{"id":3466,"date":"2021-05-14T10:00:09","date_gmt":"2021-05-14T08:00:09","guid":{"rendered":"https:\/\/curtispc.fr\/blog\/?p=3466"},"modified":"2021-06-14T23:08:41","modified_gmt":"2021-06-14T21:08:41","slug":"voici-les-menaces-a-ne-pas-negliger","status":"publish","type":"post","link":"https:\/\/curtispc.fr\/blog\/voici-les-menaces-a-ne-pas-negliger\/","title":{"rendered":"S\u00e9curit\u00e9 Cloud: voici les menaces \u00e0 ne pas n\u00e9gliger"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"3466\" class=\"elementor elementor-3466\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"penci-section penci-disSticky penci-structure-10 elementor-section elementor-top-section elementor-element elementor-element-c6f8296 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c6f8296\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"penci-ercol-100 penci-ercol-order-1 penci-sticky-ct    elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8ecd007\" data-id=\"8ecd007\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-afb1a63 elementor-widget elementor-widget-theme-post-title elementor-page-title elementor-widget-heading\" data-id=\"afb1a63\" data-element_type=\"widget\" data-widget_type=\"theme-post-title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/curtispc.fr\/cloud\/\">S\u00e9curit\u00e9 Cloud: voici les menaces \u00e0 ne pas n\u00e9gliger<\/a><\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c1c3390 elementor-widget elementor-widget-post-info\" data-id=\"c1c3390\" data-element_type=\"widget\" data-widget_type=\"post-info.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-inline-items elementor-icon-list-items elementor-post-info\">\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-87450e9 elementor-inline-item\" itemprop=\"author\">\n\t\t\t\t\t\t<a href=\"https:\/\/curtispc.fr\/blog\/author\/curtispc\/\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t\t<img decoding=\"async\" class=\"elementor-avatar\" src=\"https:\/\/secure.gravatar.com\/avatar\/663d9ed39cf5b5548c531ba51ac4c235?s=96&amp;d=monsterid&amp;r=g\" alt=\"Picture of curtispc\" loading=\"lazy\">\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-author\">\n\t\t\t\t\t\t\t<span class=\"elementor-post-info__item-prefix\">Publi\u00e9 par<\/span>\n\t\t\t\t\t\t\t\t\t\tcurtispc\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t<\/li>\n\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-753aac4 elementor-inline-item\" itemprop=\"datePublished\">\n\t\t\t\t\t\t<a href=\"https:\/\/curtispc.fr\/blog\/2021\/05\/14\/\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-calendar\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-date\">\n\t\t\t\t\t\t\t\t\t\t<time>14\/05\/2021<\/time>\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t<\/li>\n\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-a085001 elementor-inline-item\" itemprop=\"commentCount\">\n\t\t\t\t\t\t<a href=\"https:\/\/curtispc.fr\/blog\/voici-les-menaces-a-ne-pas-negliger\/#comments\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-comments\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-comments\">\n\t\t\t\t\t\t\t\t\t\tOne Comment\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t<\/li>\n\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-d2bc84a elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-custom\">\n\t\t\t\t\t\t\t\t\t\t <div class=\"post-views content-post post-3076 entry-meta load-static\">\r\n\t\t\t\t<span class=\"post-views-icon dashicons dashicons-chart-bar\"><\/span> <span class=\"post-views-label\">Vues:<\/span> <span class=\"post-views-count\">3\u00a0079<\/span>\r\n\t\t\t<\/div>\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"penci-section penci-disSticky penci-structure-10 elementor-section elementor-top-section elementor-element elementor-element-4b72740 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4b72740\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"penci-ercol-100 penci-ercol-order-1 penci-sticky-ct    elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7c4fb02\" data-id=\"7c4fb02\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-37c4bda elementor-widget elementor-widget-text-editor\" data-id=\"37c4bda\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>L\u2019un des aspects que les fournisseurs de services de\u00a0<a href=\"http:\/\/globbsecurity.fr\/effets-positifs-cloud-computing-entreprises-42740\/\" target=\"_blank\" rel=\"noopener\">cloud computing<\/a>\u00a0ont le plus soulign\u00e9 est sans aucun doute celui de la s\u00e9curit\u00e9. Des entreprises comme Google, Amazon ou Microsoft consacrent des budgets colossaux pour assurer leurs infrastructures. Cependant, malgr\u00e9 la s\u00e9curit\u00e9 de ces syst\u00e8mes, les donn\u00e9es, applications et services qui y sont implant\u00e9s ne sont toujours pas s\u00fbrs et restent une cible tr\u00e8s int\u00e9ressante pour les pirates.<\/p><p>\u00a0<\/p><p>\u00a0<\/p><p>Donc, si vous avez une partie de votre infrastructure dans le cloud, il y a au moins\u00a0<strong>12 vuln\u00e9rabilit\u00e9s tr\u00e8s importantes \u00e0 ne pas n\u00e9gliger<\/strong>.\u00a0<\/p><p>\u00a0<\/p><p>Voici ce que dit la soi-disant\u00a0<a href=\"https:\/\/cloudsecurityalliance.org\/\" target=\"_blank\" rel=\"noopener\">Cloud Security Alliance (CSA)<\/a>, qui a publi\u00e9 son dernier rapport sur les menaces, intitul\u00e9\u00a0<a href=\"https:\/\/cloudsecurityalliance.org\/download\/top-threats-cloud-computing-plus-industry-insights\/\" target=\"_blank\" rel=\"noopener\">Treacherous 12 Top Threats to Cloud Computing Plus<\/a>.<\/p><p>\u00a0<\/p><p>Et, malgr\u00e9 les id\u00e9es pr\u00e9con\u00e7ues sur la s\u00e9curit\u00e9 dans les environnements de cloud computing,<strong>\u00a0la responsabilit\u00e9 de prot\u00e9ger les donn\u00e9es d\u2019entreprise dans le nuage n\u2019est pas du fournisseur des services cloud mais de l\u2019utilisateur.<\/strong>\u00a0<\/p><p><span style=\"font-size: inherit;\">\u00a0<\/span><\/p><p><span style=\"font-size: inherit;\">L\u2019ignorance est seulement un des probl\u00e8mes li\u00e9es au Cloud. Dans ce sens, il semble int\u00e9ressant de conna\u00eetre les contributions d\u2019experts en mati\u00e8re de technologie cloud et de s\u00e9curit\u00e9 examin\u00e9es par la CSA que, en plus, ont \u00e9t\u00e9 class\u00e9es par ordre de pertinence ou de gravit\u00e9.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"penci-section penci-disSticky penci-structure-10 elementor-section elementor-top-section elementor-element elementor-element-7e4517b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7e4517b\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"penci-ercol-100 penci-ercol-order-1 penci-sticky-ct    elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7ea878c\" data-id=\"7ea878c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-27563e3 elementor-widget elementor-widget-spacer\" data-id=\"27563e3\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-db18d8d elementor-widget elementor-widget-text-editor\" data-id=\"db18d8d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2><strong>-Violations de donn\u00e9es<\/strong><\/h2><p>Qu\u2019elle entreprise, en 2019, n\u2019a pas entendu parler de violations de donn\u00e9es\u00a0? M\u00eame les plus profanes du monde de la cybers\u00e9curit\u00e9 en ont entendu parler. Par exemple de la violation d&rsquo;Equifax qui en septembre a touch\u00e9 au moins 143 millions de personnes ordinaires. Les clouds ne sont pas \u00e0 l\u2019abri des br\u00e8ches dans leurs syst\u00e8mes&#8230;<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"penci-section penci-disSticky penci-structure-10 elementor-section elementor-top-section elementor-element elementor-element-1d379ec elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1d379ec\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"penci-ercol-100 penci-ercol-order-1 penci-sticky-ct    elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-77d7cec\" data-id=\"77d7cec\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fa512fe elementor-widget elementor-widget-spacer\" data-id=\"fa512fe\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ed8e4f8 elementor-widget elementor-widget-text-editor\" data-id=\"ed8e4f8\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2>-Gestion de l\u2019identit\u00e9 et acc\u00e8s m\u00e9diocre<\/h2><p>Les cyber-attaquants qui parviennent \u00e0 usurper l\u2019identit\u00e9 d\u2019utilisateurs l\u00e9gitimes, qu\u2019ils soient op\u00e9rateurs ou d\u00e9veloppeurs d\u2019applications, peuvent lire, modifier et supprimer des donn\u00e9es, voler des informations ou espionner, et injecter des applications ou du code malveillant qui semble provenir d\u2019un utilisateur l\u00e9gitime.\u00a0Selon CSA,\u00a0<strong>une mauvaise gestion de l\u2019identit\u00e9, des cl\u00e9s ou des informations d\u2019identification peut rendre un cyberattaquant acc\u00e8s \u00e0 l\u2019infrastructure<\/strong>\u00a0avec des r\u00e9sultats d\u00e9sastreux, telle qu\u2019on a pu voir avec l\u2019attaque \u00e0 Equifax.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"penci-section penci-disSticky penci-structure-10 elementor-section elementor-top-section elementor-element elementor-element-3eb310b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3eb310b\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"penci-ercol-100 penci-ercol-order-1 penci-sticky-ct    elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a2452fa\" data-id=\"a2452fa\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1fb1395 elementor-widget elementor-widget-spacer\" data-id=\"1fb1395\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e2e7fef elementor-widget elementor-widget-text-editor\" data-id=\"e2e7fef\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2>-API non s\u00e9curis\u00e9es<\/h2><p>Les API (<i>Application Programming Interfaces<\/i>) sont des composants logiciels importants pour les services cloud, mais elles repr\u00e9sentent une porte d&rsquo;entr\u00e9e publique pour les applications. Dans de nombreux syst\u00e8mes cloud, les API avec une adresse IP publique sont les seules facettes de la limite de s\u00e9curit\u00e9 des organisations. C\u2019est ainsi que l&rsquo;exploitation d&rsquo;une API cloud peut donner aux cyber-attaquants un acc\u00e8s consid\u00e9rable aux applications cloud.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"penci-section penci-disSticky penci-structure-10 elementor-section elementor-top-section elementor-element elementor-element-f4a809c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f4a809c\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"penci-ercol-100 penci-ercol-order-1 penci-sticky-ct    elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9722093\" data-id=\"9722093\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-30a8851 elementor-widget elementor-widget-spacer\" data-id=\"30a8851\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4c3dec5 elementor-widget elementor-widget-text-editor\" data-id=\"4c3dec5\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2>-Vuln\u00e9rabilit\u00e9s des syst\u00e8mes<\/h2><p>Les vuln\u00e9rabilit\u00e9s du syst\u00e8me sont des bugs exploitables dans les programmes que les pirates peuvent utiliser pour infiltrer un syst\u00e8me afin de voler des donn\u00e9es, prendre le contr\u00f4le ou interrompre le service.\u00a0<strong>Les vuln\u00e9rabilit\u00e9s du syst\u00e8me d\u2019exploitation mettent la s\u00e9curit\u00e9 en p\u00e9ril<\/strong>\u00a0conform\u00e9ment \u00e0 la norme CSA et le fait que les services et les applications de diff\u00e9rents clients partagent des \u00e9l\u00e9ments tels que le processeur ou la m\u00e9moire physique de l\u2019\u00e9quipement ouvre\u00a0une nouvelle surface d\u2019attaque.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"penci-section penci-disSticky penci-structure-10 elementor-section elementor-top-section elementor-element elementor-element-583d32e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"583d32e\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"penci-ercol-100 penci-ercol-order-1 penci-sticky-ct    elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3ea2265\" data-id=\"3ea2265\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-638d580 elementor-widget elementor-widget-text-editor\" data-id=\"638d580\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2>-Vol de compte<\/h2><p>Le vol de comptes ou de services n\u2019est pas nouveau, note la CSA, mais les services cloud ajoutent une nouvelle menace. Si les attaquants acc\u00e8dent aux donn\u00e9es d\u2019acc\u00e8s d\u2019un utilisateur, ils peuvent intercepter des activit\u00e9s et manipuler des donn\u00e9es, renvoyer des informations falsifi\u00e9es et rediriger les utilisateurs vers des sites trompeurs.\u00a0<strong>Avec des identifiants vol\u00e9s, les attaquants peuvent acc\u00e9der \u00e0 des zones critiques des services cloud<\/strong>\u00a0et causer des dommages importants ou effectuer des vols d\u2019informations graves.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"penci-section penci-disSticky penci-structure-10 elementor-section elementor-top-section elementor-element elementor-element-033e62a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"033e62a\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"penci-ercol-100 penci-ercol-order-1 penci-sticky-ct    elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3c08101\" data-id=\"3c08101\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-76aa866 elementor-widget elementor-widget-spacer\" data-id=\"76aa866\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ec9b9da elementor-widget elementor-widget-text-editor\" data-id=\"ec9b9da\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2>-Attaques de l\u2019int\u00e9rieur<\/h2><p>Un utilisateur malveillant, tel qu\u2019un administrateur, peut acc\u00e9der \u00e0 des informations confidentielles et avoir de plus en plus d\u2019acc\u00e8s \u00e0 des syst\u00e8mes et donn\u00e9es critiques. Selon l\u2019<a href=\"https:\/\/www.ca.com\/content\/dam\/ca\/us\/files\/ebook\/insider-threat-report.pdf\" target=\"_blank\" rel=\"noopener\">Insider Threat Report de\u00a0CA<\/a>,\u00a0<strong>90% des organisations se savent vuln\u00e9rables<\/strong>\u00a0<strong>\u00e0 des attaques internes de leurs propres employ\u00e9s<\/strong>. Ainsi, d\u2019apr\u00e8s CSA, les syst\u00e8mes qui reposent exclusivement sur des fournisseurs de services cloud pour la s\u00e9curit\u00e9 courent un risque accru. Pour \u00e9viter ces attaques, les entreprises doivent adopter des syst\u00e8mes de surveillance des utilisateurs, des syst\u00e8mes de d\u00e9tection et de pr\u00e9vention des intrusions (IDS), des syst\u00e8mes de pr\u00e9vention des pertes de donn\u00e9es (DLP Data Loss Prevention) et des syst\u00e8mes de gestion des identit\u00e9s et des acc\u00e8s.-<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"penci-section penci-disSticky penci-structure-10 elementor-section elementor-top-section elementor-element elementor-element-b3707ae elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b3707ae\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"penci-ercol-100 penci-ercol-order-1 penci-sticky-ct    elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5fb4498\" data-id=\"5fb4498\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-47824a8 elementor-widget elementor-widget-spacer\" data-id=\"47824a8\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-717c733 elementor-widget elementor-widget-text-editor\" data-id=\"717c733\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2>-Menaces persistantes avanc\u00e9es (APT)<\/h2><p>Selon CSA, les menaces persistantes avanc\u00e9es sont une forme d\u2019attaque qui infiltre et compromettre les syst\u00e8mes qui h\u00e9bergent des informations pr\u00e9cieuses, mais elles peuvent aussi s\u2019\u00e9tablir pour avoir un appui \u00e0 partir duquel voler des donn\u00e9es.\u00a0<strong>L\u2019APT poursuit ses objectifs en toute discr\u00e9tion pendant de longues p\u00e9riodes<\/strong>, en s\u2019adaptant souvent \u00e0 des mesures de s\u00e9curit\u00e9 con\u00e7ues pour d\u00e9fendre le syst\u00e8me. Le probl\u00e8me des services de cloud computing est qu\u2019une fois install\u00e9s, les attaques peuvent se d\u00e9placer lat\u00e9ralement sur les r\u00e9seaux du datacenter et se m\u00e9langer au trafic r\u00e9seau normal pour atteindre leurs objectifs.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"penci-section penci-disSticky penci-structure-10 elementor-section elementor-top-section elementor-element elementor-element-6e5f3c4 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6e5f3c4\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"penci-ercol-100 penci-ercol-order-1 penci-sticky-ct    elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9158ff8\" data-id=\"9158ff8\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b6db4cb elementor-widget elementor-widget-spacer\" data-id=\"b6db4cb\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5727f95 elementor-widget elementor-widget-text-editor\" data-id=\"5727f95\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2>-Perte de donn\u00e9es<\/h2><p>Selon CSA,\u00a0<strong>les donn\u00e9es dans le cloud peuvent \u00eatre perdues pour diff\u00e9rentes raisons<\/strong>: une suppression accidentelle par le fournisseur de services ou une catastrophe telle qu\u2019un incendie ou un tremblement de terre peuvent entra\u00eener une perte permanente de donn\u00e9es. Par cons\u00e9quent, le fournisseur et l\u2019utilisateur doivent tous les deux prendre des mesures de s\u00e9curit\u00e9 pour sauvegarder les donn\u00e9es les plus importantes.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"penci-section penci-disSticky penci-structure-10 elementor-section elementor-top-section elementor-element elementor-element-14d7613 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"14d7613\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"penci-ercol-100 penci-ercol-order-1 penci-sticky-ct    elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4af8730\" data-id=\"4af8730\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1989f80 elementor-widget elementor-widget-spacer\" data-id=\"1989f80\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e92c976 elementor-widget elementor-widget-text-editor\" data-id=\"e92c976\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2>-Analyse de risque insuffisante<\/h2><p>Lorsque les entreprises d\u00e9finissent de nouvelles strat\u00e9gies ou de nouveaux services,<strong>\u00a0il est important d\u2019\u00e9valuer les technologies utilis\u00e9es dans le cloud, d\u2019\u00e9valuer les risques et de disposer d\u2019une feuille de route<\/strong>\u00a0appropri\u00e9e et d\u2019une liste de contr\u00f4le ad\u00e9quate pour que les services ne soient pas expos\u00e9s aux attaques.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"penci-section penci-disSticky penci-structure-10 elementor-section elementor-top-section elementor-element elementor-element-0a590d7 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0a590d7\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"penci-ercol-100 penci-ercol-order-1 penci-sticky-ct    elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d89fdb1\" data-id=\"d89fdb1\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-256df36 elementor-widget elementor-widget-spacer\" data-id=\"256df36\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d008740 elementor-widget elementor-widget-text-editor\" data-id=\"d008740\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2><span class=\"td-sml-current-item-title\"><span class=\"s1\"><b>IoT non s\u00e9curis\u00e9<\/b><\/span><\/span><\/h2><p>Etrangement, l\u2019IoT est souvent oubli\u00e9 dans les articles qui \u00e9voquent la s\u00e9curit\u00e9 du cloud\u2026 Pourtant, l\u2019un ne peut aller sans l\u2019autre, et en cas d\u2019attaque \u00e0 laquelle l\u2019internet des objets sera in\u00e9vitablement soumis &#8211; ceci d\u2019autant plus que la s\u00e9curit\u00e9 est aujourd\u2019hui encore le parent pauvre des projets d\u2019objets connect\u00e9s ! &#8211; le cloud se fera le vecteur des menaces et le partenaire des botnets. L\u2019IoT est une porte ouverte vers de nombreux domaines de l\u2019entreprise, en particulier pour les donn\u00e9es priv\u00e9es et pour l\u2019industrie.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"penci-section penci-disSticky penci-structure-10 elementor-section elementor-top-section elementor-element elementor-element-ece3edf elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ece3edf\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"penci-ercol-100 penci-ercol-order-1 penci-sticky-ct    elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ec7ee78\" data-id=\"ec7ee78\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1c8c6ed elementor-widget elementor-widget-spacer\" data-id=\"1c8c6ed\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2e9e185 elementor-widget elementor-widget-text-editor\" data-id=\"2e9e185\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2>-Attaques DDoS<\/h2><p class=\"p1\"><span class=\"s1\">La commande d&rsquo;une attaque DDoS contre un service cloud est g\u00e9n\u00e9ralement effectu\u00e9e \u00e0 l&rsquo;aide d&rsquo;un service Web \u00e0 part enti\u00e8re, ce qui \u00e9limine le besoin d&rsquo;un contact direct entre l&rsquo;attaquant et le client. Elle donne \u00e9galement au cyber-attaquant le temps n\u00e9cessaire pour ex\u00e9cuter d&rsquo;autres types de cyber-attaques sans se faire prendre.<\/span><\/p><p class=\"p1\"><span class=\"s1\">\u00a0<\/span><\/p><p class=\"p1\"><span class=\"s1\">De plus, les attaques par d\u00e9ni de service (DoS) sont assez simples \u00e0 ex\u00e9cuter pour les cyber-attaquants, surtout s&rsquo;ils contr\u00f4lent un botnet. Ajoutons que DDoS-as-a-service gagne en popularit\u00e9 sur le Dark Web. Aujourd\u2019hui, les attaquants n&rsquo;ont pas besoin de savoir-faire et de leurs propres robots. Tout ce qu&rsquo;ils ont \u00e0 faire est de transf\u00e9rer une partie de leur crypto-monnaie afin d&rsquo;acheter un service Dark Web.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"penci-section penci-disSticky penci-structure-10 elementor-section elementor-top-section elementor-element elementor-element-7e9888c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7e9888c\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"penci-ercol-100 penci-ercol-order-1 penci-sticky-ct    elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-09e1d88\" data-id=\"09e1d88\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-424ba8a elementor-widget elementor-widget-spacer\" data-id=\"424ba8a\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-672b442 elementor-widget elementor-widget-text-editor\" data-id=\"672b442\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2>-Vuln\u00e9rabilit\u00e9s par des technologies partag\u00e9es<\/h2><p>Comme le souligne CSA,\u00a0<strong>les fournisseurs d\u2019infrastructure cloud offrent leurs services de mani\u00e8re \u00e9volutive<\/strong>\u00a0en partageant une infrastructure physique, des plates-formes ou des applications. Parfois, les composants de l\u2019infrastructure peuvent ne pas offrir l\u2019isolement n\u00e9cessaire pour \u00eatre utilis\u00e9s par plusieurs clients, ce qui peut entra\u00eener des vuln\u00e9rabilit\u00e9s de technologies partag\u00e9es.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"penci-section penci-disSticky penci-structure-10 elementor-section elementor-top-section elementor-element elementor-element-ce5a80b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ce5a80b\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"penci-ercol-100 penci-ercol-order-1 penci-sticky-ct    elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0d260c5\" data-id=\"0d260c5\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6a1d160 elementor-widget elementor-widget-spacer\" data-id=\"6a1d160\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-962996b elementor-blockquote--skin-border elementor-blockquote--button-color-official elementor-widget elementor-widget-blockquote\" data-id=\"962996b\" data-element_type=\"widget\" data-widget_type=\"blockquote.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<blockquote class=\"elementor-blockquote\">\n\t\t\t<p class=\"elementor-blockquote__content\">\n\t\t\t\tSi vous souhaitez nous aider, vous pouvez nous faire un don par bitcoin \u00e0 l\u2019adresse : 12J3mWpunJASd57Mjwfap4b6QvgWoCWmEq\t\t\t<\/p>\n\t\t\t\t\t\t\t<div class=\"e-q-footer\">\n\t\t\t\t\t\t\t\t\t\t\t<cite class=\"elementor-blockquote__author\">En vous remerciant d\u2019avance Curtis PC<\/cite>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/blockquote>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c474e69 elementor-widget elementor-widget-penci-text-block\" data-id=\"c474e69\" data-element_type=\"widget\" data-widget_type=\"penci-text-block.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"penci-block-vc penci-text-editor\">\n\t\t\t        <div class=\"penci-border-arrow penci-homepage-title penci-home-latest-posts style-7 pcalign-left pciconp-right pcicon-right block-title-icon-left\">\n            <h3 class=\"inner-arrow\">\n                <span>\n                    <span>Partager cet article<\/a>                <\/span>\n            <\/h3>\n\t\t\t        <\/div>\n\t\t\t\t\t<div class=\"penci-block_content\">\n\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\"><\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"penci-section penci-disSticky penci-structure-10 elementor-section elementor-top-section elementor-element elementor-element-2a8403a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2a8403a\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"penci-ercol-100 penci-ercol-order-1 penci-sticky-ct    elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9b7e2c7\" data-id=\"9b7e2c7\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0f7e28f elementor-share-buttons--view-icon elementor-share-buttons--shape-circle elementor-share-buttons--align-center elementor-share-buttons--skin-gradient elementor-grid-0 elementor-share-buttons--color-official elementor-widget elementor-widget-share-buttons\" data-id=\"0f7e28f\" data-element_type=\"widget\" data-widget_type=\"share-buttons.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-grid\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\">\n\t\t\t\t\t\t<div\n\t\t\t\t\t\t\tclass=\"elementor-share-btn elementor-share-btn_facebook\"\n\t\t\t\t\t\t\trole=\"button\"\n\t\t\t\t\t\t\ttabindex=\"0\"\n\t\t\t\t\t\t\taria-label=\"Share on facebook\"\n\t\t\t\t\t\t>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-facebook\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\">\n\t\t\t\t\t\t<div\n\t\t\t\t\t\t\tclass=\"elementor-share-btn elementor-share-btn_twitter\"\n\t\t\t\t\t\t\trole=\"button\"\n\t\t\t\t\t\t\ttabindex=\"0\"\n\t\t\t\t\t\t\taria-label=\"Share on twitter\"\n\t\t\t\t\t\t>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-twitter\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\">\n\t\t\t\t\t\t<div\n\t\t\t\t\t\t\tclass=\"elementor-share-btn elementor-share-btn_linkedin\"\n\t\t\t\t\t\t\trole=\"button\"\n\t\t\t\t\t\t\ttabindex=\"0\"\n\t\t\t\t\t\t\taria-label=\"Share on linkedin\"\n\t\t\t\t\t\t>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-linkedin\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\">\n\t\t\t\t\t\t<div\n\t\t\t\t\t\t\tclass=\"elementor-share-btn elementor-share-btn_whatsapp\"\n\t\t\t\t\t\t\trole=\"button\"\n\t\t\t\t\t\t\ttabindex=\"0\"\n\t\t\t\t\t\t\taria-label=\"Share on whatsapp\"\n\t\t\t\t\t\t>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-whatsapp\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\">\n\t\t\t\t\t\t<div\n\t\t\t\t\t\t\tclass=\"elementor-share-btn elementor-share-btn_email\"\n\t\t\t\t\t\t\trole=\"button\"\n\t\t\t\t\t\t\ttabindex=\"0\"\n\t\t\t\t\t\t\taria-label=\"Share on email\"\n\t\t\t\t\t\t>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fas fa-envelope\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"penci-section penci-disSticky penci-structure-10 elementor-section elementor-top-section elementor-element elementor-element-d71b56e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d71b56e\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"penci-ercol-100 penci-ercol-order-1 penci-sticky-ct    elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-365c50e\" data-id=\"365c50e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c714fc4 elementor-post-navigation-borders-yes elementor-widget elementor-widget-post-navigation\" data-id=\"c714fc4\" data-element_type=\"widget\" data-widget_type=\"post-navigation.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-post-navigation\">\n\t\t\t<div class=\"elementor-post-navigation__prev elementor-post-navigation__link\">\n\t\t\t\t<a href=\"https:\/\/curtispc.fr\/blog\/messagerie-securisee\/\" rel=\"prev\"><span class=\"post-navigation__arrow-wrapper post-navigation__arrow-prev\"><i class=\"fa fa-chevron-circle-left\" aria-hidden=\"true\"><\/i><span class=\"elementor-screen-only\">Prev<\/span><\/span><span class=\"elementor-post-navigation__link__prev\"><span class=\"post-navigation__prev--label\">Pr\u00e9c\u00e9dent<\/span><span class=\"post-navigation__prev--title\">Messagerie S\u00e9curis\u00e9e<\/span><\/span><\/a>\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-post-navigation__separator-wrapper\">\n\t\t\t\t\t<div class=\"elementor-post-navigation__separator\"><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"elementor-post-navigation__next elementor-post-navigation__link\">\n\t\t\t\t<a href=\"https:\/\/curtispc.fr\/blog\/boyd-%e2%80%89bring-your-own-device%e2%80%89-quelle-sont-les-risques%e2%80%89\/\" rel=\"next\"><span class=\"elementor-post-navigation__link__next\"><span class=\"post-navigation__next--label\">Suivant<\/span><span class=\"post-navigation__next--title\">Boyd \u00ab\u2009Bring your own device\u2009\u00bb quelle sont les risques\u2009?<\/span><\/span><span class=\"post-navigation__arrow-wrapper post-navigation__arrow-next\"><i class=\"fa fa-chevron-circle-right\" aria-hidden=\"true\"><\/i><span class=\"elementor-screen-only\">Next<\/span><\/span><\/a>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b186de9 elementor-widget elementor-widget-spacer\" data-id=\"b186de9\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"penci-section penci-disSticky penci-structure-10 elementor-section elementor-top-section elementor-element elementor-element-848085d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"848085d\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"penci-ercol-100 penci-ercol-order-1 penci-sticky-ct    elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-cf0e263\" data-id=\"cf0e263\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-50c34b0 elementor-headline--style-highlight elementor-widget elementor-widget-animated-headline\" data-id=\"50c34b0\" data-element_type=\"widget\" data-settings=\"{&quot;marker&quot;:&quot;double&quot;,&quot;highlighted_text&quot;:&quot;Articles Similaires&quot;,&quot;headline_style&quot;:&quot;highlight&quot;,&quot;loop&quot;:&quot;yes&quot;,&quot;highlight_animation_duration&quot;:1200,&quot;highlight_iteration_delay&quot;:8000}\" data-widget_type=\"animated-headline.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<h2 class=\"elementor-headline\">\n\t\t\t\t<span class=\"elementor-headline-dynamic-wrapper elementor-headline-text-wrapper\">\n\t\t\t\t\t<span class=\"elementor-headline-dynamic-text elementor-headline-text-active\">Articles Similaires<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<\/h2>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2fc543e elementor-widget elementor-widget-spacer\" data-id=\"2fc543e\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"penci-section penci-disSticky penci-structure-10 elementor-section elementor-top-section elementor-element elementor-element-2932f20 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2932f20\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"penci-ercol-100 penci-ercol-order-1 penci-sticky-ct    elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6a0b773\" data-id=\"6a0b773\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9d2fd96 elementor-widget elementor-widget-penci-featured-sliders\" data-id=\"9d2fd96\" data-element_type=\"widget\" data-widget_type=\"penci-featured-sliders.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"penci-block-el featured-area featured-style-23\"><div class=\"penci-owl-featured-area elsl-style-23 swiper penci-owl-carousel pcfg-slide-9d2fd96 elsl-style-23\" data-dots=\"false\" data-nav=\"true\" data-ceffect=\"swing\" data-seffect=\"creative\" data-style=\"style-23\" data-auto=\"true\" data-autotime=\"4000\" data-speed=\"600\" data-loop=\"true\"><div class=\"penci-owl-nav\"><div class=\"owl-prev\"><i class=\"penciicon-left-chevron\"><\/i><\/div><div class=\"owl-next\"><i class=\"penciicon-right-chevron\"><\/i><\/div><\/div><div class=\"swiper-wrapper\">    <div class=\"item swiper-slide\">\n        <div class=\"wrapper-item wrapper-item-classess\">\n\t\t\t                <div class=\"penci-item-mag penci-item-1 penci-pitem-big\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2024\/06\/cybert-securite-585x390.jpg\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2024\/06\/cybert-securite-585x390.jpg\"\n                           href=\"https:\/\/curtispc.fr\/blog\/la-cybersecurite-en-2024-enjeux-et-strategies-pour-un-monde-connecte\/\"\n                           title=\"La cybers\u00e9curit\u00e9 en 2024 : enjeux et strat\u00e9gies pour un monde connect\u00e9\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"La cybers\u00e9curit\u00e9 en 2024 : enjeux et strat\u00e9gies pour un monde connect\u00e9\"\n                           href=\"https:\/\/curtispc.fr\/blog\/la-cybersecurite-en-2024-enjeux-et-strategies-pour-un-monde-connecte\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"La cybers\u00e9curit\u00e9 en 2024 : enjeux et strat\u00e9gies pour un monde connect\u00e9\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/la-cybersecurite-en-2024-enjeux-et-strategies-pour-un-monde-connecte\/\">La cybers\u00e9curit\u00e9 en 2024 : enjeux et strat\u00e9gies pour un monde connect\u00e9<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                        <div class=\"feat-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                                <span class=\"feat-time\"><time class=\"entry-date published\" datetime=\"2024-06-06T09:10:40+02:00\">6 juin 2024<\/time><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                                <span class=\"feat-comments\"><a\n                                                            href=\"https:\/\/curtispc.fr\/blog\/la-cybersecurite-en-2024-enjeux-et-strategies-pour-un-monde-connecte\/#comments \">1 Commentaires<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                        <\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t\n\t\t\t\t                <div class=\"penci-item-mag penci-item-2 penci-pitem-big\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/istockphoto-832169838-612x612-1-585x390.jpg\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/istockphoto-832169838-612x612-1-585x390.jpg\"\n                           href=\"https:\/\/curtispc.fr\/blog\/lintelligence-artificielle-et-lapprentissage\/\"\n                           title=\"L&rsquo;intelligence artificielle et l&rsquo;apprentissage automatique sont les fers de lance d&rsquo;une r\u00e9volution silencieuse dans le domaine du droit\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"L&rsquo;intelligence artificielle et l&rsquo;apprentissage automatique sont les fers de lance d&rsquo;une r\u00e9volution silencieuse dans le domaine du droit\"\n                           href=\"https:\/\/curtispc.fr\/blog\/lintelligence-artificielle-et-lapprentissage\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"L&rsquo;intelligence artificielle et l&rsquo;apprentissage automatique sont les fers de lance d&rsquo;une r\u00e9volution silencieuse dans le domaine du droit\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/lintelligence-artificielle-et-lapprentissage\/\">L&rsquo;intelligence artificielle et l&rsquo;apprentissage automatique sont les fers de lance d&rsquo;une r\u00e9volution...<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                        <div class=\"feat-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                                <span class=\"feat-time\"><time class=\"entry-date published\" datetime=\"2021-06-14T10:00:34+02:00\">14 juin 2021<\/time><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                                <span class=\"feat-comments\"><a\n                                                            href=\"https:\/\/curtispc.fr\/blog\/lintelligence-artificielle-et-lapprentissage\/#comments \">2 Commentaires<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                        <\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t\n\t\t\t\t                <div class=\"penci-item-mag penci-item-3 penci-pitem-small\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/byod_risque-585x390.jpg\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/byod_risque-585x439.jpg\"\n                           href=\"https:\/\/curtispc.fr\/blog\/boyd-%e2%80%89bring-your-own-device%e2%80%89-quelle-sont-les-risques%e2%80%89\/\"\n                           title=\"Boyd \u00ab\u2009Bring your own device\u2009\u00bb quelle sont les risques\u2009?\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"Boyd \u00ab\u2009Bring your own device\u2009\u00bb quelle sont les risques\u2009?\"\n                           href=\"https:\/\/curtispc.fr\/blog\/boyd-%e2%80%89bring-your-own-device%e2%80%89-quelle-sont-les-risques%e2%80%89\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"Boyd \u00ab\u2009Bring your own device\u2009\u00bb quelle sont les risques\u2009?\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/boyd-%e2%80%89bring-your-own-device%e2%80%89-quelle-sont-les-risques%e2%80%89\/\">Boyd \u00ab\u2009Bring your own device\u2009\u00bb quelle sont les risques\u2009?<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t\n\t\t\t\t                <div class=\"penci-item-mag penci-item-4 penci-pitem-small\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/cloud-security-585x390.jpg\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/cloud-security-585x383.jpg\"\n                           href=\"https:\/\/curtispc.fr\/blog\/voici-les-menaces-a-ne-pas-negliger\/\"\n                           title=\"S\u00e9curit\u00e9 Cloud: voici les menaces \u00e0 ne pas n\u00e9gliger\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"S\u00e9curit\u00e9 Cloud: voici les menaces \u00e0 ne pas n\u00e9gliger\"\n                           href=\"https:\/\/curtispc.fr\/blog\/voici-les-menaces-a-ne-pas-negliger\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"S\u00e9curit\u00e9 Cloud: voici les menaces \u00e0 ne pas n\u00e9gliger\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/voici-les-menaces-a-ne-pas-negliger\/\">S\u00e9curit\u00e9 Cloud: voici les menaces \u00e0 ne pas n\u00e9gliger<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t\n\t\t\t\t                <div class=\"penci-item-mag penci-item-5 penci-pitem-small\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/message-messagerie-chiffre-secret-1024x576-1-585x390.jpg\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/message-messagerie-chiffre-secret-1024x576-1-585x329.jpg\"\n                           href=\"https:\/\/curtispc.fr\/blog\/messagerie-securisee\/\"\n                           title=\"Messagerie S\u00e9curis\u00e9e\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"Messagerie S\u00e9curis\u00e9e\"\n                           href=\"https:\/\/curtispc.fr\/blog\/messagerie-securisee\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"Messagerie S\u00e9curis\u00e9e\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/messagerie-securisee\/\">Messagerie S\u00e9curis\u00e9e<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t\n\t\t\t\t                <div class=\"penci-item-mag penci-item-0 penci-pitem-small\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/diffamation-professeurs-reseaux-sociaux-585x390.jpg\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/diffamation-professeurs-reseaux-sociaux-585x401.jpg\"\n                           href=\"https:\/\/curtispc.fr\/blog\/reseaux-sociaux-source-de-piratage-informatique%e2%80%89\/\"\n                           title=\"R\u00e9seaux sociaux, source de piratage informatique\u2009?\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"R\u00e9seaux sociaux, source de piratage informatique\u2009?\"\n                           href=\"https:\/\/curtispc.fr\/blog\/reseaux-sociaux-source-de-piratage-informatique%e2%80%89\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"R\u00e9seaux sociaux, source de piratage informatique\u2009?\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/reseaux-sociaux-source-de-piratage-informatique%e2%80%89\/\">R\u00e9seaux sociaux, source de piratage informatique\u2009?<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t<\/div><\/div><div class=\"item swiper-slide\"><div class=\"wrapper-item wrapper-item-classess\">\n\t\t\t\t                <div class=\"penci-item-mag penci-item-1 penci-pitem-big\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/bigstock_Cloud_Computing-585x390.png\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/bigstock_Cloud_Computing-585x329.png\"\n                           href=\"https:\/\/curtispc.fr\/blog\/cloud-donne-hors-de-controle%e2%80%89\/\"\n                           title=\"Cloud : donn\u00e9 hors de contr\u00f4le\u2009?\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"Cloud : donn\u00e9 hors de contr\u00f4le\u2009?\"\n                           href=\"https:\/\/curtispc.fr\/blog\/cloud-donne-hors-de-controle%e2%80%89\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"Cloud : donn\u00e9 hors de contr\u00f4le\u2009?\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/cloud-donne-hors-de-controle%e2%80%89\/\">Cloud : donn\u00e9 hors de contr\u00f4le\u2009?<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                        <div class=\"feat-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                                <span class=\"feat-time\"><time class=\"entry-date published\" datetime=\"2021-03-25T10:00:37+01:00\">25 mars 2021<\/time><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                                <span class=\"feat-comments\"><a\n                                                            href=\"https:\/\/curtispc.fr\/blog\/cloud-donne-hors-de-controle%e2%80%89\/#comments \">1 Commentaires<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                        <\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t\n\t\t\t\t                <div class=\"penci-item-mag penci-item-2 penci-pitem-big\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/shadow_iot-585x390.jpg\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/shadow_iot-585x390.jpg\"\n                           href=\"https:\/\/curtispc.fr\/blog\/shadow-iot-une-menace-grandissante-pour-les-entreprises\/\"\n                           title=\"Shadow IoT: une menace grandissante pour les entreprises\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"Shadow IoT: une menace grandissante pour les entreprises\"\n                           href=\"https:\/\/curtispc.fr\/blog\/shadow-iot-une-menace-grandissante-pour-les-entreprises\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"Shadow IoT: une menace grandissante pour les entreprises\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/shadow-iot-une-menace-grandissante-pour-les-entreprises\/\">Shadow IoT: une menace grandissante pour les entreprises<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                        <div class=\"feat-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                                <span class=\"feat-time\"><time class=\"entry-date published\" datetime=\"2021-03-24T09:00:16+01:00\">24 mars 2021<\/time><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                                <span class=\"feat-comments\"><a\n                                                            href=\"https:\/\/curtispc.fr\/blog\/shadow-iot-une-menace-grandissante-pour-les-entreprises\/#comments \">1 Commentaires<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                        <\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t\n\t\t\t\t                <div class=\"penci-item-mag penci-item-3 penci-pitem-small\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/10_hacker-585x390.jpg\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/10_hacker-585x390.jpg\"\n                           href=\"https:\/\/curtispc.fr\/blog\/top-10-des-hackers-les-plus-celebres\/\"\n                           title=\"TOP 10 DES HACKERS LES PLUS C\u00c9L\u00c8BRES\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"TOP 10 DES HACKERS LES PLUS C\u00c9L\u00c8BRES\"\n                           href=\"https:\/\/curtispc.fr\/blog\/top-10-des-hackers-les-plus-celebres\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"TOP 10 DES HACKERS LES PLUS C\u00c9L\u00c8BRES\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/top-10-des-hackers-les-plus-celebres\/\">TOP 10 DES HACKERS LES PLUS C\u00c9L\u00c8BRES<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t\n\t\t\t\t                <div class=\"penci-item-mag penci-item-4 penci-pitem-small\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/02\/social_engineering_2.0-585x390.jpg\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/02\/social_engineering_2.0-585x293.jpg\"\n                           href=\"https:\/\/curtispc.fr\/blog\/etes-vous-une-faille-de-securite-humaine-sur-internet-social-engineering\/\"\n                           title=\"\u00cates-vous une faille de s\u00e9curit\u00e9 humaine sur Internet ? Social engineering\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"\u00cates-vous une faille de s\u00e9curit\u00e9 humaine sur Internet ? Social engineering\"\n                           href=\"https:\/\/curtispc.fr\/blog\/etes-vous-une-faille-de-securite-humaine-sur-internet-social-engineering\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"\u00cates-vous une faille de s\u00e9curit\u00e9 humaine sur Internet ? Social engineering\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/etes-vous-une-faille-de-securite-humaine-sur-internet-social-engineering\/\">\u00cates-vous une faille de s\u00e9curit\u00e9 humaine sur Internet ? Social engineering<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t\n\t\t\t\t                <div class=\"penci-item-mag penci-item-5 penci-pitem-small\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/menace_2020.jpg\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/menace_2020.jpg\"\n                           href=\"https:\/\/curtispc.fr\/blog\/previsions-2020-de-mcafee-labs-sur-les-menaces-de-cybersecurite\/\"\n                           title=\"Pr\u00e9visions 2020 de McAfee Labs sur les menaces de cybers\u00e9curit\u00e9\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"Pr\u00e9visions 2020 de McAfee Labs sur les menaces de cybers\u00e9curit\u00e9\"\n                           href=\"https:\/\/curtispc.fr\/blog\/previsions-2020-de-mcafee-labs-sur-les-menaces-de-cybersecurite\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"Pr\u00e9visions 2020 de McAfee Labs sur les menaces de cybers\u00e9curit\u00e9\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/previsions-2020-de-mcafee-labs-sur-les-menaces-de-cybersecurite\/\">Pr\u00e9visions 2020 de McAfee Labs sur les menaces de cybers\u00e9curit\u00e9<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t\n\t\t\t\t                <div class=\"penci-item-mag penci-item-0 penci-pitem-small\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/02\/algorithme-585x390.jpg\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/02\/algorithme-585x329.jpg\"\n                           href=\"https:\/\/curtispc.fr\/blog\/top-10-des-algorithmes-que-chaque-programmeur-devrait-connaitre\/\"\n                           title=\"Top 10 des algorithmes que chaque programmeur devrait conna\u00eetre\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"Top 10 des algorithmes que chaque programmeur devrait conna\u00eetre\"\n                           href=\"https:\/\/curtispc.fr\/blog\/top-10-des-algorithmes-que-chaque-programmeur-devrait-connaitre\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"Top 10 des algorithmes que chaque programmeur devrait conna\u00eetre\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/top-10-des-algorithmes-que-chaque-programmeur-devrait-connaitre\/\">Top 10 des algorithmes que chaque programmeur devrait conna\u00eetre<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t<\/div><\/div><div class=\"item swiper-slide\"><div class=\"wrapper-item wrapper-item-classess\">\n\t\t\t\t                <div class=\"penci-item-mag penci-item-1 penci-pitem-big\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/security-4851428_960_720-585x390.jpg\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/security-4851428_960_720-585x366.jpg\"\n                           href=\"https:\/\/curtispc.fr\/blog\/mise-en-garde-contre-les-menaces-qui-existent-sur-le-web\/\"\n                           title=\"Mise en garde contre les menaces qui existent sur le web\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"Mise en garde contre les menaces qui existent sur le web\"\n                           href=\"https:\/\/curtispc.fr\/blog\/mise-en-garde-contre-les-menaces-qui-existent-sur-le-web\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"Mise en garde contre les menaces qui existent sur le web\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/mise-en-garde-contre-les-menaces-qui-existent-sur-le-web\/\">Mise en garde contre les menaces qui existent sur le web<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                        <div class=\"feat-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                                <span class=\"feat-time\"><time class=\"entry-date published\" datetime=\"2020-02-18T16:00:13+01:00\">18 f\u00e9vrier 2020<\/time><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                                <span class=\"feat-comments\"><a\n                                                            href=\"https:\/\/curtispc.fr\/blog\/mise-en-garde-contre-les-menaces-qui-existent-sur-le-web\/#comments \">2 Commentaires<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                        <\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t\n\t\t\t\t                <div class=\"penci-item-mag penci-item-2 penci-pitem-big\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/malware_mobile-585x390.jpg\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/malware_mobile-585x329.jpg\"\n                           href=\"https:\/\/curtispc.fr\/blog\/des-pirates-utilisant-des-applications-mobiles-cachees-des-identifiants-de-connexion-tiers-et-des-videos-de-jeu-contrefaites-pour-cibler-les-consommateurs\/\"\n                           title=\"Des pirates utilisant des applications mobiles cach\u00e9es, des identifiants de connexion tiers et des vid\u00e9os de jeu contrefaites pour cibler les consommateurs\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"Des pirates utilisant des applications mobiles cach\u00e9es, des identifiants de connexion tiers et des vid\u00e9os de jeu contrefaites pour cibler les consommateurs\"\n                           href=\"https:\/\/curtispc.fr\/blog\/des-pirates-utilisant-des-applications-mobiles-cachees-des-identifiants-de-connexion-tiers-et-des-videos-de-jeu-contrefaites-pour-cibler-les-consommateurs\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"Des pirates utilisant des applications mobiles cach\u00e9es, des identifiants de connexion tiers et des vid\u00e9os de jeu contrefaites pour cibler les consommateurs\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/des-pirates-utilisant-des-applications-mobiles-cachees-des-identifiants-de-connexion-tiers-et-des-videos-de-jeu-contrefaites-pour-cibler-les-consommateurs\/\">Des pirates utilisant des applications mobiles cach\u00e9es, des identifiants de connexion tiers...<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                        <div class=\"feat-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                                <span class=\"feat-time\"><time class=\"entry-date published\" datetime=\"2020-02-15T10:00:09+01:00\">15 f\u00e9vrier 2020<\/time><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                                <span class=\"feat-comments\"><a\n                                                            href=\"https:\/\/curtispc.fr\/blog\/des-pirates-utilisant-des-applications-mobiles-cachees-des-identifiants-de-connexion-tiers-et-des-videos-de-jeu-contrefaites-pour-cibler-les-consommateurs\/#comments \">1 Commentaires<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                        <\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t\n\t\t\t\t                <div class=\"penci-item-mag penci-item-3 penci-pitem-small\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/02\/security-password-585x390.jpg\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/02\/security-password-585x390.jpg\"\n                           href=\"https:\/\/curtispc.fr\/blog\/authentification-par-mot-de-passe\/\"\n                           title=\"Authentification par mot de passe\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"Authentification par mot de passe\"\n                           href=\"https:\/\/curtispc.fr\/blog\/authentification-par-mot-de-passe\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"Authentification par mot de passe\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/authentification-par-mot-de-passe\/\">Authentification par mot de passe<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t\n\t\t\t\t                <div class=\"penci-item-mag penci-item-4 penci-pitem-small\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/pirate_informatique-585x390.jpg\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/pirate_informatique-585x322.jpg\"\n                           href=\"https:\/\/curtispc.fr\/blog\/piratage-informatique\/\"\n                           title=\"Piratage informatique des PME et ETI\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"Piratage informatique des PME et ETI\"\n                           href=\"https:\/\/curtispc.fr\/blog\/piratage-informatique\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"Piratage informatique des PME et ETI\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/piratage-informatique\/\">Piratage informatique des PME et ETI<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t\n\t\t\t\t                <div class=\"penci-item-mag penci-item-5 penci-pitem-small\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/malware_window-2.jpg\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/malware_window-2.jpg\"\n                           href=\"https:\/\/curtispc.fr\/blog\/definition-dun-logiciel-malveillant-en-informatique-malware\/\"\n                           title=\"D\u00e9finition d\u2019un logiciel malveillant en informatique (Malware)\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"D\u00e9finition d\u2019un logiciel malveillant en informatique (Malware)\"\n                           href=\"https:\/\/curtispc.fr\/blog\/definition-dun-logiciel-malveillant-en-informatique-malware\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"D\u00e9finition d\u2019un logiciel malveillant en informatique (Malware)\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/definition-dun-logiciel-malveillant-en-informatique-malware\/\">D\u00e9finition d\u2019un logiciel malveillant en informatique (Malware)<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t\n\t\t\t\t                <div class=\"penci-item-mag penci-item-0 penci-pitem-small\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/01\/protection-employe-585x390.jpg\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/01\/protection-employe-585x390.jpg\"\n                           href=\"https:\/\/curtispc.fr\/blog\/comment-proteger-vos-employes-contre-les-pirates-informatiques\/\"\n                           title=\"Comment prot\u00e9ger vos employ\u00e9s contre les pirates informatiques ?\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"Comment prot\u00e9ger vos employ\u00e9s contre les pirates informatiques ?\"\n                           href=\"https:\/\/curtispc.fr\/blog\/comment-proteger-vos-employes-contre-les-pirates-informatiques\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"Comment prot\u00e9ger vos employ\u00e9s contre les pirates informatiques ?\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/comment-proteger-vos-employes-contre-les-pirates-informatiques\/\">Comment prot\u00e9ger vos employ\u00e9s contre les pirates informatiques ?<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t\n\t\t\t\t        <\/div>\n    <\/div>\n<\/div><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-eb4006e elementor-widget elementor-widget-spacer\" data-id=\"eb4006e\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"penci-section penci-disSticky penci-structure-10 elementor-section elementor-top-section elementor-element elementor-element-cc2256e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"cc2256e\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"penci-ercol-100 penci-ercol-order-1 penci-sticky-ct    elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-70d5c9c\" data-id=\"70d5c9c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9f9d352 elementor-widget elementor-widget-spacer\" data-id=\"9f9d352\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>L\u2019un des aspects que les fournisseurs de services de\u00a0cloud computing\u00a0ont le plus soulign\u00e9 est sans aucun doute celui de la s\u00e9curit\u00e9. Des entreprises comme Google, Amazon ou Microsoft consacrent des&hellip;<\/p>\n","protected":false},"author":1,"featured_media":3481,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[28],"tags":[46],"class_list":["post-3466","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-securite-informatique","tag-cyber-securite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>S\u00e9curit\u00e9 Cloud: voici les menaces \u00e0 ne pas n\u00e9gliger<\/title>\n<meta name=\"description\" content=\"L\u2019un des aspects que les fournisseurs de services de cloud computing ont le plus soulign\u00e9 est sans aucun doute celui de la s\u00e9curit\u00e9.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/curtispc.fr\/blog\/voici-les-menaces-a-ne-pas-negliger\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"S\u00e9curit\u00e9 Cloud: voici les menaces \u00e0 ne pas n\u00e9gliger\" \/>\n<meta property=\"og:description\" content=\"L\u2019un des aspects que les fournisseurs de services de cloud computing ont le plus soulign\u00e9 est sans aucun doute celui de la s\u00e9curit\u00e9.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/curtispc.fr\/blog\/voici-les-menaces-a-ne-pas-negliger\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog | Curtis PC 2025\" \/>\n<meta property=\"article:published_time\" content=\"2021-05-14T08:00:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-06-14T21:08:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/cloud-security.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"419\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"curtispc\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@curtispcfr\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"curtispc\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/curtispc.fr\/blog\/voici-les-menaces-a-ne-pas-negliger\/\",\"url\":\"https:\/\/curtispc.fr\/blog\/voici-les-menaces-a-ne-pas-negliger\/\",\"name\":\"S\u00e9curit\u00e9 Cloud: voici les menaces \u00e0 ne pas n\u00e9gliger\",\"isPartOf\":{\"@id\":\"https:\/\/curtispc.fr\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/curtispc.fr\/blog\/voici-les-menaces-a-ne-pas-negliger\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/curtispc.fr\/blog\/voici-les-menaces-a-ne-pas-negliger\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/cloud-security.jpg\",\"datePublished\":\"2021-05-14T08:00:09+00:00\",\"dateModified\":\"2021-06-14T21:08:41+00:00\",\"author\":{\"@id\":\"https:\/\/curtispc.fr\/blog\/#\/schema\/person\/751262d339812b9e62cb0d1dc09c5653\"},\"description\":\"L\u2019un des aspects que les fournisseurs de services de cloud computing ont le plus soulign\u00e9 est sans aucun doute celui de la s\u00e9curit\u00e9.\",\"breadcrumb\":{\"@id\":\"https:\/\/curtispc.fr\/blog\/voici-les-menaces-a-ne-pas-negliger\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/curtispc.fr\/blog\/voici-les-menaces-a-ne-pas-negliger\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/curtispc.fr\/blog\/voici-les-menaces-a-ne-pas-negliger\/#primaryimage\",\"url\":\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/cloud-security.jpg\",\"contentUrl\":\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/cloud-security.jpg\",\"width\":640,\"height\":419,\"caption\":\"cloud security\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/curtispc.fr\/blog\/voici-les-menaces-a-ne-pas-negliger\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/curtispc.fr\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"S\u00e9curit\u00e9 Cloud: voici les menaces \u00e0 ne pas n\u00e9gliger\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/curtispc.fr\/blog\/#website\",\"url\":\"https:\/\/curtispc.fr\/blog\/\",\"name\":\"Blog | Curtis PC 2025\",\"description\":\"Pour une vie num\u00e9rique plus simple\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/curtispc.fr\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/curtispc.fr\/blog\/#\/schema\/person\/751262d339812b9e62cb0d1dc09c5653\",\"name\":\"curtispc\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/curtispc.fr\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/663d9ed39cf5b5548c531ba51ac4c235?s=96&d=monsterid&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/663d9ed39cf5b5548c531ba51ac4c235?s=96&d=monsterid&r=g\",\"caption\":\"curtispc\"},\"sameAs\":[\"https:\/\/www.curtispc.fr\/\",\"https:\/\/x.com\/curtispcfr\"],\"url\":\"https:\/\/curtispc.fr\/blog\/author\/curtispc\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"S\u00e9curit\u00e9 Cloud: voici les menaces \u00e0 ne pas n\u00e9gliger","description":"L\u2019un des aspects que les fournisseurs de services de cloud computing ont le plus soulign\u00e9 est sans aucun doute celui de la s\u00e9curit\u00e9.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/curtispc.fr\/blog\/voici-les-menaces-a-ne-pas-negliger\/","og_locale":"fr_FR","og_type":"article","og_title":"S\u00e9curit\u00e9 Cloud: voici les menaces \u00e0 ne pas n\u00e9gliger","og_description":"L\u2019un des aspects que les fournisseurs de services de cloud computing ont le plus soulign\u00e9 est sans aucun doute celui de la s\u00e9curit\u00e9.","og_url":"https:\/\/curtispc.fr\/blog\/voici-les-menaces-a-ne-pas-negliger\/","og_site_name":"Blog | Curtis PC 2025","article_published_time":"2021-05-14T08:00:09+00:00","article_modified_time":"2021-06-14T21:08:41+00:00","og_image":[{"width":640,"height":419,"url":"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/cloud-security.jpg","type":"image\/jpeg"}],"author":"curtispc","twitter_card":"summary_large_image","twitter_creator":"@curtispcfr","twitter_misc":{"\u00c9crit par":"curtispc","Dur\u00e9e de lecture estim\u00e9e":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/curtispc.fr\/blog\/voici-les-menaces-a-ne-pas-negliger\/","url":"https:\/\/curtispc.fr\/blog\/voici-les-menaces-a-ne-pas-negliger\/","name":"S\u00e9curit\u00e9 Cloud: voici les menaces \u00e0 ne pas n\u00e9gliger","isPartOf":{"@id":"https:\/\/curtispc.fr\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/curtispc.fr\/blog\/voici-les-menaces-a-ne-pas-negliger\/#primaryimage"},"image":{"@id":"https:\/\/curtispc.fr\/blog\/voici-les-menaces-a-ne-pas-negliger\/#primaryimage"},"thumbnailUrl":"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/cloud-security.jpg","datePublished":"2021-05-14T08:00:09+00:00","dateModified":"2021-06-14T21:08:41+00:00","author":{"@id":"https:\/\/curtispc.fr\/blog\/#\/schema\/person\/751262d339812b9e62cb0d1dc09c5653"},"description":"L\u2019un des aspects que les fournisseurs de services de cloud computing ont le plus soulign\u00e9 est sans aucun doute celui de la s\u00e9curit\u00e9.","breadcrumb":{"@id":"https:\/\/curtispc.fr\/blog\/voici-les-menaces-a-ne-pas-negliger\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/curtispc.fr\/blog\/voici-les-menaces-a-ne-pas-negliger\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/curtispc.fr\/blog\/voici-les-menaces-a-ne-pas-negliger\/#primaryimage","url":"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/cloud-security.jpg","contentUrl":"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/cloud-security.jpg","width":640,"height":419,"caption":"cloud security"},{"@type":"BreadcrumbList","@id":"https:\/\/curtispc.fr\/blog\/voici-les-menaces-a-ne-pas-negliger\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/curtispc.fr\/blog\/"},{"@type":"ListItem","position":2,"name":"S\u00e9curit\u00e9 Cloud: voici les menaces \u00e0 ne pas n\u00e9gliger"}]},{"@type":"WebSite","@id":"https:\/\/curtispc.fr\/blog\/#website","url":"https:\/\/curtispc.fr\/blog\/","name":"Blog | Curtis PC 2025","description":"Pour une vie num\u00e9rique plus simple","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/curtispc.fr\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/curtispc.fr\/blog\/#\/schema\/person\/751262d339812b9e62cb0d1dc09c5653","name":"curtispc","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/curtispc.fr\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/663d9ed39cf5b5548c531ba51ac4c235?s=96&d=monsterid&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/663d9ed39cf5b5548c531ba51ac4c235?s=96&d=monsterid&r=g","caption":"curtispc"},"sameAs":["https:\/\/www.curtispc.fr\/","https:\/\/x.com\/curtispcfr"],"url":"https:\/\/curtispc.fr\/blog\/author\/curtispc\/"}]}},"_links":{"self":[{"href":"https:\/\/curtispc.fr\/blog\/wp-json\/wp\/v2\/posts\/3466","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/curtispc.fr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/curtispc.fr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/curtispc.fr\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/curtispc.fr\/blog\/wp-json\/wp\/v2\/comments?post=3466"}],"version-history":[{"count":13,"href":"https:\/\/curtispc.fr\/blog\/wp-json\/wp\/v2\/posts\/3466\/revisions"}],"predecessor-version":[{"id":3696,"href":"https:\/\/curtispc.fr\/blog\/wp-json\/wp\/v2\/posts\/3466\/revisions\/3696"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/curtispc.fr\/blog\/wp-json\/wp\/v2\/media\/3481"}],"wp:attachment":[{"href":"https:\/\/curtispc.fr\/blog\/wp-json\/wp\/v2\/media?parent=3466"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/curtispc.fr\/blog\/wp-json\/wp\/v2\/categories?post=3466"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/curtispc.fr\/blog\/wp-json\/wp\/v2\/tags?post=3466"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}