{"id":15494,"date":"2021-03-19T10:08:04","date_gmt":"2021-03-19T09:08:04","guid":{"rendered":"https:\/\/wp.club-freelance.com\/?p=15494"},"modified":"2025-03-20T13:28:03","modified_gmt":"2025-03-20T12:28:03","slug":"cybersecurite-les-articles-a-lire-cette-semaine","status":"publish","type":"post","link":"https:\/\/wp.mindquest.io\/?p=15494","title":{"rendered":"Cybers\u00e9curit\u00e9 : les articles \u00e0 lire cette semaine"},"content":{"rendered":"<p>La cybers\u00e9curit\u00e9 est un sujet qui vous int\u00e9resse ? Club Freelance a s\u00e9lectionn\u00e9 les meilleurs articles d&rsquo;actualit\u00e9 pour vous aider dans votre veille strat\u00e9gique !<\/p>\n<div class=\"wp-block-spacer\"><\/div>\n<h2>Quelles sont les nouvelles cyber-menaces et comment s\u2019en prot\u00e9ger ?<\/h2>\n<p>Avec la pand\u00e9mie de COVID-19, de nouvelles menaces informatiques et de nombreux malwares ont vu le jour en 2020. Exploitant la peur des gens et profitant du d\u00e9ploiement de nombreuses applications pour le distanciel et les divertissements en ligne, ces cyber-menaces ont vu leur nombre s\u2019accro\u00eetre de mani\u00e8re exponentielle en 2020.<\/p>\n<p>[su_button url=\u00a0\u00bb https:\/\/www.futura-sciences.com\/tech\/questions-reponses\/cybersecurite-sont-nouvelles-cyber-menaces-proteger-15252\/ \u00a0\u00bb target=\u00a0\u00bbblank\u00a0\u00bb style=\u00a0\u00bbflat\u00a0\u00bb size=\u00a0\u00bb10 100px\u00a0\u00bb background=\u00a0\u00bb#CF3347&Prime; color=\u00a0\u00bb#ffffff\u00a0\u00bb center=\u00a0\u00bbyes\u00a0\u00bb radius=\u00a0\u00bb5&Prime; text-align=\u00a0\u00bbcenter\u00a0\u00bb]Lire l&rsquo;article sur Futura Tech[\/su_button]    <\/p>\n<div class=\"wp-block-spacer\"><\/div>\n<h2>Une \u00e9tude de SailPoint r\u00e9v\u00e8le que 100 % des entreprises interrog\u00e9es ont subi une attaque par usurpation d\u2019identit\u00e9 en 2020<\/h2>\n<p>La personne avec laquelle vous \u00e9changez n\u2019est pas celle que vous croyez. D\u2019apr\u00e8s une \u00e9tude de SailPoint (Protecting Digital Identity from Cyber Compromise), r\u00e9alis\u00e9e aupr\u00e8s de responsables informatiques et de la s\u00e9curit\u00e9, toutes les personnes interrog\u00e9es (100 %) ont confirm\u00e9 que leur organisation a subi une attaque par usurpation d\u2019identit\u00e9 au cours de l\u2019ann\u00e9e pass\u00e9e.<\/p>\n<p>[su_button url=\u00a0\u00bb https:\/\/itsocial.fr\/actualites\/etude\/une-etude-de-sailpoint-revele-que-100-des-entreprises-interrogees-ont-subi-une-attaque-par-usurpation-didentite-en-2020\/ \u00a0\u00bb target=\u00a0\u00bbblank\u00a0\u00bb style=\u00a0\u00bbflat\u00a0\u00bb size=\u00a0\u00bb10 100px\u00a0\u00bb background=\u00a0\u00bb#CF3347&Prime; color=\u00a0\u00bb#ffffff\u00a0\u00bb center=\u00a0\u00bbyes\u00a0\u00bb radius=\u00a0\u00bb5&Prime; text-align=\u00a0\u00bbcenter\u00a0\u00bb] Lire l&rsquo;article IT Social[\/su_button] <\/p>\n<div class=\"wp-block-spacer\"><\/div>\n<h2>Multiplication des cyberattaques : la s\u00e9curit\u00e9 du num\u00e9rique en question<\/h2>\n<p>Les attaques informatiques spectaculaires r\u00e9v\u00e9l\u00e9es ces derniers mois doivent provoquer un sursaut des entreprises et des pouvoirs publics pour endiguer une ins\u00e9curit\u00e9 num\u00e9rique de plus en plus flagrante, estiment des acteurs du monde de l&rsquo;informatique.<\/p>\n<p>[su_button url=\u00a0\u00bb https:\/\/www.lefigaro.fr\/flash-eco\/multiplication-des-cyberattaques-la-securite-du-numerique-en-question-20210318 \u00a0\u00bb target=\u00a0\u00bbblank\u00a0\u00bb style=\u00a0\u00bbflat\u00a0\u00bb size=\u00a0\u00bb10 100px\u00a0\u00bb background=\u00a0\u00bb#CF3347&Prime; color=\u00a0\u00bb#ffffff\u00a0\u00bb center=\u00a0\u00bbyes\u00a0\u00bb radius=\u00a0\u00bb5&Prime; text-align=\u00a0\u00bbcenter\u00a0\u00bb]Lire l&rsquo;article sur Le Figaro[\/su_button]  <\/p>\n<div class=\"wp-block-spacer\"><\/div>\n<h2>Cybers\u00e9curit\u00e9 : du zero trust \u00e0 l&rsquo;informatique de confiance<\/h2>\n<p>Au cours des deux derni\u00e8res ann\u00e9es, le rythme des cyberattaques s&rsquo;est fortement intensifi\u00e9. La pand\u00e9mie et le recours massif au t\u00e9l\u00e9travail ont encore accru le ph\u00e9nom\u00e8ne, comme l&rsquo;observent de nombreux experts de la cybers\u00e9curit\u00e9, soulignant en particulier la hausse des ran\u00e7ongiciels. Face \u00e0 ces menaces, quelle strat\u00e9gie adopter pour prot\u00e9ger au mieux le syst\u00e8me d&rsquo;information et les donn\u00e9es, sans pour autant entraver les utilisateurs dans leur travail quotidien ? Comment aider les RSSI et leurs \u00e9quipes \u00e0 r\u00e9pondre \u00e0 cette charge croissante ?\u00a0 <\/p>\n<p>[su_button url=\u00a0\u00bb https:\/\/www.cio-online.com\/actualites\/lire-cybersecurite-du-zero-trust-a-l-informatique-de-confiance-13018.html \u00a0\u00bb target=\u00a0\u00bbblank\u00a0\u00bb style=\u00a0\u00bbflat\u00a0\u00bb size=\u00a0\u00bb10 100px\u00a0\u00bb background=\u00a0\u00bb#CF3347&Prime; color=\u00a0\u00bb#ffffff\u00a0\u00bb center=\u00a0\u00bbyes\u00a0\u00bb radius=\u00a0\u00bb5&Prime; text-align=\u00a0\u00bbcenter\u00a0\u00bb]Lire l&rsquo;article sur CIO[\/su_button]  <\/p>\n<div class=\"wp-block-spacer\"><\/div>\n<p>D\u00e9couvrez la fiche m\u00e9tier : <a href=\"https:\/\/www.mindquest.io\/blog\/news\/10688\" target=\"_blank\">Expert Cybers\u00e9curit\u00e9<\/a><\/p>\n<div class=\"wp-block-spacer\"><\/div>\n<p><a href=\"https:\/\/mindquest.io\/signup?type=enterprise\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" width=\"1744\" height=\"610\" alt=\"\" class=\"wp-image-15146\" src=\"https:\/\/wp.mindquest.io\/wp-content\/uploads\/2021\/02\/CTA-client2.png\" srcset=\"https:\/\/wp.mindquest.io\/wp-content\/uploads\/2021\/02\/CTA-client2.png 1744w, https:\/\/wp.mindquest.io\/wp-content\/uploads\/2021\/02\/CTA-client2-300x105.png 300w, https:\/\/wp.mindquest.io\/wp-content\/uploads\/2021\/02\/CTA-client2-768x269.png 768w, https:\/\/wp.mindquest.io\/wp-content\/uploads\/2021\/02\/CTA-client2-1024x358.png 1024w, https:\/\/wp.mindquest.io\/wp-content\/uploads\/2021\/02\/CTA-client2-1536x537.png 1536w\" sizes=\"auto, (max-width: 1744px) 100vw, 1744px\" \/><\/a><\/p>\n<div class=\"wp-block-spacer\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>La cybers\u00e9curit\u00e9 est un sujet qui vous int\u00e9resse ? Club Freelance a s\u00e9lectionn\u00e9 les meilleurs articles d&rsquo;actualit\u00e9 pour vous aider dans votre veille strat\u00e9gique !<\/p>\n","protected":false},"author":3,"featured_media":15495,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[521,517,490],"tags":[159,201,38,231,182],"class_list":["post-15494","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurite","category-revues-presse","category-webinars-ressources","tag-cyberattaque","tag-cybercriminalite","tag-cybersecurite","tag-it","tag-tech"],"acf":{"download_link":"","featured_image_2":15497,"related_posts":[12413,10688,14002],"meta_keys":"cybers\u00e9curit\u00e9","meta_description":"La cybers\u00e9curit\u00e9 est un sujet qui vous int\u00e9resse ? Mindquest Connect a s\u00e9lectionn\u00e9 les meilleurs articles actuels pour vous aider dans votre veille strat\u00e9gique","meta_question":"","meta_response":""},"_links":{"self":[{"href":"https:\/\/wp.mindquest.io\/index.php?rest_route=\/wp\/v2\/posts\/15494","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wp.mindquest.io\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wp.mindquest.io\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wp.mindquest.io\/index.php?rest_route=\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/wp.mindquest.io\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=15494"}],"version-history":[{"count":6,"href":"https:\/\/wp.mindquest.io\/index.php?rest_route=\/wp\/v2\/posts\/15494\/revisions"}],"predecessor-version":[{"id":27793,"href":"https:\/\/wp.mindquest.io\/index.php?rest_route=\/wp\/v2\/posts\/15494\/revisions\/27793"}],"acf:post":[{"embeddable":true,"href":"https:\/\/wp.mindquest.io\/index.php?rest_route=\/wp\/v2\/posts\/14002"},{"embeddable":true,"href":"https:\/\/wp.mindquest.io\/index.php?rest_route=\/wp\/v2\/posts\/10688"},{"embeddable":true,"href":"https:\/\/wp.mindquest.io\/index.php?rest_route=\/wp\/v2\/posts\/12413"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/wp.mindquest.io\/index.php?rest_route=\/wp\/v2\/media\/15495"}],"wp:attachment":[{"href":"https:\/\/wp.mindquest.io\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=15494"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wp.mindquest.io\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=15494"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wp.mindquest.io\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=15494"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}