{"id":"cc57c4fa-aee7-4a72-bb06-649483e9d706","timestamp":1776777173388,"matcher":{"static":{"/__nuxt_content/experts/sql_dump.txt":{"prerender":true},"/__nuxt_content/blog/sql_dump.txt":{"prerender":true},"/__nuxt_content/cases/sql_dump.txt":{"prerender":true},"/__nuxt_content/docs/sql_dump.txt":{"prerender":true}},"wildcard":{},"dynamic":{}},"prerendered":["/","/cases","/services","/cases/bitcoin","/experts","/docs/cookies-policy","/cases/octobank","/cases/mayak","/docs/terms-of-service","/cases/verse-works","/services/legal-compliance","/services/it-strategy","/services/web3-blockchain","/services/branding","/services/strategy","/services/cybersecurity","/services/virtualit","/docs/privacy-notice","/blog","/blog/ai-prevent-troubles-tornado-cash","/blog/common-cyber-threats","/blog/branding-failures","/blog/basics-of-brand-strategy","/blog/building-trust-compliance-ethics","/blog/aml-with-ai-power","/blog/compliance-automation-it-startups","/blog/compliance-automation-smart-contracts","/blog/compliance-officer-duties","/blog/crypto-salary-solutions-overview","/blog/data-protection-global-overview","/blog/effective-goal-setting-frameworks","/blog/effective-user-stories-agile-development","/blog/el-salvador-crypto-licensing","/blog/encryption-access-controls-data-security","/blog/how-pmos-can-help-meet-project-deadlines","/blog/ethics-of-compliance-navigating-gray-areas","/blog/handling-conflicts-of-interest-in-vendor-selection","/blog/how-to-set-up-liquidity-on-a-crypto-exch","/blog/how-to-conduct-competitive-analysis","/blog/introduction-to-compliance","/blog/introduction-to-cybersecurity","/blog/introduction-to-soc-2-compliance","/blog/key-cybersecurity-trends-eu-asia-2024","/blog/our-depin-journey-with-twilight","/blog/kickstarting-your-bpm-journey","/blog/pci-dss-open-source","/blog/synthetic-identities-fake-ids-kyc","/blog/strategy-for-finding-and-eliminating-bottlenecks","/blog/starting-with-why-product-vision","/blog/synthetic-identities-fake-ids-kyc-part1","/blog/understanding-cryptocurrency-mixers","/blog/synthetic-identities-fake-ids-kyc-part2","/blog/unlocking-ai-potential-it-startups-2024","/blog/tax-compliance-crypto-eu","/blog/understanding-product-life-cycle-stages"]}