{"id":13756,"date":"2020-06-19T15:47:29","date_gmt":"2020-06-19T13:47:29","guid":{"rendered":"http:\/\/51.91.255.30\/Club-Freelance\/?p=13756"},"modified":"2025-03-20T13:28:21","modified_gmt":"2025-03-20T12:28:21","slug":"articles-cybersecurite-a-lire","status":"publish","type":"post","link":"https:\/\/wp.mindquest.io\/?p=13756","title":{"rendered":"Articles Cybers\u00e9curit\u00e9 \u00e0 lire cette semaine"},"content":{"rendered":"<p>La cybers\u00e9curit\u00e9 est un sujet qui vous int\u00e9resse ? Club Freelance a s\u00e9lectionn\u00e9 les meilleurs articles Cybers\u00e9curit\u00e9 \u00e0 lire cette semaine.<\/p>\n<p>D\u00e9couvrir la <a href=\"https:\/\/mindquest.io\/fr\/blog\/news\/10688\" target=\"_blank\">fiche m\u00e9tier : Expert Cybers\u00e9curit\u00e9<\/a><\/p>\n<div class=\"wp-block-spacer\"><\/div>\n<h2 class=\"has-primary-color has-text-color\">Cybers\u00e9curit\u00e9 et pand\u00e9mie, extension du domaine de la lutte <\/h2>\n<p>Les attaquants profitent de la crise du Covid-19 pour exploiter les vuln\u00e9rabilit\u00e9s r\u00e9centes et anciennes sur des assets num\u00e9riques tr\u00e8s divers, en croissance constante. <\/p>\n<p>[su_button url=\u00a0\u00bb https:\/\/www.lemondeinformatique.fr\/actualites\/lire-cybersecurite-et-pandemie-extension-du-domaine-de-la-lutte-79419.html\u00a0\u00bb target=\u00a0\u00bbblank\u00a0\u00bb style=\u00a0\u00bbflat\u00a0\u00bb size=\u00a0\u00bb10 100px\u00a0\u00bb background=\u00a0\u00bb#CF3347&Prime; color=\u00a0\u00bb#ffffff\u00a0\u00bb center=\u00a0\u00bbyes\u00a0\u00bb radius=\u00a0\u00bb5&Prime; text-align=\u00a0\u00bbcenter\u00a0\u00bb] Lire l&rsquo;article sur LeMondeInformatique.fr[\/su_button]<\/p>\n<div class=\"wp-block-spacer\"><\/div>\n<h2>Quelles vont \u00eatre les principales tendances en mati\u00e8re de cybers\u00e9curit\u00e9 pour la deuxi\u00e8me moiti\u00e9 de 2020 ? <\/h2>\n<p>Il y a quelques semaines on aurait surement \u00e9voqu\u00e9 le  l&rsquo;explosion du traffic sur les solutions SaaS, et les cons\u00e9quences en mati\u00e8re de s\u00e9curit\u00e9 pour les plateformes comme Office 365, Dropbox, Gmail, Google Drive ou One Drive. Mais tout a chang\u00e9 depuis quelques semaines car de nombreux nouveaux d\u00e9fis se pr\u00e9sentent pour les entreprises.<\/p>\n<p>[su_button url=\u00a0\u00bb https:\/\/www.distributique.com\/actualites\/publi-info\/quelles-vont-etre-les-principales-tendances-en-matiere-de-cybersecurite-pour-la-deuxieme-moitie-de-l-annee-2020-414.html\u00a0\u00bb target=\u00a0\u00bbblank\u00a0\u00bb style=\u00a0\u00bbflat\u00a0\u00bb background=\u00a0\u00bb#CF3347&Prime; color=\u00a0\u00bb#ffffff\u00a0\u00bb size=\u00a0\u00bb10&Prime; center=\u00a0\u00bbyes\u00a0\u00bb radius=\u00a0\u00bb5&Prime;] Lire l&rsquo;article sur Distributique[\/su_button]<\/p>\n<div class=\"wp-block-spacer\"><\/div>\n<h2>Articles Cybers\u00e9curit\u00e9 \u00e0 lire : Cybers\u00e9curit\u00e9 et intelligence artificielle <\/h2>\n<p>Objets connect\u00e9s, cloud, reconnaissance faciale,\u00a0etc., les innovations technologiques ont permis d\u2019accomplir d\u2019\u00e9normes progr\u00e8s  dans les syst\u00e8mes informatiques et les r\u00e9seaux, notamment pour les arm\u00e9es. Mais elles constituent \u00e9galement de nouvelles formes de menaces. Dans ce contexte, l\u2019intelligence artificielle s\u2019impose d\u2019abord comme une solution viable et p\u00e9renne, mais pourrait \u00e9galement devenir une source de probl\u00e8mes. <\/p>\n<p>[su_button url=\u00a0\u00bb https:\/\/www.areion24.news\/2020\/06\/15\/cybersecurite-et-intelligence-artificielle\/\u00a0\u00bb target=\u00a0\u00bbblank\u00a0\u00bb style=\u00a0\u00bbflat\u00a0\u00bb background=\u00a0\u00bb#CF3347&Prime; color=\u00a0\u00bb#ffffff\u00a0\u00bb size=\u00a0\u00bb10&Prime; center=\u00a0\u00bbyes\u00a0\u00bb radius=\u00a0\u00bb5&Prime;] Lire l&rsquo;article sur IT Social [\/su_button]<\/p>\n<div class=\"wp-block-spacer\"><\/div>\n<h2 class=\"has-primary-color has-text-color\">Articles Cybers\u00e9curit\u00e9 \u00e0 lire : La cybers\u00e9curit\u00e9 de la CIA mise au pilori <\/h2>\n<p>Un rapport d&rsquo;\u00e9valuation de la CIA, sur la fuite d&rsquo;informations sans pr\u00e9c\u00e9dent\u00a0et les outils de hacking qui ont frapp\u00e9 l&rsquo;agence de renseignement am\u00e9ricaine en\u00a02016, montre d&rsquo;importantes failles en mati\u00e8re de protection et de cybers\u00e9curit\u00e9 chez cette derni\u00e8re. <\/p>\n<p>[su_button url=\u00a0\u00bb https:\/\/www.lemondeinformatique.fr\/actualites\/lire-la-cybersecurite-de-la-cia-mis-au-pilori-79460.html\u00a0\u00bb target=\u00a0\u00bbblank\u00a0\u00bb style=\u00a0\u00bbflat\u00a0\u00bb background=\u00a0\u00bb#CF3347&Prime; color=\u00a0\u00bb#ffffff\u00a0\u00bb size=\u00a0\u00bb10&Prime; center=\u00a0\u00bbyes\u00a0\u00bb radius=\u00a0\u00bb5&Prime;] Lire l&rsquo;article sur LeMondeInformatique.fr[\/su_button]<\/p>\n<div class=\"wp-block-spacer\"><\/div>\n<p>Vous \u00eates freelance IT et vous recherchez une mission ? Club Freelance vous accompagne pendant cette crise et vous aide \u00e0 pr\u00e9parer la suite. <\/p>\n<div class=\"wp-block-button aligncenter is-style-fill\"><a class=\"wp-block-button__link\" href=\"https:\/\/mindquest.io\/signup?type=consultant\">Rejoindre le club<\/a><\/div>\n<div class=\"wp-block-spacer\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>La cybers\u00e9curit\u00e9 est un sujet qui vous int\u00e9resse ? Club Freelance a s\u00e9lectionn\u00e9 les meilleurs articles Cybers\u00e9curit\u00e9 \u00e0 lire cette semaine.<\/p>\n","protected":false},"author":3,"featured_media":13807,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[521,517,490],"tags":[85,159,201,38,341,250,29],"class_list":["post-13756","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurite","category-revues-presse","category-webinars-ressources","tag-articles","tag-cyberattaque","tag-cybercriminalite","tag-cybersecurite","tag-expert-cybersecurite","tag-news","tag-revue-de-presse"],"acf":{"download_link":"","featured_image_2":13777,"related_posts":[12988,12166,12413],"meta_keys":"cybers\u00e9curit\u00e9 ","meta_description":"La cybers\u00e9curit\u00e9 est un sujet qui vous int\u00e9resse ? Mindquest Connect vous a s\u00e9lectionn\u00e9 les meilleurs articles Cybers\u00e9curit\u00e9 \u00e0 lire.","meta_question":"","meta_response":""},"_links":{"self":[{"href":"https:\/\/wp.mindquest.io\/index.php?rest_route=\/wp\/v2\/posts\/13756","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wp.mindquest.io\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wp.mindquest.io\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wp.mindquest.io\/index.php?rest_route=\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/wp.mindquest.io\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=13756"}],"version-history":[{"count":18,"href":"https:\/\/wp.mindquest.io\/index.php?rest_route=\/wp\/v2\/posts\/13756\/revisions"}],"predecessor-version":[{"id":27881,"href":"https:\/\/wp.mindquest.io\/index.php?rest_route=\/wp\/v2\/posts\/13756\/revisions\/27881"}],"acf:post":[{"embeddable":true,"href":"https:\/\/wp.mindquest.io\/index.php?rest_route=\/wp\/v2\/posts\/12413"},{"embeddable":true,"href":"https:\/\/wp.mindquest.io\/index.php?rest_route=\/wp\/v2\/posts\/12166"},{"embeddable":true,"href":"https:\/\/wp.mindquest.io\/index.php?rest_route=\/wp\/v2\/posts\/12988"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/wp.mindquest.io\/index.php?rest_route=\/wp\/v2\/media\/13807"}],"wp:attachment":[{"href":"https:\/\/wp.mindquest.io\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=13756"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wp.mindquest.io\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=13756"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wp.mindquest.io\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=13756"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}