{"id":948,"date":"2015-09-21T13:32:42","date_gmt":"2015-09-21T12:32:42","guid":{"rendered":"http:\/\/mouillere.com\/universconvergents\/?p=948"},"modified":"2015-09-22T13:33:27","modified_gmt":"2015-09-22T12:33:27","slug":"vos-donnees-sont-elles-plus-en-securite-dans-le-cloud","status":"publish","type":"post","link":"https:\/\/mouillere.com\/universconvergents\/2015\/09\/21\/vos-donnees-sont-elles-plus-en-securite-dans-le-cloud\/","title":{"rendered":"Vos donn\u00e9es sont-elles plus en s\u00e9curit\u00e9 dans le Cloud ?"},"content":{"rendered":"<p>La s\u00e9curit\u00e9 des donn\u00e9es reste un frein pour nombre d&#8217;entreprises \u00e0 la migration vers le Cloud. Cette crainte est-elle justifi\u00e9e ? Pour les DSI&#8230;<br \/>\n<a href=\"http:\/\/www.zdnet.fr\/actualites\/vos-donnees-sont-elles-plus-en-securite-dans-le-cloud-39825222.htm\" target=\"_blank\">http:\/\/www.zdnet.fr\/actualites\/vos-donnees-sont-elles-plus-en-securite-dans-le-cloud-39825222.htm<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>La s\u00e9curit\u00e9 des donn\u00e9es reste un frein pour nombre d&#8217;entreprises \u00e0 la migration vers le Cloud. Cette crainte est-elle justifi\u00e9e ? Pour les DSI&#8230; http:\/\/www.zdnet.fr\/actualites\/vos-donnees-sont-elles-plus-en-securite-dans-le-cloud-39825222.htm<\/p>\n","protected":false},"author":1,"featured_media":534,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[20],"tags":[],"class_list":["post-948","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurite"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/cloud-computing.png?fit=920%2C810&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p6jw1p-fi","jetpack-related-posts":[{"id":5842,"url":"https:\/\/mouillere.com\/universconvergents\/2024\/01\/22\/chiffrement-et-securite-des-donnees-dans-le-cloud\/","url_meta":{"origin":948,"position":0},"title":"Chiffrement et s\u00e9curit\u00e9 des donn\u00e9es dans le Cloud","author":"Fred","date":"22 janvier 2024","format":false,"excerpt":"La CNIL vient de publier deux \u00a0fiches sur le chiffrement et s\u00e9curit\u00e9 des donn\u00e9es dans le Cloud. La s\u00e9curit\u00e9 est indispensable pour apporter la confiance dans la gestion des donn\u00e9es personnelles de l\u2019entreprise. En 2022, pr\u00e8s d\u2019un tiers des sanctions de la CNIL visaient des manquements aux obligations de s\u00e9curit\u00e9.\u2026","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/01\/Cloud.jpg?fit=1024%2C1024&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/01\/Cloud.jpg?fit=1024%2C1024&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/01\/Cloud.jpg?fit=1024%2C1024&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/01\/Cloud.jpg?fit=1024%2C1024&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":1396,"url":"https:\/\/mouillere.com\/universconvergents\/2015\/11\/16\/etude-mettre-des-donnees-pro-sur-le-cloud-pose-de-nouveaux-problemes-de-securite\/","url_meta":{"origin":948,"position":1},"title":"Etude : mettre des donn\u00e9es pro sur le cloud pose de nouveaux probl\u00e8mes de s\u00e9curit\u00e9","author":"Fred","date":"16 novembre 2015","format":false,"excerpt":"On vous a dit que mettre des donn\u00e9es sur les services de cloud \u00e9vitait de se prendre la t\u00eate c\u00f4t\u00e9 s\u00e9curit\u00e9 ? Rien n'est moins vrai. Skyhigh... http:\/\/www.zdnet.fr\/actualites\/etude-mettre-des-donnees-pro-sur-le-cloud-pose-de-nouveaux-problemes-de-securite-39828206.htm","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/11\/secu_cloud8.jpg?fit=610%2C261&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/11\/secu_cloud8.jpg?fit=610%2C261&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/11\/secu_cloud8.jpg?fit=610%2C261&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":523,"url":"https:\/\/mouillere.com\/universconvergents\/2015\/07\/28\/securite-it-un-marche-dynamique-influence-par-le-cloud\/","url_meta":{"origin":948,"position":2},"title":"S\u00e9curit\u00e9 IT : un march\u00e9 dynamique influenc\u00e9 par le Cloud","author":"Fred","date":"28 juillet 2015","format":false,"excerpt":"Le march\u00e9 de la s\u00e9curit\u00e9 reste dynamique, \u00e0 +10% par an, pratiquement dans tous les pays. Le mod\u00e8le 'Cloud' apporte de nouvelles opportunit\u00e9s de... http:\/\/www.zdnet.fr\/actualites\/securite-it-un-marche-dynamique-influence-par-le-cloud-39823004.htm","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":713,"url":"https:\/\/mouillere.com\/universconvergents\/2015\/08\/27\/ue-vers-lobligation-pour-les-entreprises-du-numerique-a-devoiler-leurs-failles-de-securite\/","url_meta":{"origin":948,"position":3},"title":"UE : vers l\u2019obligation pour les entreprises du num\u00e9rique \u00e0 d\u00e9voiler leurs failles de s\u00e9curit\u00e9 ?","author":"Fred","date":"27 ao\u00fbt 2015","format":false,"excerpt":"La future directive NIS leur imposerait de notifier les intrusions sur leurs syst\u00e8mes informatiques. A l'instar des obligations qui incombent d\u00e9j\u00e0 aux op\u00e9rateurs d'importance vitale. Un projet de directive europ\u00e9enne d\u00e9voil\u00e9 cet \u00e9t\u00e9 par l'agence de presse Reuters suscite de vives r\u00e9actions aupr\u00e8s des acteurs du secteur du num\u00e9rique. Si\u2026","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/06\/cyber-311111.jpg?fit=1000%2C664&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/06\/cyber-311111.jpg?fit=1000%2C664&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/06\/cyber-311111.jpg?fit=1000%2C664&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/06\/cyber-311111.jpg?fit=1000%2C664&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":6789,"url":"https:\/\/mouillere.com\/universconvergents\/2025\/11\/04\/souverainete-des-systemes-dinformation-de-letat\/","url_meta":{"origin":948,"position":4},"title":"Souverainet\u00e9 des syst\u00e8mes d\u2019information de l\u2019\u00c9tat","author":"Fred","date":"4 novembre 2025","format":false,"excerpt":"Le dernier rapport de la Cour des comptes sur la souverainet\u00e9 des syst\u00e8mes d'information civils de l'\u00c9tat met en lumi\u00e8re un d\u00e9calage persistant entre l'ambition affich\u00e9e par la France en mati\u00e8re de souverainet\u00e9 num\u00e9rique et la r\u00e9alit\u00e9 de sa mise en \u0153uvre face \u00e0 la pr\u00e9dominance des g\u00e9ants technologiques am\u00e9ricains,\u2026","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2025\/11\/Souverainete-des-systemes-d_information-de-l_Etat.png?fit=1200%2C860&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2025\/11\/Souverainete-des-systemes-d_information-de-l_Etat.png?fit=1200%2C860&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2025\/11\/Souverainete-des-systemes-d_information-de-l_Etat.png?fit=1200%2C860&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2025\/11\/Souverainete-des-systemes-d_information-de-l_Etat.png?fit=1200%2C860&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2025\/11\/Souverainete-des-systemes-d_information-de-l_Etat.png?fit=1200%2C860&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":6496,"url":"https:\/\/mouillere.com\/universconvergents\/2025\/03\/06\/cloud-cybersecurite-souverainete\/","url_meta":{"origin":948,"position":5},"title":"Cloud : cybers\u00e9curit\u00e9 &#038; souverainet\u00e9","author":"Fred","date":"6 mars 2025","format":false,"excerpt":"Alors que Microsoft finalise son projet garantissant \u00e0 ses utilisateurs europ\u00e9ens que leurs donn\u00e9es restent localis\u00e9es dans des centres de donn\u00e9es bas\u00e9es dans dans un pays de l'Union europ\u00e9enne ou au sein d'un pays membre de l'association europ\u00e9enne de libre \u00e9change (Suisse, Liechtenstein, Norv\u00e8ge, Islande), ce qui ne devrait pas\u2026","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2025\/03\/2025-02-190-ANSSI-Cloud-MenaceInformatique.jpg?fit=1024%2C768&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2025\/03\/2025-02-190-ANSSI-Cloud-MenaceInformatique.jpg?fit=1024%2C768&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2025\/03\/2025-02-190-ANSSI-Cloud-MenaceInformatique.jpg?fit=1024%2C768&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2025\/03\/2025-02-190-ANSSI-Cloud-MenaceInformatique.jpg?fit=1024%2C768&ssl=1&resize=700%2C400 2x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts\/948","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/comments?post=948"}],"version-history":[{"count":1,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts\/948\/revisions"}],"predecessor-version":[{"id":949,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts\/948\/revisions\/949"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/media\/534"}],"wp:attachment":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/media?parent=948"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/categories?post=948"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/tags?post=948"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}