomware attacks<\/b><\/a><span style=\"font-weight: 400\">.<\/span><\/p>\n<h2><b>How Context Improves Vulnerability Management<\/b><\/h2>\n<p><span style=\"font-weight: 400\">A context-driven approach allows organizations to move from reactive to strategic security.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Instead of treating all CVEs equally, businesses can:<\/span><\/p>\n<p><span style=\"font-weight: 400\">Prioritize high-risk vulnerabilities<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">Align security efforts with business impact<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">Reduce unnecessary disruptions<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">Improve overall security posture<\/span><\/p>\n<p><span style=\"font-weight: 400\">This approach ensures that resources are used effectively and risks are managed intelligently, supported by<\/span><a href=\"https:\/\/cmitsolutions.com\/charleston-sc-1165\/blog\/managed-detection-and-response-mdr-the-future-of-threat-prevention\/\"> <b>MDR security<\/b><\/a><span style=\"font-weight: 400\">.<\/span><\/p>\n<p><img decoding=\"async\" class=\"aligncenter  wp-image-4022\" src=\"https:\/\/cmitsolutions.com\/charleston-sc-1165\/wp-content\/uploads\/sites\/48\/2026\/05\/34-1024x535.png\" alt=\"\" width=\"808\" height=\"422\" srcset=\"https:\/\/cmitsolutions.com\/charleston-sc-1165\/wp-content\/uploads\/sites\/48\/2026\/05\/34-1024x535.png 1024w, https:\/\/cmitsolutions.com\/charleston-sc-1165\/wp-content\/uploads\/sites\/48\/2026\/05\/34-300x157.png 300w, https:\/\/cmitsolutions.com\/charleston-sc-1165\/wp-content\/uploads\/sites\/48\/2026\/05\/34-768x401.png 768w, https:\/\/cmitsolutions.com\/charleston-sc-1165\/wp-content\/uploads\/sites\/48\/2026\/05\/34.png 1200w\" sizes=\"(max-width: 808px) 100vw, 808px\" \/><\/p>\n<h2><b>Key Elements of Context-Aware CVE Response<\/b><\/h2>\n<h3><b>Asset Visibility<\/b><\/h3>\n<p><span style=\"font-weight: 400\">Understanding which systems are affected is critical.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Organizations need a clear inventory of:<\/span><\/p>\n<p><span style=\"font-weight: 400\">Applications<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">Devices<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">Users<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">Data<\/span><\/p>\n<p><span style=\"font-weight: 400\">Without visibility, it is impossible to assess risk accurately.<\/span><\/p>\n<h3><b>Risk Prioritization<\/b><\/h3>\n<p><span style=\"font-weight: 400\">Not all vulnerabilities require immediate action.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Businesses should evaluate:<\/span><\/p>\n<p><span style=\"font-weight: 400\">Severity scores<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">Exploit availability<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">System exposure<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">Business impact<\/span><\/p>\n<p><span style=\"font-weight: 400\">This helps determine which CVEs need urgent attention.<\/span><\/p>\n<h3><b>Threat Intelligence<\/b><\/h3>\n<p><span style=\"font-weight: 400\">Real-time threat intelligence provides insight into active attacks.<\/span><\/p>\n<p><span style=\"font-weight: 400\">If a vulnerability is actively being exploited, it becomes a higher priority.<\/span><\/p>\n<h3><b>Business Impact Analysis<\/b><\/h3>\n<p><span style=\"font-weight: 400\">Security decisions should align with business priorities.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Critical systems require faster response times than non-essential ones.<\/span><\/p>\n<h3><b>Testing and Validation<\/b><\/h3>\n<p><span style=\"font-weight: 400\">Before applying patches, organizations should test them in controlled environments.<\/span><\/p>\n<p><span style=\"font-weight: 400\">This reduces the risk of system failures and compatibility issues.<\/span><\/p>\n<h3><b>Balancing Speed and Context<\/b><\/h3>\n<p><span style=\"font-weight: 400\">Speed is still important in cybersecurity.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">Delays in addressing critical vulnerabilities can increase risk.<\/span><\/p>\n<p><span style=\"font-weight: 400\">However, speed must be balanced with understanding.<\/span><\/p>\n<p><span style=\"font-weight: 400\">The goal is not to patch everything immediately \u2014<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">it is to patch the right things at the right time.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Organizations that achieve this balance can respond effectively without disrupting operations.<\/span><\/p>\n<h2><b>How Charleston Businesses Can Improve CVE Response<\/b><\/h2>\n<p><span style=\"font-weight: 400\">To implement a context-driven approach, businesses should:<\/span><\/p>\n<p><span style=\"font-weight: 400\">Invest in asset management and visibility tools<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">Use risk-based vulnerability management strategies<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">Integrate threat intelligence into security workflows<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">Develop structured patch management processes<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">Partner with experienced cybersecurity providers<\/span><\/p>\n<p><span style=\"font-weight: 400\">These steps help create a more resilient and efficient security strategy, aligned with<\/span><a href=\"https:\/\/cmitsolutions.com\/charleston-sc-1165\/blog\/endpoint-security-in-a-remote-work-world-protecting-every-device\/\"> <b>endpoint security<\/b><\/a><span style=\"font-weight: 400\"> and<\/span><a href=\"https:\/\/cmitsolutions.com\/charleston-sc-1165\/blog\/simplifying-compliance-staying-ahead-of-hipaa-pci-and-gdpr-requirements\/\"> <b>data compliance<\/b><\/a><span style=\"font-weight: 400\">.<\/span><\/p>\n<p><img decoding=\"async\" class=\"aligncenter  wp-image-4023\" src=\"https:\/\/cmitsolutions.com\/charleston-sc-1165\/wp-content\/uploads\/sites\/48\/2026\/05\/35-1024x535.png\" alt=\"\" width=\"819\" height=\"428\" srcset=\"https:\/\/cmitsolutions.com\/charleston-sc-1165\/wp-content\/uploads\/sites\/48\/2026\/05\/35-1024x535.png 1024w, https:\/\/cmitsolutions.com\/charleston-sc-1165\/wp-content\/uploads\/sites\/48\/2026\/05\/35-300x157.png 300w, https:\/\/cmitsolutions.com\/charleston-sc-1165\/wp-content\/uploads\/sites\/48\/2026\/05\/35-768x401.png 768w, https:\/\/cmitsolutions.com\/charleston-sc-1165\/wp-content\/uploads\/sites\/48\/2026\/05\/35.png 1200w\" sizes=\"(max-width: 819px) 100vw, 819px\" \/><\/p>\n<h2><b>The Future of Vulnerability Management<\/b><\/h2>\n<p><span style=\"font-weight: 400\">As cyber threats continue to evolve, vulnerability management will become more complex.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Businesses will need to:<\/span><\/p>\n<p><span style=\"font-weight: 400\">Process larger volumes of CVEs<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">Respond to faster attack cycles<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">Protect increasingly distributed systems<\/span><\/p>\n<p><span style=\"font-weight: 400\">Context-aware security will play a critical role in managing these challenges.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Organizations that rely solely on speed will struggle to keep up.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Those that prioritize context will gain a stronger, more adaptable security posture, avoiding<\/span><a href=\"https:\/\/cmitsolutions.com\/charleston-sc-1165\/blog\/if-ai-is-everywhere-why-is-your-it-still-reactive\/\"> <b>reactive IT risks<\/b><\/a><span style=\"font-weight: 400\">.<\/span><\/p>\n<h2><b>Conclusion<\/b><\/h2>\n<p><span style=\"font-weight: 400\">In today\u2019s cybersecurity landscape, speed alone is not enough.<\/span><\/p>\n<p><span style=\"font-weight: 400\">While rapid response is important, understanding the context of each vulnerability is what truly determines effective protection.<\/span><\/p>\n<p><span style=\"font-weight: 400\">For businesses across Charleston SC, adopting a context-driven approach to CVE response can reduce risk, improve efficiency, and prevent unnecessary disruptions.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Organizations that prioritize context can:<\/span><\/p>\n<p><span style=\"font-weight: 400\">Focus on the most critical threats<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">Use resources more effectively<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">Maintain operational stability<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">Strengthen overall security posture<\/span><\/p>\n<p><span style=\"font-weight: 400\">Cybersecurity is not just about reacting quickly it is about responding intelligently.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Looking to strengthen your vulnerability management strategy in Charleston SC? Connect with our experts today to implement a smarter, context-driven approach to CVE response while avoiding<\/span><a href=\"https:\/\/cmitsolutions.com\/charleston-sc-1165\/blog\/what-happens-to-your-business-the-day-your-it-stops-responding\/\"> <span style=\"font-weight: 400\">IT downtime risks<\/span><\/a><span style=\"font-weight: 400\"> and improving your overall security strategy.<\/span><\/p>\n<p><a href=\"https:\/\/cmitsolutions.com\/charleston-sc-1165\/contact-us\/\"><img decoding=\"async\" class=\"aligncenter  wp-image-3629\" src=\"https:\/\/cmitsolutions.com\/charleston-sc-1165\/wp-content\/uploads\/sites\/48\/2026\/01\/call-to-action.png\" alt=\"\" width=\"802\" height=\"267\" srcset=\"https:\/\/cmitsolutions.com\/charleston-sc-1165\/wp-content\/uploads\/sites\/48\/2026\/01\/call-to-action.png 1024w, https:\/\/cmitsolutions.com\/charleston-sc-1165\/wp-content\/uploads\/sites\/48\/2026\/01\/call-to-action-300x100.png 300w, https:\/\/cmitsolutions.com\/charleston-sc-1165\/wp-content\/uploads\/sites\/48\/2026\/01\/call-to-action-768x256.png 768w\" sizes=\"(max-width: 802px) 100vw, 802px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity threats are evolving rapidly. New vulnerabilities are discovered every day. Security&#8230;<\/p>\n","protected":false},"author":316,"featured_media":4021,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[31,22,46,157,30,54,97,17,21,141,16,48,47,18,102,55,29],"class_list":["post-4020","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-local-it","tag-achievement","tag-amy-justis","tag-budgeting","tag-buisness-security","tag-business-community","tag-business-continuity","tag-business-solutions","tag-charleston","tag-charleston-regional-business-journal","tag-cmit-charleston","tag-cmit-solutions","tag-compliance","tag-customization","tag-cybersecurity","tag-data-protection","tag-it-support","tag-technological-landscape"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cmitsolutions.com\/charleston-sc-1165\/wp-json\/wp\/v2\/posts\/4020","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cmitsolutions.com\/charleston-sc-1165\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cmitsolutions.com\/charleston-sc-1165\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/charleston-sc-1165\/wp-json\/wp\/v2\/users\/316"}],"replies":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/charleston-sc-1165\/wp-json\/wp\/v2\/comments?post=4020"}],"version-history":[{"count":0,"href":"https:\/\/cmitsolutions.com\/charleston-sc-1165\/wp-json\/wp\/v2\/posts\/4020\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/charleston-sc-1165\/wp-json\/wp\/v2\/media\/4021"}],"wp:attachment":[{"href":"https:\/\/cmitsolutions.com\/charleston-sc-1165\/wp-json\/wp\/v2\/media?parent=4020"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cmitsolutions.com\/charleston-sc-1165\/wp-json\/wp\/v2\/categories?post=4020"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cmitsolutions.com\/charleston-sc-1165\/wp-json\/wp\/v2\/tags?post=4020"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}