{"id":780,"date":"2015-09-04T15:02:42","date_gmt":"2015-09-04T14:02:42","guid":{"rendered":"http:\/\/mouillere.com\/universconvergents\/?p=780"},"modified":"2015-09-06T15:03:37","modified_gmt":"2015-09-06T14:03:37","slug":"comment-savoir-si-les-depenses-en-cybersecurite-sont-suffisantes","status":"publish","type":"post","link":"https:\/\/mouillere.com\/universconvergents\/2015\/09\/04\/comment-savoir-si-les-depenses-en-cybersecurite-sont-suffisantes\/","title":{"rendered":"Comment savoir si les d\u00e9penses en cybers\u00e9curit\u00e9 sont suffisantes ?"},"content":{"rendered":"<p>\u00c0 part d\u00e9penser toutes leurs liquidit\u00e9s en antivirus, pare-feu, d\u00e9tection des intrusions et autres, comment font les entreprises&#8230;<br \/>\n<a href=\"http:\/\/www.zdnet.fr\/actualites\/comment-savoir-si-les-depenses-en-cybersecurite-sont-suffisantes-39824324.htm\" target=\"_blank\">http:\/\/www.zdnet.fr\/actualites\/comment-savoir-si-les-depenses-en-cybersecurite-sont-suffisantes-39824324.htm<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u00c0 part d\u00e9penser toutes leurs liquidit\u00e9s en antivirus, pare-feu, d\u00e9tection des intrusions et autres, comment font les entreprises&#8230; http:\/\/www.zdnet.fr\/actualites\/comment-savoir-si-les-depenses-en-cybersecurite-sont-suffisantes-39824324.htm<\/p>\n","protected":false},"author":1,"featured_media":524,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[20],"tags":[],"class_list":["post-780","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurite"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1667%2C1152&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p6jw1p-cA","jetpack-related-posts":[{"id":348,"url":"https:\/\/mouillere.com\/universconvergents\/2015\/07\/20\/comment-linternet-des-objets-transforme-la-securite-dentreprise\/","url_meta":{"origin":780,"position":0},"title":"Comment l&#8217;internet des objets transforme la s\u00e9curit\u00e9 d&#8217;entreprise","author":"Fred","date":"20 juillet 2015","format":false,"excerpt":"L'essor de l'internet des objets g\u00e9n\u00e8re un tout nouvel ensemble de d\u00e9fis li\u00e9s \u00e0 la s\u00e9curit\u00e9. Voici ce que les d\u00e9cideurs techniques doivent savoir... http:\/\/www.zdnet.fr\/actualites\/comment-l-internet-des-objets-transforme-la-securite-d-entreprise-39822396.htm","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/06\/cyber-311111.jpg?fit=1000%2C664&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/06\/cyber-311111.jpg?fit=1000%2C664&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/06\/cyber-311111.jpg?fit=1000%2C664&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/06\/cyber-311111.jpg?fit=1000%2C664&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":1252,"url":"https:\/\/mouillere.com\/universconvergents\/2015\/10\/22\/la-cnil-suisse-refuse-desormais-detre-liee-par-le-safe-harbor\/","url_meta":{"origin":780,"position":1},"title":"La CNIL Suisse refuse d\u00e9sormais d\u2019\u00eatre li\u00e9e par le Safe Harbor","author":"Fred","date":"22 octobre 2015","format":false,"excerpt":"M\u00eame s'il n'est pas li\u00e9 par le droit communautaire europ\u00e9en, le Pr\u00e9pos\u00e9 f\u00e9d\u00e9ral suisse \u00e0 la protection des donn\u00e9es et \u00e0 la transparence (PFPDT), qui remplit le m\u00eame office que la CNIL, a fait savoir que l'accord Suisse-USA permettant l'exportation de donn\u00e9es personnelles vers les \u00c9tats-Unis n'\u00e9tait plus suffisant pour\u2026","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/10\/safeharbor_logo-33bd8e992d9f99e55d8b0caa6c6d0477.jpg?fit=792%2C325&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/10\/safeharbor_logo-33bd8e992d9f99e55d8b0caa6c6d0477.jpg?fit=792%2C325&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/10\/safeharbor_logo-33bd8e992d9f99e55d8b0caa6c6d0477.jpg?fit=792%2C325&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/10\/safeharbor_logo-33bd8e992d9f99e55d8b0caa6c6d0477.jpg?fit=792%2C325&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":368,"url":"https:\/\/mouillere.com\/universconvergents\/2015\/07\/22\/comment-faire-fonctionner-le-byod-en-entreprise\/","url_meta":{"origin":780,"position":2},"title":"Comment faire fonctionner le BYOD en entreprise","author":"Fred","date":"22 juillet 2015","format":false,"excerpt":"Si l'utilisation d'appareils personnels sur le lieu de travail fonctionne effectivement, elle est dans le meilleur des cas un compromis pr\u00e9par\u00e9 \u00e0... http:\/\/www.zdnet.fr\/actualites\/comment-faire-fonctionner-le-byod-en-entreprise-39822594.htm","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/BYOD-Strategy.jpg?fit=1200%2C634&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/BYOD-Strategy.jpg?fit=1200%2C634&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/BYOD-Strategy.jpg?fit=1200%2C634&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/BYOD-Strategy.jpg?fit=1200%2C634&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/BYOD-Strategy.jpg?fit=1200%2C634&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":5328,"url":"https:\/\/mouillere.com\/universconvergents\/2022\/11\/15\/comment-lutter-contre-les-cyberattaques\/","url_meta":{"origin":780,"position":3},"title":"Comment lutter contre les cyberattaques ?","author":"Fred","date":"15 novembre 2022","format":false,"excerpt":"","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2022\/11\/ACC-Cyber-Attack-Cheat-Sheet.jpg?fit=1200%2C831&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2022\/11\/ACC-Cyber-Attack-Cheat-Sheet.jpg?fit=1200%2C831&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2022\/11\/ACC-Cyber-Attack-Cheat-Sheet.jpg?fit=1200%2C831&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2022\/11\/ACC-Cyber-Attack-Cheat-Sheet.jpg?fit=1200%2C831&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2022\/11\/ACC-Cyber-Attack-Cheat-Sheet.jpg?fit=1200%2C831&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":1141,"url":"https:\/\/mouillere.com\/universconvergents\/2015\/10\/14\/big-data-comment-securiser-ses-projets\/","url_meta":{"origin":780,"position":4},"title":"Big Data : comment s\u00e9curiser ses projets ?","author":"Fred","date":"14 octobre 2015","format":false,"excerpt":"Les projets Big Data se mettent en place. Mais parmi les freins, la s\u00e9curit\u00e9 figure au premier rang. Elle ne concerne pas seulement les risques de vol... http:\/\/www.zdnet.fr\/actualites\/big-data-comment-securiser-ses-projets-39826460.htm","rel":"","context":"Dans &quot;Big Data&quot;","block_context":{"text":"Big Data","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/big-data\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/bigdata2.jpg?fit=1200%2C699&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/bigdata2.jpg?fit=1200%2C699&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/bigdata2.jpg?fit=1200%2C699&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/bigdata2.jpg?fit=1200%2C699&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/bigdata2.jpg?fit=1200%2C699&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":1223,"url":"https:\/\/mouillere.com\/universconvergents\/2015\/10\/22\/securite-it-comment-le-big-data-peut-il-contribuer\/","url_meta":{"origin":780,"position":5},"title":"S\u00e9curit\u00e9 IT : comment le Big Data peut-il contribuer ?","author":"Fred","date":"22 octobre 2015","format":false,"excerpt":"Les responsables s\u00e9curit\u00e9, qui ont, par exemple, commenc\u00e9 \u00e0 s\u2019investir dans l\u2019analyse des \u2018logs\u2019 de connexion, s\u2019int\u00e9ressent \u00e0 la dimension pr\u00e9dictive du Big Data. Pourquoi ? http:\/\/www.zdnet.fr\/actualites\/securite-it-comment-le-big-data-peut-il-contribuer-39826944.htm \u00a0","rel":"","context":"Dans &quot;Big Data&quot;","block_context":{"text":"Big Data","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/big-data\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=1050%2C600 3x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts\/780","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/comments?post=780"}],"version-history":[{"count":1,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts\/780\/revisions"}],"predecessor-version":[{"id":781,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts\/780\/revisions\/781"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/media\/524"}],"wp:attachment":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/media?parent=780"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/categories?post=780"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/tags?post=780"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}