{"id":6075,"date":"2024-07-14T21:25:00","date_gmt":"2024-07-14T20:25:00","guid":{"rendered":"https:\/\/mouillere.com\/universconvergents\/?p=6075"},"modified":"2024-07-15T16:28:59","modified_gmt":"2024-07-15T15:28:59","slug":"le-centre-integre-pour-la-cyberdefense-de-lotan","status":"publish","type":"post","link":"https:\/\/mouillere.com\/universconvergents\/2024\/07\/14\/le-centre-integre-pour-la-cyberdefense-de-lotan\/","title":{"rendered":"Le Centre int\u00e9gr\u00e9 pour la cyberd\u00e9fense de l&#8217;Otan"},"content":{"rendered":"<p>Face \u00e0 la recrudescence des cyberattaques russes et chinoises, l&#8217;Otan cr\u00e9\u00e9 le Centre int\u00e9gr\u00e9 pour la cyberd\u00e9fense afin d&#8217;am\u00e9liorer la protection des r\u00e9seaux de l\u2019Otan et de ses 32 \u00c9tats membres, d&#8217;informer les commandements militaires des cybermenaces et vuln\u00e9rabilit\u00e9s, y compris celles pesant sur les infrastructures critiques priv\u00e9es d\u00e8s lors qu&#8217;elles sont n\u00e9cessaires pour venir en soutien d\u2019activit\u00e9s militaires.<\/p>\n<p><!--more--><br \/>\nLes cyberattaques provenant d\u2019acteurs russes et chinois se sont multipli\u00e9es.<\/p>\n<p>Mandiant estime que les cyberattaques russes ont augment\u00e9 de 300% dans les pays de l\u2019Otan en 2022 par rapport \u00e0 2020 :<\/p>\n<ul>\n<li>Le cyberespionnage repr\u00e9sente l\u2019une des plus grandes menaces, \u00e0 travers des groupes de hackers affili\u00e9s \u00e0 l\u2019\u00c9tat russe comme APT29 (Cozy Bear) \u00e0 l\u2019origine de la cyberattaque d\u2019ampleur contre Microsoft;<\/li>\n<li>les op\u00e9rations de d\u00e9sinformation et cyberattaques par d\u00e9ni de service ayant notamment cibl\u00e9 plusieurs minist\u00e8res fran\u00e7ais.<\/li>\n<\/ul>\n<p>Et la riposte de l&#8217;Otan, c&#8217;est pour quand ?<\/p>\n<p><a href=\"https:\/\/www.nato.int\/cps\/en\/natohq\/official_texts_227678.htm\" target=\"_blank\" rel=\"noopener\">https:\/\/www.nato.int\/cps\/en\/natohq\/official_texts_227678.htm<\/a><\/p>\n<p><a href=\"https:\/\/cloud.google.com\/blog\/topics\/threat-intelligence\/cyber-threats-facing-nato\" target=\"_blank\" rel=\"noopener\">https:\/\/cloud.google.com\/blog\/topics\/threat-intelligence\/cyber-threats-facing-nato<\/a><\/p>\n<p><a href=\"https:\/\/www.usine-digitale.fr\/article\/l-otan-se-dote-d-un-centre-de-cyberdefense-face-a-la-recrudescence-des-menaces.N2216162\" target=\"_blank\" rel=\"noopener\">https:\/\/www.usine-digitale.fr\/article\/l-otan-se-dote-d-un-centre-de-cyberdefense-face-a-la-recrudescence-des-menaces.N2216162<\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Face \u00e0 la recrudescence des cyberattaques russes et chinoises, l&#8217;Otan cr\u00e9\u00e9 le Centre int\u00e9gr\u00e9 pour la cyberd\u00e9fense afin d&#8217;am\u00e9liorer la protection des r\u00e9seaux de l\u2019Otan et de ses 32 \u00c9tats&hellip; <\/p>\n","protected":false},"author":1,"featured_media":6078,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[20,74],"tags":[],"class_list":["post-6075","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurite","category-it"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/07\/NICC.jpeg?fit=1024%2C1024&ssl=1","jetpack_sharing_enabled":false,"jetpack_shortlink":"https:\/\/wp.me\/p6jw1p-1zZ","jetpack-related-posts":[{"id":6111,"url":"https:\/\/mouillere.com\/universconvergents\/2024\/07\/19\/microsoft-bug-ou-cyberattaque\/","url_meta":{"origin":6075,"position":0},"title":"Microsoft : bug ou cyberattaque ?","author":"Fred","date":"19 juillet 2024","format":false,"excerpt":"M\u00e9dias et experts en cybers\u00e9curit\u00e9 s'empressent de qualifier de panne informatique mondiale les anomalies bloquantes affectant actuellement de nombreuses infrastructures critiques et essentielles utilisant les services de Microsoft qui serait dues \u00e0 une mise \u00e0 jour d\u00e9fectueuse du logiciel de cybers\u00e9curit\u00e9 CrowdStrike. Dans le contexte g\u00e9opolitioque actuel et face \u00e0\u2026","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/07\/Microsoft.jpeg?fit=1024%2C1024&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/07\/Microsoft.jpeg?fit=1024%2C1024&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/07\/Microsoft.jpeg?fit=1024%2C1024&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/07\/Microsoft.jpeg?fit=1024%2C1024&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":5016,"url":"https:\/\/mouillere.com\/universconvergents\/2022\/03\/23\/mesures-conservatoires-de-la-cij-contre-la-russie\/","url_meta":{"origin":6075,"position":1},"title":"Mesures conservatoires de la CIJ contre la Russie","author":"Fred","date":"23 mars 2022","format":false,"excerpt":"Le Monde du Droit vient de publier un article relatif aux mesures conservatoires prononc\u00e9es le 16 mars 2022 \u00e0 l'encontre de la Russie par la Cour Internationale de Justice (CIJ) en r\u00e9ponse \u00e0 une demande urgente pr\u00e9sent\u00e9e par l'Ukraine le 26 f\u00e9vrier dernier. Rappelons qu'apr\u00e8s avoir particip\u00e9 au d\u00e9clin de\u2026","rel":"","context":"Dans &quot;Avocat&quot;","block_context":{"text":"Avocat","link":"https:\/\/mouillere.com\/universconvergents\/category\/avocat\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2022\/03\/Capture-decran-2022-03-23-a-16.50.39.jpg?fit=1200%2C680&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2022\/03\/Capture-decran-2022-03-23-a-16.50.39.jpg?fit=1200%2C680&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2022\/03\/Capture-decran-2022-03-23-a-16.50.39.jpg?fit=1200%2C680&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2022\/03\/Capture-decran-2022-03-23-a-16.50.39.jpg?fit=1200%2C680&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2022\/03\/Capture-decran-2022-03-23-a-16.50.39.jpg?fit=1200%2C680&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":1908,"url":"https:\/\/mouillere.com\/universconvergents\/2016\/03\/03\/cyberattaque-la-securite-a-coute-des-millions-deuros-a-tv5-monde\/","url_meta":{"origin":6075,"position":2},"title":"Cyberattaque &#8211; La s\u00e9curit\u00e9 a co\u00fbt\u00e9 des millions d&#8217;euros \u00e0 TV5 Monde","author":"Fred","date":"3 mars 2016","format":false,"excerpt":"Apr\u00e8s l'importante cyberattaque dont il a \u00e9t\u00e9 la cible en 2015, le groupe TV5 Monde a d\u00fb r\u00e9parer les d\u00e9g\u00e2ts, mettre en place une politique de... http:\/\/www.zdnet.fr\/actualites\/cyberattaque-la-securite-a-coute-des-millions-d-euros-a-tv5-monde-39833578.htm","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":5328,"url":"https:\/\/mouillere.com\/universconvergents\/2022\/11\/15\/comment-lutter-contre-les-cyberattaques\/","url_meta":{"origin":6075,"position":3},"title":"Comment lutter contre les cyberattaques ?","author":"Fred","date":"15 novembre 2022","format":false,"excerpt":"","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2022\/11\/ACC-Cyber-Attack-Cheat-Sheet.jpg?fit=1200%2C831&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2022\/11\/ACC-Cyber-Attack-Cheat-Sheet.jpg?fit=1200%2C831&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2022\/11\/ACC-Cyber-Attack-Cheat-Sheet.jpg?fit=1200%2C831&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2022\/11\/ACC-Cyber-Attack-Cheat-Sheet.jpg?fit=1200%2C831&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2022\/11\/ACC-Cyber-Attack-Cheat-Sheet.jpg?fit=1200%2C831&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":5594,"url":"https:\/\/mouillere.com\/universconvergents\/2023\/07\/04\/typologie-et-cout-des-cyberattaques-en-france\/","url_meta":{"origin":6075,"position":4},"title":"Typologie et co\u00fbt des cyberattaques en France","author":"Fred","date":"4 juillet 2023","format":false,"excerpt":"Le cabinet Aster\u00e8s \u00e9value le co\u00fbt des cyberattaques r\u00e9ussies contre les organismes publics et priv\u00e9s fran\u00e7ais \u00e0 2 Mds\u20ac en 2022. Ont \u00e9t\u00e9 analys\u00e9s les principaux impacts \u00e9conomiques des trois types d\u2019attaques r\u00e9ussies couvertes par l\u2019\u00e9tude : intrusion dans le syst\u00e8me d\u2019information, attaque par ran\u00e7ongiciel et par d\u00e9ni-de-service. Le co\u00fbt\u2026","rel":"","context":"Dans &quot;Donn\u00e9es personnelles&quot;","block_context":{"text":"Donn\u00e9es personnelles","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/donnees-personnelles\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2023\/07\/2023-06-Cyberattaques-Cout.jpg?fit=1200%2C855&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2023\/07\/2023-06-Cyberattaques-Cout.jpg?fit=1200%2C855&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2023\/07\/2023-06-Cyberattaques-Cout.jpg?fit=1200%2C855&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2023\/07\/2023-06-Cyberattaques-Cout.jpg?fit=1200%2C855&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2023\/07\/2023-06-Cyberattaques-Cout.jpg?fit=1200%2C855&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":6059,"url":"https:\/\/mouillere.com\/universconvergents\/2024\/06\/27\/1-3-des-collectivites-victimes-de-cyberattaques\/","url_meta":{"origin":6075,"position":5},"title":"1\/3 des collectivit\u00e9s victimes de cyberattaques","author":"Fred","date":"27 juin 2024","format":false,"excerpt":"L\u2019entreprise de s\u00e9curit\u00e9 informatique Harfang Lab vient de publier une \u00e9tude consacr\u00e9e \u00e0 la cybers\u00e9curit\u00e9 des collectivit\u00e9s. Avec la num\u00e9risation des services publics, allant des syst\u00e8mes de gestion administrative aux services en ligne pour les citoyens, les collectivit\u00e9s sont de plus en plus expos\u00e9es aux cyberattaques qui peuvent paralyser les\u2026","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/06\/2024-HarfangLab-Cybersecurite-CollectivitesTerritoriales.png?fit=1200%2C516&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/06\/2024-HarfangLab-Cybersecurite-CollectivitesTerritoriales.png?fit=1200%2C516&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/06\/2024-HarfangLab-Cybersecurite-CollectivitesTerritoriales.png?fit=1200%2C516&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/06\/2024-HarfangLab-Cybersecurite-CollectivitesTerritoriales.png?fit=1200%2C516&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/06\/2024-HarfangLab-Cybersecurite-CollectivitesTerritoriales.png?fit=1200%2C516&ssl=1&resize=1050%2C600 3x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts\/6075","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/comments?post=6075"}],"version-history":[{"count":2,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts\/6075\/revisions"}],"predecessor-version":[{"id":6077,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts\/6075\/revisions\/6077"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/media\/6078"}],"wp:attachment":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/media?parent=6075"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/categories?post=6075"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/tags?post=6075"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}