{"id":363,"date":"2015-07-22T09:07:47","date_gmt":"2015-07-22T08:07:47","guid":{"rendered":"http:\/\/mouillere.com\/universconvergents\/?p=363"},"modified":"2015-07-22T09:07:47","modified_gmt":"2015-07-22T08:07:47","slug":"securite-informatique-les-attaques-de-concurrents-se-multiplient","status":"publish","type":"post","link":"https:\/\/mouillere.com\/universconvergents\/2015\/07\/22\/securite-informatique-les-attaques-de-concurrents-se-multiplient\/","title":{"rendered":"S\u00e9curit\u00e9 informatique : les attaques de concurrents se multiplient"},"content":{"rendered":"<p>Pour plus d&#8217;un tiers des entreprises fran\u00e7aises, ce constat entra\u00eene une hausse des budgets consacr\u00e9s \u00e0 la s\u00e9curit\u00e9 informatique affirme le cabinet&#8230;<br \/>\n<a href=\"http:\/\/www.zdnet.fr\/actualites\/securite-informatique-les-attaques-de-concurrents-se-multiplient-39822698.htm\" target=\"_blank\">http:\/\/www.zdnet.fr\/actualites\/securite-informatique-les-attaques-de-concurrents-se-multiplient-39822698.htm<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Pour plus d&#8217;un tiers des entreprises fran\u00e7aises, ce constat entra\u00eene une hausse des budgets consacr\u00e9s \u00e0 la s\u00e9curit\u00e9 informatique affirme le cabinet&#8230; http:\/\/www.zdnet.fr\/actualites\/securite-informatique-les-attaques-de-concurrents-se-multiplient-39822698.htm<\/p>\n","protected":false},"author":1,"featured_media":162,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[20],"tags":[],"class_list":["post-363","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurite"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/06\/cyber-311111.jpg?fit=1000%2C664&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p6jw1p-5R","jetpack-related-posts":[{"id":713,"url":"https:\/\/mouillere.com\/universconvergents\/2015\/08\/27\/ue-vers-lobligation-pour-les-entreprises-du-numerique-a-devoiler-leurs-failles-de-securite\/","url_meta":{"origin":363,"position":0},"title":"UE : vers l\u2019obligation pour les entreprises du num\u00e9rique \u00e0 d\u00e9voiler leurs failles de s\u00e9curit\u00e9 ?","author":"Fred","date":"27 ao\u00fbt 2015","format":false,"excerpt":"La future directive NIS leur imposerait de notifier les intrusions sur leurs syst\u00e8mes informatiques. A l'instar des obligations qui incombent d\u00e9j\u00e0 aux op\u00e9rateurs d'importance vitale. Un projet de directive europ\u00e9enne d\u00e9voil\u00e9 cet \u00e9t\u00e9 par l'agence de presse Reuters suscite de vives r\u00e9actions aupr\u00e8s des acteurs du secteur du num\u00e9rique. Si\u2026","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/06\/cyber-311111.jpg?fit=1000%2C664&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/06\/cyber-311111.jpg?fit=1000%2C664&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/06\/cyber-311111.jpg?fit=1000%2C664&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/06\/cyber-311111.jpg?fit=1000%2C664&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":6322,"url":"https:\/\/mouillere.com\/universconvergents\/2024\/10\/27\/usages-de-lia-et-menaces-informatiques-pesant-sur-les-avocats-juristes\/","url_meta":{"origin":363,"position":1},"title":"Usages de l&#8217;IA et menaces informatiques pesant sur les Avocats &#038; Juristes","author":"Fred","date":"27 octobre 2024","format":false,"excerpt":"Wolters Kluwer vient de publier un rapport sur le futur des avocats et juristes, ce qui pose la question des usages de l'IA et des menaces informatiques pesant sur les professionnels du droit. L'IA accompagne les professionnels du droit principalement dans la recherche et la synth\u00e8se de la r\u00e8glementation et\u2026","rel":"","context":"Dans &quot;Avocat&quot;","block_context":{"text":"Avocat","link":"https:\/\/mouillere.com\/universconvergents\/category\/avocat\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/10\/2024-RapportAvocatsFaceAuFutur.jpg?fit=1024%2C1024&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/10\/2024-RapportAvocatsFaceAuFutur.jpg?fit=1024%2C1024&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/10\/2024-RapportAvocatsFaceAuFutur.jpg?fit=1024%2C1024&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/10\/2024-RapportAvocatsFaceAuFutur.jpg?fit=1024%2C1024&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":6059,"url":"https:\/\/mouillere.com\/universconvergents\/2024\/06\/27\/1-3-des-collectivites-victimes-de-cyberattaques\/","url_meta":{"origin":363,"position":2},"title":"1\/3 des collectivit\u00e9s victimes de cyberattaques","author":"Fred","date":"27 juin 2024","format":false,"excerpt":"L\u2019entreprise de s\u00e9curit\u00e9 informatique Harfang Lab vient de publier une \u00e9tude consacr\u00e9e \u00e0 la cybers\u00e9curit\u00e9 des collectivit\u00e9s. Avec la num\u00e9risation des services publics, allant des syst\u00e8mes de gestion administrative aux services en ligne pour les citoyens, les collectivit\u00e9s sont de plus en plus expos\u00e9es aux cyberattaques qui peuvent paralyser les\u2026","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/06\/2024-HarfangLab-Cybersecurite-CollectivitesTerritoriales.png?fit=1200%2C516&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/06\/2024-HarfangLab-Cybersecurite-CollectivitesTerritoriales.png?fit=1200%2C516&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/06\/2024-HarfangLab-Cybersecurite-CollectivitesTerritoriales.png?fit=1200%2C516&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/06\/2024-HarfangLab-Cybersecurite-CollectivitesTerritoriales.png?fit=1200%2C516&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/06\/2024-HarfangLab-Cybersecurite-CollectivitesTerritoriales.png?fit=1200%2C516&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":645,"url":"https:\/\/mouillere.com\/universconvergents\/2015\/08\/07\/securite-des-donnees-entre-complexite-et-fragilite-de-nos-systemes-informatiques\/","url_meta":{"origin":363,"position":3},"title":"S\u00e9curit\u00e9 des donn\u00e9es : entre complexit\u00e9 et fragilit\u00e9 de nos syst\u00e8mes informatiques","author":"Fred","date":"7 ao\u00fbt 2015","format":false,"excerpt":"Il est devenu impossible de faire des promesses de s\u00e9curit\u00e9 durables. Au lieu de bl\u00e2mer la s\u00e9curit\u00e9 des utilisateurs finaux, il faut augmenter... http:\/\/www.zdnet.fr\/actualites\/securite-des-donnees-entre-complexite-et-fragilite-de-nos-systemes-informatiques-39823382.htm","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":6496,"url":"https:\/\/mouillere.com\/universconvergents\/2025\/03\/06\/cloud-cybersecurite-souverainete\/","url_meta":{"origin":363,"position":4},"title":"Cloud : cybers\u00e9curit\u00e9 &#038; souverainet\u00e9","author":"Fred","date":"6 mars 2025","format":false,"excerpt":"Alors que Microsoft finalise son projet garantissant \u00e0 ses utilisateurs europ\u00e9ens que leurs donn\u00e9es restent localis\u00e9es dans des centres de donn\u00e9es bas\u00e9es dans dans un pays de l'Union europ\u00e9enne ou au sein d'un pays membre de l'association europ\u00e9enne de libre \u00e9change (Suisse, Liechtenstein, Norv\u00e8ge, Islande), ce qui ne devrait pas\u2026","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2025\/03\/2025-02-190-ANSSI-Cloud-MenaceInformatique.jpg?fit=1024%2C768&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2025\/03\/2025-02-190-ANSSI-Cloud-MenaceInformatique.jpg?fit=1024%2C768&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2025\/03\/2025-02-190-ANSSI-Cloud-MenaceInformatique.jpg?fit=1024%2C768&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2025\/03\/2025-02-190-ANSSI-Cloud-MenaceInformatique.jpg?fit=1024%2C768&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":585,"url":"https:\/\/mouillere.com\/universconvergents\/2015\/07\/31\/securite-it-en-france-les-investissements-sont-maintenus\/","url_meta":{"origin":363,"position":5},"title":"S\u00e9curit\u00e9 IT en France : les investissements sont maintenus","author":"Fred","date":"31 juillet 2015","format":false,"excerpt":"Malgr\u00e9 les restrictions de budget, les investissements dans la s\u00e9curit\u00e9 informatique en France ne fl\u00e9chissent pas. La mise en conformit\u00e9 avec la... http:\/\/www.zdnet.fr\/actualites\/securite-it-en-france-les-investissements-sont-maintenus-39823162.htm","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts\/363","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/comments?post=363"}],"version-history":[{"count":1,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts\/363\/revisions"}],"predecessor-version":[{"id":364,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts\/363\/revisions\/364"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/media\/162"}],"wp:attachment":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/media?parent=363"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/categories?post=363"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/tags?post=363"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}