{"id":809,"date":"2015-09-07T09:30:56","date_gmt":"2015-09-07T08:30:56","guid":{"rendered":"http:\/\/mouillere.com\/universconvergents\/?p=809"},"modified":"2015-09-08T09:31:39","modified_gmt":"2015-09-08T08:31:39","slug":"securite-les-responsables-it-hesitent-revenir-aux-fondamentaux","status":"publish","type":"post","link":"https:\/\/mouillere.com\/universconvergents\/2015\/09\/07\/securite-les-responsables-it-hesitent-revenir-aux-fondamentaux\/","title":{"rendered":"S\u00e9curit\u00e9 : les responsables IT h\u00e9sitent&#8230; Revenir aux fondamentaux ?"},"content":{"rendered":"<p>Un tiers des d\u00e9cideurs IT doutent de l&#8217;efficacit\u00e9 de leur dispositif s\u00e9curit\u00e9. En particulier, c&#8217;est la s\u00e9curit\u00e9 p\u00e9rim\u00e9trique qui pr\u00e9senterait de&#8230;<br \/>\n<a href=\"http:\/\/www.zdnet.fr\/actualites\/securite-les-responsables-it-hesitent-revenir-aux-fondamentaux-39824440.htm\" target=\"_blank\">http:\/\/www.zdnet.fr\/actualites\/securite-les-responsables-it-hesitent-revenir-aux-fondamentaux-39824440.htm<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Un tiers des d\u00e9cideurs IT doutent de l&#8217;efficacit\u00e9 de leur dispositif s\u00e9curit\u00e9. En particulier, c&#8217;est la s\u00e9curit\u00e9 p\u00e9rim\u00e9trique qui pr\u00e9senterait de&#8230; http:\/\/www.zdnet.fr\/actualites\/securite-les-responsables-it-hesitent-revenir-aux-fondamentaux-39824440.htm<\/p>\n","protected":false},"author":1,"featured_media":810,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[20],"tags":[],"class_list":["post-809","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurite"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/09\/Enquete-IPSOS-Observer-US-pour-HP_04-2015_.jpg?fit=453%2C479&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p6jw1p-d3","jetpack-related-posts":[{"id":1223,"url":"https:\/\/mouillere.com\/universconvergents\/2015\/10\/22\/securite-it-comment-le-big-data-peut-il-contribuer\/","url_meta":{"origin":809,"position":0},"title":"S\u00e9curit\u00e9 IT : comment le Big Data peut-il contribuer ?","author":"Fred","date":"22 octobre 2015","format":false,"excerpt":"Les responsables s\u00e9curit\u00e9, qui ont, par exemple, commenc\u00e9 \u00e0 s\u2019investir dans l\u2019analyse des \u2018logs\u2019 de connexion, s\u2019int\u00e9ressent \u00e0 la dimension pr\u00e9dictive du Big Data. Pourquoi ? http:\/\/www.zdnet.fr\/actualites\/securite-it-comment-le-big-data-peut-il-contribuer-39826944.htm \u00a0","rel":"","context":"Dans &quot;Big Data&quot;","block_context":{"text":"Big Data","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/big-data\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":585,"url":"https:\/\/mouillere.com\/universconvergents\/2015\/07\/31\/securite-it-en-france-les-investissements-sont-maintenus\/","url_meta":{"origin":809,"position":1},"title":"S\u00e9curit\u00e9 IT en France : les investissements sont maintenus","author":"Fred","date":"31 juillet 2015","format":false,"excerpt":"Malgr\u00e9 les restrictions de budget, les investissements dans la s\u00e9curit\u00e9 informatique en France ne fl\u00e9chissent pas. La mise en conformit\u00e9 avec la... http:\/\/www.zdnet.fr\/actualites\/securite-it-en-france-les-investissements-sont-maintenus-39823162.htm","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":5540,"url":"https:\/\/mouillere.com\/universconvergents\/2023\/05\/05\/metavers-respect-par-design\/","url_meta":{"origin":809,"position":2},"title":"Metavers &#8211; respect par design","author":"Fred","date":"5 mai 2023","format":false,"excerpt":"Respect Zone a publi\u00e9 un rapport sur le m\u00e9tavers suite \u00e0 l'audition de nombreux experts de l'IT tels que Giuseppe DE MARTINO ou encore Ma\u00eetre Christiane F\u00c9RAL-SCHUHL. \"L'interop\u00e9rabilit\u00e9, les normes ouvertes, la confidentialit\u00e9 et la s\u00e9curit\u00e9 doivent \u00eatre int\u00e9gr\u00e9es au m\u00e9tavers d\u00e8s le premier jour, et avec toutes les nouvelles\u2026","rel":"","context":"Dans &quot;IT&quot;","block_context":{"text":"IT","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2023\/05\/2023-RAPPORT-METAVERSES-RESPECT-ET-DIVERSITE-1.jpeg?fit=848%2C1200&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2023\/05\/2023-RAPPORT-METAVERSES-RESPECT-ET-DIVERSITE-1.jpeg?fit=848%2C1200&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2023\/05\/2023-RAPPORT-METAVERSES-RESPECT-ET-DIVERSITE-1.jpeg?fit=848%2C1200&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2023\/05\/2023-RAPPORT-METAVERSES-RESPECT-ET-DIVERSITE-1.jpeg?fit=848%2C1200&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":523,"url":"https:\/\/mouillere.com\/universconvergents\/2015\/07\/28\/securite-it-un-marche-dynamique-influence-par-le-cloud\/","url_meta":{"origin":809,"position":3},"title":"S\u00e9curit\u00e9 IT : un march\u00e9 dynamique influenc\u00e9 par le Cloud","author":"Fred","date":"28 juillet 2015","format":false,"excerpt":"Le march\u00e9 de la s\u00e9curit\u00e9 reste dynamique, \u00e0 +10% par an, pratiquement dans tous les pays. Le mod\u00e8le 'Cloud' apporte de nouvelles opportunit\u00e9s de... http:\/\/www.zdnet.fr\/actualites\/securite-it-un-marche-dynamique-influence-par-le-cloud-39823004.htm","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":627,"url":"https:\/\/mouillere.com\/universconvergents\/2015\/08\/06\/securite-it-ce-qui-se-prepare-pour-les-2-a-3-ans-a-venir\/","url_meta":{"origin":809,"position":4},"title":"S\u00e9curit\u00e9 IT : ce qui se pr\u00e9pare pour les 2 \u00e0 3 ans \u00e0 venir","author":"Fred","date":"6 ao\u00fbt 2015","format":false,"excerpt":"La s\u00e9curit\u00e9 des syst\u00e8mes d'information va conna\u00eetre des changements importants dans les toutes prochaines ann\u00e9es : \u00e9mergence de nouvelles menaces,... http:\/\/www.zdnet.fr\/actualites\/securite-it-ce-qui-se-prepare-pour-les-2-a-3-ans-a-venir-39823298.htm","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/08\/cyber-war-300.jpg?fit=600%2C300&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/08\/cyber-war-300.jpg?fit=600%2C300&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/08\/cyber-war-300.jpg?fit=600%2C300&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":5821,"url":"https:\/\/mouillere.com\/universconvergents\/2024\/01\/10\/ai-pact-entre-menaces-et-opportunites\/","url_meta":{"origin":809,"position":5},"title":"AI Pact : entre menaces et opportunit\u00e9s","author":"Fred","date":"10 janvier 2024","format":false,"excerpt":"AI Pact vise \u00e0 promouvoir le d\u00e9veloppement et le d\u00e9ploiement de l'IA en Europe tout en respectant les valeurs et les droits fondamentaux des citoyens europ\u00e9ens via une coop\u00e9ration renforc\u00e9e entre les \u00c9tats membres, les institutions europ\u00e9ennes, le secteur priv\u00e9, la soci\u00e9t\u00e9 civile et les chercheurs, et un investissement de\u2026","rel":"","context":"Dans &quot;IA&quot;","block_context":{"text":"IA","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/ia\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/01\/AI-Pact.jpeg?fit=1024%2C1024&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/01\/AI-Pact.jpeg?fit=1024%2C1024&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/01\/AI-Pact.jpeg?fit=1024%2C1024&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/01\/AI-Pact.jpeg?fit=1024%2C1024&ssl=1&resize=700%2C400 2x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts\/809","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/comments?post=809"}],"version-history":[{"count":1,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts\/809\/revisions"}],"predecessor-version":[{"id":811,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts\/809\/revisions\/811"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/media\/810"}],"wp:attachment":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/media?parent=809"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/categories?post=809"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/tags?post=809"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}