import React, { useState, useEffect } from 'react';
import {
Menu, ShoppingBag, Shield, Activity,
Cpu, Globe, ArrowRight, ArrowLeft, Lock, ChevronRight,
Database, BarChart3, Users, CheckCircle,
Share2, Bookmark, Twitter, Linkedin, Facebook, TrendingUp, Filter,
FileText, Mail, Search
} from 'lucide-react';
// --- EXACT COLOR PALETTE ---
// Dark Background: #24212e
// Secondary Dark: #3d3262
// Muted Purple: #786c9d
// Accent Gold: #e7d397
// Light Cream: #fefcf9
// Taupe/Muted: #a29b90
const BRAND = {
bg: "bg-[#24212e]",
bgSecondary: "bg-[#3d3262]",
bgSecondaryHover: "hover:bg-[#3d3262]/80",
bgLight: "bg-[#fefcf9]",
textDark: "text-[#24212e]",
textDarkMuted: "text-[#a29b90]",
text: "text-[#fefcf9]",
textMuted: "text-[#a29b90]",
accent: "text-[#e7d397]",
accentBg: "bg-[#e7d397]",
accentBorder: "border-[#e7d397]",
border: "border-[#786c9d]/30",
borderLight: "border-[#786c9d]/10",
borderOnLight: "border-[#786c9d]/20"
};
// --- DATA SOURCE OF TRUTH (BLOG AUTOMATION CSV MOCK) ---
const EDITORIAL_ARTICLES = [
{ id: 'a1', title: "The New AI Perimeter: Reinforcing Digital Borders", category: "AI Infrastructure", excerpt: "Systems are only as secure as the assumptions behind them.", image: "https://images.unsplash.com/photo-1550751827-4bd374c3f58b?auto=format&fit=crop&q=80&w=2000" },
{ id: 'a2', title: "Urban Sensors: A Governance Playbook", category: "Smart City", excerpt: "Privacy is a luxury asset. The framework for ethical urban monitoring.", image: "https://images.unsplash.com/photo-1480714378408-67cf0d13bc1b?auto=format&fit=crop&q=80&w=2000" },
{ id: 'a3', title: "Inside the Modern Breach: Target #1", category: "Cybersecurity", excerpt: "Why mid-size companies are the primary training ground for state-sponsored AI.", image: "https://images.unsplash.com/photo-1563986768609-322da13575f3?auto=format&fit=crop&q=80&w=2000" },
{ id: 'a4', title: "The 2030 Grid Outlook", category: "Forecasts", excerpt: "Where the next $5 Trillion in infrastructure spending will flow.", image: "https://images.unsplash.com/photo-1473341304170-971dccb5ac1e?auto=format&fit=crop&q=80&w=2000" },
{ id: 'a5', title: "The Risk Map: Visualizing Blind Spots", category: "Corporate Intel", excerpt: "Identifying critical failures before the board meeting.", image: "https://images.unsplash.com/photo-1551836022-d5d88e9218df?auto=format&fit=crop&q=80&w=2000" }
];
const BRIEFINGS = [
{ id: 'b1', title: "The 2030 Smart Grid Outlook", price: "$149", subtitle: "5-Year Infrastructure Forecast", stack: "Predictive timeline • $5T capital flow map" },
{ id: 'b2', title: "Enterprise AI Risk Report: Q4 2025", price: "$149", subtitle: "The C-Suite Risk Register", stack: "LLM vulnerability analysis • Liability matrix" },
{ id: 'b3', title: "Urban Surveillance Governance Manual", price: "$97", subtitle: "Ethical Deployment Standards", stack: "Public privacy protocols • Sensor limits" },
{ id: 'b4', title: "The Zero Trust Architecture Handbook", price: "$97", subtitle: "Implementation Roadmap", stack: "Segmentation diagrams • Identity logic" },
{ id: 'b5', title: "Hybrid Work Security Briefing", price: "$79", subtitle: "Remote Endpoint Defense", stack: "Device policies • Shadow IT audit" }
];
const SYSTEMS = [
{ id: 's1', title: "AI Infrastructure Audit Kit", price: "$199", subtitle: "The 200-Point Deployment Checklist", stack: "Pre-flight validation • Vendor risk scores", Icon: Database },
{ id: 's2', title: "Cybersecurity Incident Response Deck", price: "$149", subtitle: "Crisis Action Protocols", stack: "First 48-hour timeline • Chain of command", Icon: Shield },
{ id: 's3', title: "Smart City Vendor Vetting Protocol", price: "$129", subtitle: "Procurement Safety System", stack: "RFP questions • Red flag indicators", Icon: Globe },
{ id: 's4', title: "Corporate Crisis Comm Protocols", price: "$97", subtitle: "Reputation Defense System", stack: "Breach templates • Media holding statements", Icon: Users },
{ id: 's5', title: "C-Suite Data Hygiene System", price: "$79", subtitle: "Executive Personal Protection", stack: "Family device hardening • Footprint scrub", Icon: Lock }
];
const LICENSING = [
{ id: 'l1', title: "The Enterprise Audit Core", price: "$997", subtitle: "Site License / Internal Framework", stack: "Unlimited internal use • Editable source files • Training video assets" },
{ id: 'l2', title: "Consultant’s Risk Workshop Framework", price: "$499", subtitle: "Client Advisory System", stack: "Workshop slide deck • Discovery questionnaires • Client report templates" }
];
const BUNDLES = [
{ id: 'bun1', title: "The Analyst Core", price: "$299", subtitle: "Situational Awareness", includes: ["The 2030 Smart Grid Outlook", "Enterprise AI Risk Report", "C-Suite Data Hygiene"], target: "Senior Analysts", cta: "Acquire Core Intelligence" },
{ id: 'bun2', title: "The CSO Stack", price: "$649", subtitle: "Operational Defense", includes: ["ALL System Protocols (x5)", "Zero Trust Handbook", "Incident Response Deck"], target: "Security Directors", cta: "Deploy Security Systems", highlight: false },
{ id: 'bun3', title: "Authority Suite", price: "$997", subtitle: "Flagship Access", includes: ["Everything in Sections A & B", "Consultant Workshop Framework", "1-Year Directory Verification"], target: "Enterprise Teams", cta: "Access Full Armory", highlight: true }
];
const DIRECTORY_TIERS = [
{ name: "Basic", price: "$99/mo", sub: "Approval Required", benefits: ["Directory Placement"] },
{ name: "Verified", price: "$249/mo", sub: "Approval Required", benefits: ["Directory Placement", "Case Study Uploads"] },
{ name: "Signature", price: "$499/mo", sub: "Approval Required", benefits: ["Directory Placement", "Case Study Uploads", "Homepage Rotation"] }
];
const PARTNER_TIERS = [
{ name: "Editorial Partner", price: "$5k/yr", highlight: false, benefits: ["Research Access"] },
{ name: "Strategic Partner", price: "$12k/yr", highlight: true, benefits: ["Research Access", "Editorial Credit"] },
{ name: "Presenting Partner", price: "$25k/yr", highlight: false, benefits: ["Research Access", "Editorial Credit", "Advisory Seat"] }
];
// --- GLOBAL STYLES ---
const GlobalStyles = () => (
);
// --- NAVIGATION COMPONENTS ---
const TopBanner = ({ setPage }) => (
{subtitle}
Systems are only as secure as the assumptions behind them. We reveal the blind spots in Enterprise AI and Smart Infrastructure.
Explore →
{article.excerpt}
{article.category}
A curated, audited directory of AI architecture firms, cybersecurity vendors, and smart city consultants.
Complete access to all 10 Systems, 5 Briefings, and the Consultant's Workshop Framework.
Receive weekly intelligence. Join 25,000+ CTOs securing smart infrastructure.
By K. Vance • Nov 24, 2026
A s decision-making shifts from boards to algorithms, the structure of the corporation is being rewritten. The traditional org chart is dissolving into a dynamic network of autonomous agents.
With autonomous agents executing trades, signing contracts, and hiring freelancers, the concept of "Zero Trust" has moved from cybersecurity to corporate governance. Every digital action is immutably logged.
{/* S03 — FEATURE QUOTE */}{/* S04 — MID ARTICLE PRODUCT INSERT */}"We don't manage people anymore. We manage the parameters within which the AI manages the people."
Download the 200-point AI Infrastructure Audit Checklist used by Fortune 500 CTOs.
This requires a massive overhaul of physical infrastructure. Latency is the new downtime. Edge computing nodes are now installed in the ceilings of executive suites.
{item.subtitle}
{item.price}Deep Analysis / PDF Format
Protocols / Audit Kits / Excel
{item.subtitle}
{item.stack}
Unlocked, white-label rights for internal teams or consultants.
{item.stack}
Value Stacking Intelligence
{bundle.subtitle}
Position your firm as a trusted entity. Verification requires a 48-hour audit of your business credentials. We maintain strict editorial standards for all listed vendors.
{tier.sub}
Search thousands of vetted enterprise vendors globally.
{section.body}
Strictly Limited Entry
{article.excerpt}