{"id":148917,"date":"2019-07-15T07:00:22","date_gmt":"2019-07-15T06:00:22","guid":{"rendered":"https:\/\/www.stormshield.com\/?p=148917"},"modified":"2024-03-22T15:25:54","modified_gmt":"2024-03-22T14:25:54","slug":"cybersecurite-quelle-retrospective-depuis-debut-2019","status":"publish","type":"post","link":"https:\/\/www.stormshield.com\/fr\/actus\/cybersecurite-quelle-retrospective-depuis-debut-2019\/","title":{"rendered":"Cybers\u00e9curit\u00e9 : quelle r\u00e9trospective depuis d\u00e9but 2019&nbsp;?"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-148919 size-full\" title=\"Image utilis\u00e9e sous licence de Shutterstock.com\" src=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_449555950-e1618483146647.jpg\" alt=\"Tendances cybers\u00e9curit\u00e9, une r\u00e9trospective du d\u00e9but 2019 | Stormshield \" width=\"800\" height=\"534\" \/><\/p>\n<p><strong>Depuis six mois, l\u2019actualit\u00e9 cyber fait le grand \u00e9cart entre arnaques aux faux supports techniques et cyberattaques \u00e0 l\u2019encontre d\u2019un pays. Pour y voir plus clair, voici une r\u00e9trospective des six premiers mois de l\u2019ann\u00e9e et des grandes tendances qui se profilent.<\/strong><\/p>\n<p>En mati\u00e8re de tendances de cybers\u00e9curit\u00e9, il est de coutume de se lancer en fin ou en d\u00e9but d\u2019ann\u00e9e sur des projections pour l\u2019ann\u00e9e \u00e0 venir \u2013 issues des signaux faibles, des derni\u00e8res analyses du secteur ainsi que des convictions de nos experts. Sur les quatre tendances que nous avions imagin\u00e9es, trois se sont d\u00e9j\u00e0 r\u00e9alis\u00e9es...<\/p>\n<p>&nbsp;<\/p>\n<h2>La cybercriminalit\u00e9, nouveau fait divers de soci\u00e9t\u00e9<\/h2>\n<p><strong>Une projection Stormshield : \u2714\ufe0f<\/strong><\/p>\n<p>La cyber d\u00e9linquance s\u2019infiltre \u00e0 vitesse grand V dans un quotidien de plus en plus num\u00e9rique. \u00ab\u00a0Aujourd\u2019hui, chaque tendance sociale, \u00e9conomique va devenir une cible pour les cyberattaquants\u00a0\u00bb, estime <strong>Matthieu Bonenfant,<\/strong> Directeur Marketing de Stormshield.<\/p>\n<p>Les derni\u00e8res actualit\u00e9s lui donnent raison. \u00c0 Lille, des \u00e9tudiants en \u00e9cole d\u2019ing\u00e9nieurs <a href=\"https:\/\/www.lavoixdunord.fr\/595406\/article\/2019-06-07\/ilevia-victime-d-une-cyberattaque-des-dizaines-de-cartes-pass-pass-chargees-et\" target=\"_blank\" rel=\"noopener noreferrer\">ont vendu sur Snapchat des cartes de transports pirat\u00e9es<\/a> et cr\u00e9dit\u00e9es de 200 \u00e0 300 voyages. Du c\u00f4t\u00e9 de Lyon, des entrepreneurs rhodaniens ont utilis\u00e9 le principe de l\u2019arnaque au faux support technique pour gagner plus de 2 millions d\u2019euros. Un ph\u00e9nom\u00e8ne en pleine explosion, \u00e0 retrouver dans <a href=\"https:\/\/www.cybermalveillance.gouv.fr\/contenus-de-sensibilisation\/\" target=\"_blank\" rel=\"noopener noreferrer\">le second volet du kit de sensibilisation de Cybermalveillance.gouv<\/a>. Enfin, en Su\u00e8de, des jeunes fans du chanteur PewDiePie ont lanc\u00e9 <a href=\"https:\/\/www.clubic.com\/antivirus-securite-informatique\/virus-hacker-piratage\/malware-logiciel-malveillant\/actualite-852748-fans-pewdiepie-creent-ransomwares-aider-youtuber.html\" target=\"_blank\" rel=\"noopener noreferrer\">deux ransomwares pour soutenir la cha\u00eene YouTube<\/a> du vid\u00e9aste su\u00e9dois en obligeant les victimes \u00e0 s\u2019y abonner\u2026<\/p>\n<p>[vc_row][vc_column width='1\/6'][\/vc_column][vc_column width='2\/3']<\/p>\n<blockquote class=\"twitter-tweet\" data-lang=\"fr\">\n<p dir=\"ltr\" lang=\"fr\">Un ransomware bloque vos fichiers tant que PewDiePie n'a pas atteint 100 millions d'abonn\u00e9s sur sa cha\u00eene Youtube.<\/p>\n<p>On n'est pas bien, l\u00e0? <a href=\"https:\/\/t.co\/mggPZADB2H\">https:\/\/t.co\/mggPZADB2H<\/a><\/p>\n<p>\u2014 Ivan Gaud\u00e9 (@IvanLeFou) <a href=\"https:\/\/twitter.com\/IvanLeFou\/status\/1109070473101479938?ref_src=twsrc%5Etfw\">22 mars 2019<\/a><\/p><\/blockquote>\n<p><script async=\"\" src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>[\/vc_column][vc_column width='1\/6'][\/vc_column][\/vc_row]<\/p>\n<p>&nbsp;<\/p>\n<h2>La mise \u00e0 jour corrompue de serveurs fiables<\/h2>\n<p><strong>Une projection Stormshield : \u2714\ufe0f<\/strong><\/p>\n<p>En mars dernier, le fabricant ta\u00efwanais Asus a \u00e9t\u00e9 <a href=\"https:\/\/www.solutions-numeriques.com\/attaque-apt-sur-les-serveurs-de-mise-a-jour-asus-le-fabiquant-taiwanais-reconnait-lattaque-et-prend-des-mesures\/\" target=\"_blank\" rel=\"noopener noreferrer\">victime d\u2019une cyberattaque<\/a> qui a permis d\u2019installer des logiciels malveillants sur des centaines de milliers d\u2019ordinateurs. \u00c0 cause du syst\u00e8me de mise \u00e0 jour Asus Live Update corrompu, les utilisateurs installaient \u00e0 leur insu une backdoor dans un fichier portant le nom de Setup.exe, sign\u00e9 avec le certificat num\u00e9rique (la carte d\u2019identit\u00e9 num\u00e9rique) d\u2019Asus.<\/p>\n<blockquote><p><em>Ces attaques, qui ne sont pas \u00e0 la port\u00e9e de tout le monde, permettent d\u2019outrepasser facilement les syst\u00e8mes de s\u00e9curit\u00e9 et la vigilance des cybervictimes recevant ces fausses mises \u00e0 jour. Ce type d\u2019intrusion est amen\u00e9 \u00e0 se reproduire.<\/em><\/p>\n<pre><strong>Matthieu Bonenfant,<\/strong> Directeur Marketing Stormshield<\/pre>\n<\/blockquote>\n<p>\u00ab <em>Ce hack est tr\u00e8s significatif. Des personnes arrivent \u00e0 entrer dans les r\u00e9seaux informatiques des \u00e9diteurs pour pousser dans les m\u00e9canismes de mises \u00e0 jour des \u00e9l\u00e9ments qui les int\u00e9ressent. Ces attaques, qui ne sont pas \u00e0 la port\u00e9e de tout le monde, permettent d\u2019outrepasser facilement les syst\u00e8mes de s\u00e9curit\u00e9 et la vigilance des cybervictimes recevant ces fausses mises \u00e0 jour. Ce type d\u2019intrusion est amen\u00e9 \u00e0 se reproduire<\/em> \u00bb, pr\u00e9sage Matthieu Bonenfant.<\/p>\n<p>&nbsp;<\/p>\n<h2>La fronti\u00e8re entre num\u00e9rique et physique de plus en plus fine<\/h2>\n<p><strong>Une projection Stormshield : \u2714\ufe0f<\/strong><\/p>\n<p>Fin juin, le pr\u00e9sident des \u00c9tats-Unis a affirm\u00e9 publiquement <a href=\"https:\/\/www.lemonde.fr\/international\/article\/2019\/06\/24\/l-iran-dit-n-avoir-subi-aucun-degat-a-cause-de-presumees-cyberattaques-americaines_5480582_3210.html\" target=\"_blank\" rel=\"noopener noreferrer\">avoir lanc\u00e9 une cyberattaque sur des infrastructures iraniennes<\/a>, dans un contexte de crise diplomatique pr\u00e9occupante entre les deux pays. \u00ab <em>Le cyberespace est un environnement ouvert qui subit de plein fouet les tensions g\u00e9opolitiques,<\/em> analyse Matthieu Bonenfant. <em>Avec un retour au repli sur soi dommageable : la Chine s\u2019est cr\u00e9\u00e9 son propre Internet tandis que la Russie menace de le faire. Le cyberespace est plus que jamais le 4e terrain de guerre apr\u00e8s l\u2019aviation, la marine et la terre. Avec une diff\u00e9rence importante : il est tr\u00e8s difficile de v\u00e9rifier qu\u2019une cyberattaque a vraiment eu lieu et d\u2019identifier ses origines. On peut masquer les preuves ou en cr\u00e9er des fausses. D\u00e8s lors, ce nouveau terrain est propice \u00e0 la propagande, \u00e0 la manipulation et \u00e0 la d\u00e9sinformation<\/em> \u00bb.<\/p>\n<p>La fronti\u00e8re s\u2019affine aussi dans le domaine de la sant\u00e9. Et plus pr\u00e9cis\u00e9ment du c\u00f4t\u00e9 d\u2019Isra\u00ebl, o\u00f9 une \u00e9quipe de chercheurs universitaires a fait <a href=\"https:\/\/reseauinternational.net\/un-groupe-de-hackers-parvient-a-truquer-des-scanners-medicaux-pour-placer-un-cancer-la-ou-il-ny-en-a-pas\/\" target=\"_blank\" rel=\"noopener noreferrer\">la d\u00e9monstration d\u2019un <em>malware<\/em> capable de falsifier de l\u2019imagerie m\u00e9dicale<\/a>. Un virus, faisant appara\u00eetre ou dispara\u00eetre des tumeurs canc\u00e9reuses sur des IRM, qui a r\u00e9ussi \u00e0 berner des radiologues exp\u00e9riment\u00e9s.<\/p>\n<p>[vc_row][vc_column width='1\/6'][\/vc_column][vc_column width='2\/3']<\/p>\n<blockquote class=\"twitter-tweet\" data-lang=\"fr\">\n<p dir=\"ltr\" lang=\"fr\">\ud83c\udfac Une vid\u00e9o qui fait froid dans le dos ! D\u00e9mo du piratage d'un scanner <a href=\"https:\/\/twitter.com\/hashtag\/Radiologie?src=hash&amp;ref_src=twsrc%5Etfw\">#Radiologie<\/a> <a href=\"https:\/\/t.co\/8Zx5GPhFE9\">https:\/\/t.co\/8Zx5GPhFE9<\/a><\/p>\n<p>\u2680 Malware ajout\/suppr cancer <a href=\"https:\/\/twitter.com\/hashtag\/DeepLearning?src=hash&amp;ref_src=twsrc%5Etfw\">#DeepLearning<\/a> \ud83d\ude30 98% de r\u00e9ussite<br \/>\n\u2681 <a href=\"https:\/\/twitter.com\/hashtag\/Raspberry?src=hash&amp;ref_src=twsrc%5Etfw\">#Raspberry<\/a> sur PC de contr\u00f4le<br \/>\n\u2682 Man-in-the-Middle depuis salle d'attente, pas de chiffrement<a href=\"https:\/\/twitter.com\/hashtag\/MustWatch?src=hash&amp;ref_src=twsrc%5Etfw\">#MustWatch<\/a> <a href=\"https:\/\/t.co\/ZlnAFmzmE4\">pic.twitter.com\/ZlnAFmzmE4<\/a><\/p>\n<p>\u2014 Matthieu Garin (@matthieugarin) <a href=\"https:\/\/twitter.com\/matthieugarin\/status\/1115507139420794881?ref_src=twsrc%5Etfw\">9 avril 2019<\/a><\/p><\/blockquote>\n<p><script async=\"\" src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>[\/vc_column][vc_column width='1\/6'][\/vc_column][\/vc_row]<\/p>\n<p>&nbsp;<\/p>\n<h2>La complexification des ransomwares<\/h2>\n<p><strong>Une projection Stormshield : \u274c<\/strong><\/p>\n<p>Un <em>ransomware<\/em> d\u2019un nouveau genre s\u00e9vit au sein des entreprises. Identifi\u00e9 sous le nom de LockerGoga, il a commenc\u00e9 \u00e0 se faire conna\u00eetre d\u00e9but janvier en s\u2019immis\u00e7ant au c\u0153ur des syst\u00e8mes d\u2019informations des soci\u00e9t\u00e9s Altran et Norsk Hydro, g\u00e9n\u00e9rant de nombreuses pertes.<\/p>\n<p>Une fois install\u00e9, LockerGoga va non seulement chiffrer un certain nombre de fichiers, mais aussi modifier les mots de passe syst\u00e8me sur les postes infect\u00e9s. Il tente \u00e9galement de d\u00e9sactiver les cartes r\u00e9seau des machines afin de d\u00e9connecter le syst\u00e8me de toute connexion externe, obligeant ainsi la victime \u00e0 passer \u00e0 une restauration manuelle. Et se distingue notamment par l\u2019utilisation de certificats de s\u00e9curit\u00e9 valides pour infecter les syst\u00e8mes informatiques cibles.<\/p>\n<p>\u00ab <em>Ce ransomware ne cherche pas \u00e0 multiplier ses victimes comme WannaCry ou NotPetya. C\u2019est une action tr\u00e8s cibl\u00e9e qui vise \u00e0 paralyser une entreprise, une administration enti\u00e8re en \u00e9change d\u2019une ran\u00e7on. Il n\u2019y a plus autant de d\u00e9g\u00e2ts collat\u00e9raux li\u00e9s \u00e0 une prolif\u00e9ration libre du malware comme on avait pu le voir avec d\u2019autres ran\u00e7ongiciels. Les impacts de ces attaques peuvent \u00eatre \u00e9normes, nous assistons \u00e0 un changement d\u2019\u00e9chelle<\/em> \u00bb, indique Matthieu Bonenfant.<\/p>\n<p>&nbsp;<\/p>\n<h2>L\u2019ouverture de la cybers\u00e9curit\u00e9 au grand public<\/h2>\n<p><strong>Une projection Stormshield : \u274c<\/strong><\/p>\n<p>La cybers\u00e9curit\u00e9 sera-t-elle bient\u00f4t sur toutes les l\u00e8vres ? En parall\u00e8le de devenir un v\u00e9ritable fait divers de soci\u00e9t\u00e9, la th\u00e9matique s\u2019invite aupr\u00e8s du grand public.<\/p>\n<p>En juin, elle l\u2019\u00e9tait pour 400 d\u00e9cideurs europ\u00e9ens, chefs d\u2019entreprises et repr\u00e9sentants des pouvoirs publics r\u00e9unis \u00e0 l\u2019occasion <a href=\"https:\/\/www.paris-cyber-week.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">de la premi\u00e8re Paris Cyber Week<\/a>. Sur la toile aussi, la cybers\u00e9curit\u00e9 fait recette. Apr\u00e8s les campagnes de phishing, les internautes en parlent de plus en plus face \u00e0 la multiplication des faits de sextorsions, <a href=\"https:\/\/www.stormshield.com\/fr\/actus\/sextorsion-et-cyberattaques-vers-un-marketing-de-la-honte\/\">ces chantages \u00e0 la webcam, aussi grossiers qu\u2019efficaces<\/a>. Une recrudescence de ces cyberattaques constat\u00e9e par Cybermalveillance.gouv.fr \u2013 qui, en parall\u00e8le, continue son action de sensibilisation massive en France. En juin, la plateforme a notamment sorti <a href=\"https:\/\/www.cybermalveillance.gouv.fr\/nos-articles\/communique-publication-de-la-version-complete-du-kit-de-sensibilisation-aux-risques-numeriques\/\" target=\"_blank\" rel=\"noopener noreferrer\">le deuxi\u00e8me volet de son kit de sensibilisation aux risques num\u00e9riques<\/a>. Dans la forme comme sur le fond, ce kit r\u00e9pond aux attentes du grand public et se pr\u00e9sente comme une v\u00e9ritable bo\u00eete \u00e0 outils sur des sujets d\u2019actualit\u00e9 et de leur quotidien.<\/p>\n<p>&nbsp;<\/p>\n<p>Dans cet environnement 4.0, le num\u00e9rique s\u2019ancre physiquement dans notre quotidien. Et emm\u00e8ne avec lui son lot de risques cyber. Face \u00e0 eux, restons en alerte autour des grandes \u00e9volutions de soci\u00e9t\u00e9.<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Depuis six mois, l\u2019actualit\u00e9 cyber fait le grand \u00e9cart entre arnaques aux faux supports techniques et cyberattaques \u00e0 l\u2019encontre d\u2019un pays. Pour y voir plus clair, voici une r\u00e9trospective des six premiers mois de l\u2019ann\u00e9e et des grandes tendances qui se profilent. En mati\u00e8re de&#8230;<\/p>\n","protected":false},"author":31,"featured_media":148919,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1612],"tags":[4368],"business_size":[682,683,681],"industry":[695,689,703,2123,691,693,699,701,697],"help_mefind":[],"features":[],"type_security":[754,756,758],"maintenance":[],"offer":[],"administration_tools":[],"cloud_offers":[],"listing_product":[1595,1570,1565,1530],"class_list":["post-148917","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-veille-securite","tag-la-cybersecurite-par-stormshield","business_size-eti","business_size-grande-entreprise","business_size-pme","industry-administrations-publiques","industry-banque-et-finance","industry-commerce-et-e-commerce","industry-datacenters-fr","industry-defense-et-organisations-militaires","industry-education-et-enseignement","industry-industrie-fr","industry-operateurs-et-mssp","industry-sante-et-etablissements-de-soin","type_security-donnees","type_security-postes-et-serveurs","type_security-reseaux","listing_product-breach-fighter-fr","listing_product-sds-fr","listing_product-ses-fr","listing_product-sns-fr"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Tendances cybers\u00e9curit\u00e9, une r\u00e9trospective du d\u00e9but 2019 | Stormshield<\/title>\n<meta name=\"description\" content=\"D\u00e9couvrez avec Stormshield une r\u00e9trospective des tendances de la cybers\u00e9curit\u00e9 de 2019 et une veille sur les vuln\u00e9rabilit\u00e9s.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stormshield.com\/fr\/actus\/cybersecurite-quelle-retrospective-depuis-debut-2019\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Tendances cybers\u00e9curit\u00e9, une r\u00e9trospective du d\u00e9but 2019 | Stormshield\" \/>\n<meta property=\"og:description\" content=\"D\u00e9couvrez avec Stormshield une r\u00e9trospective des tendances de la cybers\u00e9curit\u00e9 de 2019 et une veille sur les vuln\u00e9rabilit\u00e9s.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stormshield.com\/fr\/actus\/cybersecurite-quelle-retrospective-depuis-debut-2019\/\" \/>\n<meta property=\"og:site_name\" content=\"Stormshield\" \/>\n<meta property=\"article:published_time\" content=\"2019-07-15T06:00:22+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-22T14:25:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_449555950-e1618483146647.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"534\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Victor Poitevin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Stormshield\" \/>\n<meta name=\"twitter:site\" content=\"@Stormshield\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Victor Poitevin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/cybersecurite-quelle-retrospective-depuis-debut-2019\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/cybersecurite-quelle-retrospective-depuis-debut-2019\\\/\"},\"author\":{\"name\":\"Victor Poitevin\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/#\\\/schema\\\/person\\\/0adf015dda8f00b6273db9b417b12da2\"},\"headline\":\"Cybers\u00e9curit\u00e9 : quelle r\u00e9trospective depuis d\u00e9but 2019&nbsp;?\",\"datePublished\":\"2019-07-15T06:00:22+00:00\",\"dateModified\":\"2024-03-22T14:25:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/cybersecurite-quelle-retrospective-depuis-debut-2019\\\/\"},\"wordCount\":1291,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/cybersecurite-quelle-retrospective-depuis-debut-2019\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.stormshield.com\\\/wp-content\\\/uploads\\\/shutterstock_449555950-e1618483146647.jpg\",\"keywords\":[\"La cybers\u00e9curit\u00e9 - par Stormshield\"],\"articleSection\":[\"Veille s\u00e9curit\u00e9\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/cybersecurite-quelle-retrospective-depuis-debut-2019\\\/\",\"url\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/cybersecurite-quelle-retrospective-depuis-debut-2019\\\/\",\"name\":\"Tendances cybers\u00e9curit\u00e9, une r\u00e9trospective du d\u00e9but 2019 | Stormshield\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/cybersecurite-quelle-retrospective-depuis-debut-2019\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/cybersecurite-quelle-retrospective-depuis-debut-2019\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.stormshield.com\\\/wp-content\\\/uploads\\\/shutterstock_449555950-e1618483146647.jpg\",\"datePublished\":\"2019-07-15T06:00:22+00:00\",\"dateModified\":\"2024-03-22T14:25:54+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/#\\\/schema\\\/person\\\/0adf015dda8f00b6273db9b417b12da2\"},\"description\":\"D\u00e9couvrez avec Stormshield une r\u00e9trospective des tendances de la cybers\u00e9curit\u00e9 de 2019 et une veille sur les vuln\u00e9rabilit\u00e9s.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/cybersecurite-quelle-retrospective-depuis-debut-2019\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/cybersecurite-quelle-retrospective-depuis-debut-2019\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/cybersecurite-quelle-retrospective-depuis-debut-2019\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.stormshield.com\\\/wp-content\\\/uploads\\\/shutterstock_449555950-e1618483146647.jpg\",\"contentUrl\":\"https:\\\/\\\/www.stormshield.com\\\/wp-content\\\/uploads\\\/shutterstock_449555950-e1618483146647.jpg\",\"width\":800,\"height\":534},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/cybersecurite-quelle-retrospective-depuis-debut-2019\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybers\u00e9curit\u00e9 : quelle r\u00e9trospective depuis d\u00e9but 2019&nbsp;?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/\",\"name\":\"Stormshield\",\"description\":\"Stormshield\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/#\\\/schema\\\/person\\\/0adf015dda8f00b6273db9b417b12da2\",\"name\":\"Victor Poitevin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0b6fdfc0b3c6bba351213934a589a60b221b4d00f83fe3bd4fb637c5e541d0e1?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0b6fdfc0b3c6bba351213934a589a60b221b4d00f83fe3bd4fb637c5e541d0e1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0b6fdfc0b3c6bba351213934a589a60b221b4d00f83fe3bd4fb637c5e541d0e1?s=96&d=mm&r=g\",\"caption\":\"Victor Poitevin\"},\"description\":\"Victor is Stormshield\u2019s Editorial &amp; Digital Manager. Attached to the Marketing Department, his role is to improve the Group\u2019s online visibility. This involves Stormshield\u2019s entire ecosystem, including websites, social networks and blogs. He will make use of his diverse experience, gained in several major French and international groups and communications agencies, to fulfill the Group\u2019s high digital aspirations.\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Tendances cybers\u00e9curit\u00e9, une r\u00e9trospective du d\u00e9but 2019 | Stormshield","description":"D\u00e9couvrez avec Stormshield une r\u00e9trospective des tendances de la cybers\u00e9curit\u00e9 de 2019 et une veille sur les vuln\u00e9rabilit\u00e9s.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stormshield.com\/fr\/actus\/cybersecurite-quelle-retrospective-depuis-debut-2019\/","og_locale":"fr_FR","og_type":"article","og_title":"Tendances cybers\u00e9curit\u00e9, une r\u00e9trospective du d\u00e9but 2019 | Stormshield","og_description":"D\u00e9couvrez avec Stormshield une r\u00e9trospective des tendances de la cybers\u00e9curit\u00e9 de 2019 et une veille sur les vuln\u00e9rabilit\u00e9s.","og_url":"https:\/\/www.stormshield.com\/fr\/actus\/cybersecurite-quelle-retrospective-depuis-debut-2019\/","og_site_name":"Stormshield","article_published_time":"2019-07-15T06:00:22+00:00","article_modified_time":"2024-03-22T14:25:54+00:00","og_image":[{"width":800,"height":534,"url":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_449555950-e1618483146647.jpg","type":"image\/jpeg"}],"author":"Victor Poitevin","twitter_card":"summary_large_image","twitter_creator":"@Stormshield","twitter_site":"@Stormshield","twitter_misc":{"\u00c9crit par":"Victor Poitevin","Dur\u00e9e de lecture estim\u00e9e":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.stormshield.com\/fr\/actus\/cybersecurite-quelle-retrospective-depuis-debut-2019\/#article","isPartOf":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/cybersecurite-quelle-retrospective-depuis-debut-2019\/"},"author":{"name":"Victor Poitevin","@id":"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/0adf015dda8f00b6273db9b417b12da2"},"headline":"Cybers\u00e9curit\u00e9 : quelle r\u00e9trospective depuis d\u00e9but 2019&nbsp;?","datePublished":"2019-07-15T06:00:22+00:00","dateModified":"2024-03-22T14:25:54+00:00","mainEntityOfPage":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/cybersecurite-quelle-retrospective-depuis-debut-2019\/"},"wordCount":1291,"commentCount":0,"image":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/cybersecurite-quelle-retrospective-depuis-debut-2019\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_449555950-e1618483146647.jpg","keywords":["La cybers\u00e9curit\u00e9 - par Stormshield"],"articleSection":["Veille s\u00e9curit\u00e9"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.stormshield.com\/fr\/actus\/cybersecurite-quelle-retrospective-depuis-debut-2019\/","url":"https:\/\/www.stormshield.com\/fr\/actus\/cybersecurite-quelle-retrospective-depuis-debut-2019\/","name":"Tendances cybers\u00e9curit\u00e9, une r\u00e9trospective du d\u00e9but 2019 | Stormshield","isPartOf":{"@id":"https:\/\/www.stormshield.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/cybersecurite-quelle-retrospective-depuis-debut-2019\/#primaryimage"},"image":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/cybersecurite-quelle-retrospective-depuis-debut-2019\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_449555950-e1618483146647.jpg","datePublished":"2019-07-15T06:00:22+00:00","dateModified":"2024-03-22T14:25:54+00:00","author":{"@id":"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/0adf015dda8f00b6273db9b417b12da2"},"description":"D\u00e9couvrez avec Stormshield une r\u00e9trospective des tendances de la cybers\u00e9curit\u00e9 de 2019 et une veille sur les vuln\u00e9rabilit\u00e9s.","breadcrumb":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/cybersecurite-quelle-retrospective-depuis-debut-2019\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stormshield.com\/fr\/actus\/cybersecurite-quelle-retrospective-depuis-debut-2019\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.stormshield.com\/fr\/actus\/cybersecurite-quelle-retrospective-depuis-debut-2019\/#primaryimage","url":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_449555950-e1618483146647.jpg","contentUrl":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_449555950-e1618483146647.jpg","width":800,"height":534},{"@type":"BreadcrumbList","@id":"https:\/\/www.stormshield.com\/fr\/actus\/cybersecurite-quelle-retrospective-depuis-debut-2019\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stormshield.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Cybers\u00e9curit\u00e9 : quelle r\u00e9trospective depuis d\u00e9but 2019&nbsp;?"}]},{"@type":"WebSite","@id":"https:\/\/www.stormshield.com\/fr\/#website","url":"https:\/\/www.stormshield.com\/fr\/","name":"Stormshield","description":"Stormshield","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stormshield.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/0adf015dda8f00b6273db9b417b12da2","name":"Victor Poitevin","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/0b6fdfc0b3c6bba351213934a589a60b221b4d00f83fe3bd4fb637c5e541d0e1?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/0b6fdfc0b3c6bba351213934a589a60b221b4d00f83fe3bd4fb637c5e541d0e1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0b6fdfc0b3c6bba351213934a589a60b221b4d00f83fe3bd4fb637c5e541d0e1?s=96&d=mm&r=g","caption":"Victor Poitevin"},"description":"Victor is Stormshield\u2019s Editorial &amp; Digital Manager. Attached to the Marketing Department, his role is to improve the Group\u2019s online visibility. This involves Stormshield\u2019s entire ecosystem, including websites, social networks and blogs. He will make use of his diverse experience, gained in several major French and international groups and communications agencies, to fulfill the Group\u2019s high digital aspirations."}]}},"_links":{"self":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts\/148917","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/users\/31"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/comments?post=148917"}],"version-history":[{"count":14,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts\/148917\/revisions"}],"predecessor-version":[{"id":151547,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts\/148917\/revisions\/151547"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/media\/148919"}],"wp:attachment":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/media?parent=148917"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/categories?post=148917"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/tags?post=148917"},{"taxonomy":"business_size","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/business_size?post=148917"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/industry?post=148917"},{"taxonomy":"help_mefind","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/help_mefind?post=148917"},{"taxonomy":"features","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/features?post=148917"},{"taxonomy":"type_security","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/type_security?post=148917"},{"taxonomy":"maintenance","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/maintenance?post=148917"},{"taxonomy":"offer","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/offer?post=148917"},{"taxonomy":"administration_tools","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/administration_tools?post=148917"},{"taxonomy":"cloud_offers","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/cloud_offers?post=148917"},{"taxonomy":"listing_product","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/listing_product?post=148917"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}