{"id":12166,"date":"2019-12-18T15:45:37","date_gmt":"2019-12-18T14:45:37","guid":{"rendered":"http:\/\/51.91.255.30\/Club-Freelance\/?p=12166"},"modified":"2025-03-20T13:28:25","modified_gmt":"2025-03-20T12:28:25","slug":"news-cybersecurite-les-4-articles-a-ne-pas-manquer","status":"publish","type":"post","link":"https:\/\/wp.mindquest.io\/?p=12166","title":{"rendered":"News cybers\u00e9curit\u00e9 : les 4 articles qu&rsquo;ils ne fallait pas manquer ces derni\u00e8res semaines"},"content":{"rendered":"<p>News cybers\u00e9curit\u00e9 : les menaces et d\u00e9fis de 2020. 4 articles de ces derni\u00e8res semaines, \u00e0 ne pas manquer.<\/p>\n<p>D\u00e9couvrir la <a href=\"https:\/\/mindquest.io\/fr\/blog\/news\/10688\" target=\"_blank\">fiche m\u00e9tier : Expert Cybers\u00e9curit\u00e9<\/a>.<\/p>\n<div class=\"wp-block-spacer\"><\/div>\n<h3 class=\"has-primary-color has-text-color\">NEWS  CYBERS\u00c9CURIT\u00c9 : 800 POSTES DE DPO CR\u00c9\u00c9S EN 2019 SELON L&rsquo;AFCDP<\/h3>\n<p class=\"has-primary-color has-text-color\">Dans son 1er observatoire du m\u00e9tier de d\u00e9l\u00e9gu\u00e9 \u00e0 la protection des donn\u00e9es (DPO); l&rsquo;AFCDP estime \u00e0 2 800 le nombre de professionnels engag\u00e9s en 2019 par les entreprises et les administrations fran\u00e7aises. La majorit\u00e9 des offres sont concentr\u00e9es en Ile-de-France et concernent le secteur priv\u00e9. <\/p>\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link\" href=\"https:\/\/www.lemondeinformatique.fr\/actualites\/lire-2-800-postes-de-dpo-crees-en-2019-selon-l-afcdp-77222.html\">Lire la suite sur Le Monde Informatique<\/a><\/div>\n<div class=\"wp-block-spacer\"><\/div>\n<h3 class=\"has-primary-color has-text-color\">NEWS CYBERS\u00c9CURIT\u00c9 : QUELLES SONT LES MENACES ET LES D\u00c9FIS QUI ATTENDENT LES ENTREPRISES EN 2020  <\/h3>\n<p>Selon une \u00e9tude sur les cyber menaces, publi\u00e9e cette ann\u00e9e par le Minist\u00e8re de l\u2019Int\u00e9rieur; les entreprises ayant d\u00e9j\u00e0 \u00e9t\u00e9 victimes d\u2019une attaque indiquent \u00e0 73% que la m\u00e9thode utilis\u00e9e \u00e9tait du phishing et \u00e0 44% du ransomware. Une menace permanente dont les barri\u00e8res de la cybers\u00e9curit\u00e9 sont de plus en plus repouss\u00e9es chaque ann\u00e9e. Des mutations qui donnent de nouveaux d\u00e9fis aux entreprises. A la fois pour anticiper les intrusions et prot\u00e9ger les donn\u00e9es localis\u00e9es dans le cloud. <\/p>\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link\" href=\"https:\/\/www.globalsecuritymag.fr\/Cybersecurite-Quelles-sont-les,20191216,93934.html\">Lire la suite sur Global Security Mag<\/a><\/div>\n<div class=\"wp-block-spacer\"><\/div>\n<h3>REPLACER L&rsquo;HUMAIN AU COEUR DE LA CYBERS\u00c9CURIT\u00c9  <\/h3>\n<p class=\"has-primary-color has-text-color\">Les donn\u00e9es \u00e0 caract\u00e8re personnel ont toujours fait l\u2019objet d\u2019une vigilance particuli\u00e8re. Mais jamais leur sensibilit\u00e9 n\u2019a \u00e9t\u00e9 autant mise en exergue. Cela est li\u00e9 \u00e0 la croissance exponentielle des plateformes, des applications, des syst\u00e8mes connect\u00e9s qui \u00ab\u00a0reformatent\u00a0\u00bb notre soci\u00e9t\u00e9 avec une vitesse souvent imperceptible par nos propres sens. Plus que jamais, ces donn\u00e9es nous caract\u00e9risent. Elles d\u00e9voilent notre intimit\u00e9. Elles p\u00e9n\u00e8trent la sph\u00e8re du secret de notre vie priv\u00e9e sans laquelle il n\u2019y a pas de libert\u00e9.<\/p>\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link\" href=\"https:\/\/www.forbes.fr\/technologie\/replacer-lhumain-au-coeur-de-la-cybersecurite\/?cn-reloaded=1\">Lire la suite sur Forbes<\/a><\/div>\n<div class=\"wp-block-spacer\"><\/div>\n<h3 class=\"has-primary-color has-text-color\">SHADOW IT IS THE CYBERSECURITY THREAT THAT KEEPS GIVING ALL YEAR<\/h3>\n<p>Associates most often use shadow IT devices to access social media (39%), followed by downloading apps (24%); games (13); and films (7%). Hackers, organized crime and state-sponsored cybercrime organizations rely on social engineering hacks, phishing and malware injection; across these four popular areas to gain access to enterprise networks and exfiltrate data.<\/p>\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link\" href=\"https:\/\/www.forbes.com\/sites\/louiscolumbus\/2019\/12\/15\/shadow-it-is-the-cybersecurity-threat-that-keeps-giving-all-year-long\/#4b8afb455561\">Lire la suite sur fORBES<\/a><\/div>\n<div class=\"wp-block-spacer\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>News cybers\u00e9curit\u00e9 : les menaces et d\u00e9fis de 2020. 4 articles de ces derni\u00e8res semaines, \u00e0 ne pas manquer. Club Freelance Insights<\/p>\n","protected":false},"author":3,"featured_media":12169,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[521,517,490],"tags":[85,159,201,38,341,250,29],"class_list":["post-12166","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurite","category-revues-presse","category-webinars-ressources","tag-articles","tag-cyberattaque","tag-cybercriminalite","tag-cybersecurite","tag-expert-cybersecurite","tag-news","tag-revue-de-presse"],"acf":{"download_link":"","featured_image_2":12168,"related_posts":[12135,12044,10688],"meta_keys":"News Cybers\u00e9curit\u00e9","meta_description":"News cybers\u00e9curit\u00e9 : les menaces et d\u00e9fis de 2022. 4 articles de ces derni\u00e8res semaines, \u00e0 ne pas manquer.","meta_question":"","meta_response":""},"_links":{"self":[{"href":"https:\/\/wp.mindquest.io\/index.php?rest_route=\/wp\/v2\/posts\/12166","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wp.mindquest.io\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wp.mindquest.io\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wp.mindquest.io\/index.php?rest_route=\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/wp.mindquest.io\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=12166"}],"version-history":[{"count":15,"href":"https:\/\/wp.mindquest.io\/index.php?rest_route=\/wp\/v2\/posts\/12166\/revisions"}],"predecessor-version":[{"id":27940,"href":"https:\/\/wp.mindquest.io\/index.php?rest_route=\/wp\/v2\/posts\/12166\/revisions\/27940"}],"acf:post":[{"embeddable":true,"href":"https:\/\/wp.mindquest.io\/index.php?rest_route=\/wp\/v2\/posts\/10688"},{"embeddable":true,"href":"https:\/\/wp.mindquest.io\/index.php?rest_route=\/wp\/v2\/posts\/12044"},{"embeddable":true,"href":"https:\/\/wp.mindquest.io\/index.php?rest_route=\/wp\/v2\/posts\/12135"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/wp.mindquest.io\/index.php?rest_route=\/wp\/v2\/media\/12169"}],"wp:attachment":[{"href":"https:\/\/wp.mindquest.io\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=12166"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wp.mindquest.io\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=12166"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wp.mindquest.io\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=12166"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}