{"id":161213,"date":"2019-11-04T06:25:17","date_gmt":"2019-11-04T05:25:17","guid":{"rendered":"https:\/\/www.stormshield.com\/?p=161213"},"modified":"2023-06-22T09:39:20","modified_gmt":"2023-06-22T08:39:20","slug":"chaine-logistique-cyberattaques","status":"publish","type":"post","link":"https:\/\/www.stormshield.com\/fr\/actus\/chaine-logistique-cyberattaques\/","title":{"rendered":"La cha\u00eene logistique \u00e0 l&rsquo;\u00e9preuve des cyberattaques"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-161182 size-full\" title=\"De William Potter. Image utilis\u00e9e sous licence de Shutterstock.com\" src=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_507425737-e1618483677995.jpg\" alt=\"Cyber-menaces : la supply chain dans le collimateur | Stormshield \" width=\"800\" height=\"534\" \/><\/p>\n<p><strong>Confront\u00e9s \u00e0 une prise de conscience de la s\u00e9curit\u00e9 dans les grandes entreprises, les pirates informatiques ciblent de plus en plus les sous-traitants pour atteindre leurs objectifs. Une strat\u00e9gie du \u00ab\u00a0maillon faible\u00a0\u00bb qui n\u00e9cessite une collaboration accrue sur l\u2019ensemble de la cha\u00eene logistique. D\u00e9cryptage.<\/strong><\/p>\n<p>&nbsp;<\/p>\n<h2>La cha\u00eene logistique, cible privil\u00e9gi\u00e9e des cyber-criminels<\/h2>\n<p>Face \u00e0 la menace cyber, les plus grandes entreprises tendent \u00e0 atteindre une certaine maturit\u00e9 num\u00e9rique \u2013 entre protections accrues et sensibilisation des collaborateurs g\u00e9n\u00e9ralis\u00e9e. Une pr\u00e9paration qui semble donc compl\u00e8te, <strong>mais qui occulte totalement les pieds d\u2019argile de ces colosses\u00a0: les fournisseurs et prestataires de services.<\/strong><\/p>\n<p>Les composants des fournisseurs, l\u2019assemblage de ceux-ci dans les lignes de production, le stockage des produits finis ou encore le passage dans les r\u00e9seaux de distribution sont pourtant autant d\u2019endroits vuln\u00e9rables et de moments propices \u00e0 une contamination malveillante. Qui va se m\u00e9fier d\u2019un colis d\u00e9livr\u00e9 par son livreur habituel\u00a0? Et de la m\u00eame mani\u00e8re, qui va se m\u00e9fier d\u2019un logiciel fourni par son prestataire de service classique\u00a0? Plut\u00f4t que de s\u2019attaquer frontalement \u00e0 des grandes entreprises, les hackers s\u2019en prennent d\u00e9sormais \u00e0 cette autre partie-prenante, plus vuln\u00e9rable et qui peut leur ouvrir en grand les portes du r\u00e9seau informatique et des terminaux des grandes entreprises. G\u00e9n\u00e9ralement de taille plus modeste, la question de la cybers\u00e9curit\u00e9 ou <a href=\"https:\/\/www.stormshield.com\/fr\/actus\/comment-insuffler-culture-cybersecurite-dans-entreprise\/\">de l\u2019hygi\u00e8ne num\u00e9rique<\/a> ne fait malheureusement pas partie de leurs priorit\u00e9s et les transforme donc en cibles de choix pour des cyberattaques.<br \/>\n[vc_row][vc_column width='1\/6'][\/vc_column][vc_column width='2\/3']<\/p>\n<blockquote class=\"twitter-tweet\">\n<p dir=\"ltr\" lang=\"fr\"><a href=\"https:\/\/twitter.com\/hashtag\/AssisesSI?src=hash&amp;ref_src=twsrc%5Etfw\">#AssisesSI<\/a> G. Poupard <a href=\"https:\/\/twitter.com\/ANSSI_FR?ref_src=twsrc%5Etfw\">@ANSSI_FR<\/a> : aujourd\u2019hui on a un vrai sujet sur les ETI, et il y en a beaucoup, souvent fournisseurs de grands groupes \u23ed justement utilisons les grands groupes pour aider leurs fournisseurs cl\u00e9s ! <a href=\"https:\/\/t.co\/RLXzqUT3dh\">pic.twitter.com\/RLXzqUT3dh<\/a><\/p>\n<p>\u2014 Gerome Billois (@gbillois) <a href=\"https:\/\/twitter.com\/gbillois\/status\/1181880712892432384?ref_src=twsrc%5Etfw\">October 9, 2019<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script>[\/vc_column][vc_column width='1\/6'][\/vc_column][\/vc_row]<\/p>\n<p>En 2013 d\u00e9j\u00e0, la cha\u00eene de distribution am\u00e9ricaine Target a \u00e9t\u00e9 attaqu\u00e9e \u00e0 travers un sous-traitant charg\u00e9 de\u2026 la climatisation. Au final, plusieurs millions de donn\u00e9es confidentielles d\u00e9rob\u00e9es. L\u2019ann\u00e9e derni\u00e8re, 50 000 \u00e9l\u00e8ves, parents et enseignants d\u2019un groupe scolaire \u2013 am\u00e9ricain \u00e9galement \u2013 ont eux-aussi vu leurs donn\u00e9es personnelles fuiter \u00e0 cause d\u2019un prestataire.<\/p>\n<p>Les cyber-risques li\u00e9s \u00e0 la sous-traitance sont donc bien plus proches de nous qu\u2019il n\u2019y para\u00eet\u2026 \u00ab\u00a0<em>Que dire d\u2019entreprises o\u00f9 des ordinateurs qui reviennent de r\u00e9paration, sont directement distribu\u00e9s aux collaborateurs sans v\u00e9rifier si un malware n\u2019a pas \u00e9t\u00e9 introduit au cours de la r\u00e9paration ou lors du transport\u00a0?<\/em>\u00a0\u00bb, glisse <strong>Florian Bonnet<\/strong>, Directeur du Product Management Stormshield.<\/p>\n<p>Et les objectifs peuvent s'av\u00e9rer multiples pour tous les maillons de la cha\u00eene logistique\u00a0: <a href=\"https:\/\/www.stormshield.com\/fr\/actus\/industrie-agroalimentaire-nouvelle-cible-cyberattaques\/\">r\u00e9cup\u00e9rer des secrets de fabrication<\/a> et de propri\u00e9t\u00e9 intellectuelle, subtiliser des donn\u00e9es clients et partenaires ou simplement gripper la cha\u00eene de fabrication. \u00c0 la cl\u00e9, p\u00e9nalit\u00e9s de retard, perte de chiffre d'affaires, atteinte \u00e0 la r\u00e9putation sont \u00e0 pr\u00e9voir. Une \u00e9tude de l'Institut Vanson Bourne de 2018 avan\u00e7ait que les secteurs pharmaceutiques, biotechnologiques, h\u00f4teliers, des m\u00e9dias, du divertissement et des services informatiques seraient les plus cibl\u00e9s. Les \u00e9diteurs de logiciels peuvent aussi \u00eatre concern\u00e9s ici, puisque leurs applications \u2013 r\u00e9put\u00e9es fiables \u2013 permettent d\u2019atteindre de nombreuses entreprises sans encombre. Comme en t\u00e9moigne le cas du logiciel financier ukrainien MEDoc, point de d\u00e9part de NotPetya en 2017.<\/p>\n<p>&nbsp;<\/p>\n<h2>La tentation de sous-estimer le risque<\/h2>\n<p>Pour les hackers, m\u00eame des TPE \u2013 dont l\u2019activit\u00e9 ne repr\u00e9sente pas \u00e0 premi\u00e8re vue d\u2019enjeu majeur \u2013 peuvent constituer une cible de choix. Pour autant, \u00ab\u00a0<em>la plupart de ces petites structures ne se sentent pas assez concern\u00e9es<\/em>\u00a0\u00bb, constate <strong>St\u00e9phane Prevost<\/strong>, Product Marketing Manager Stormshield. \u00ab\u00a0<em>Puisqu\u2019elles ne d\u00e9tiennent pas de tr\u00e9sor de guerre ou d\u2019informations sensibles directement dans leurs r\u00e9seaux, elles ne mettent pas toujours en place les m\u00e9canismes adapt\u00e9s. C\u2019est la m\u00eame logique qu\u2019avec les assurances\u00a0: inutile jusqu\u2019au jour o\u00f9 on en a besoin<\/em>\u00a0\u00bb.<\/p>\n<blockquote><p><em>Tous connect\u00e9s, tous impliqu\u00e9s, tous responsables<\/em><\/p>\n<pre><strong>Slogan de l\u2019ANSSI<\/strong> en 2019<\/pre>\n<\/blockquote>\n<p>Cette attitude entra\u00eene une forme d\u2019omerta lorsqu\u2019un incident survient. \u00c0 ce titre, le message de l\u2019ANSSI pour l\u2019ann\u00e9e 2019 \u2013 \u00ab\u00a0<a href=\"https:\/\/twitter.com\/ANSSI_FR\/status\/1087290099669323776\" target=\"_blank\" rel=\"noopener noreferrer\"><em>tous connect\u00e9s, tous impliqu\u00e9s, tous responsables<\/em><\/a>\u00a0\u00bb \u2013 est donc \u00e9loquent. \u00ab\u00a0<em>Maintenant que les syst\u00e8mes deviennent tous reli\u00e9s avec Internet et donc connect\u00e9s, il faut int\u00e9grer tout le monde dans la r\u00e9flexion de cybers\u00e9curit\u00e9. Les \u00e9quipes doivent communiquer entre elles, pour arriver \u00e0 une s\u00e9curit\u00e9 globale<\/em>\u00a0\u00bb, traduit <strong>Alain Dupont<\/strong>, Directeur du Service Client\u00e8le &amp; Directeur G\u00e9n\u00e9ral D\u00e9l\u00e9gu\u00e9 Stormshield.<\/p>\n<p>&nbsp;<\/p>\n<h2>Une seule solution\u00a0: jouer collectif<\/h2>\n<p>Les techniques actuelles de protection, telles que la d\u00e9tection d\u2019incidents bas\u00e9e sur les comportements anormaux ou encore les simulations d\u2019attaque, ne semblent aujourd\u2019hui pas suffisantes par rapport au nouveau p\u00e9rim\u00e8tre des entreprises. La port\u00e9e de ces outils reste en effet limit\u00e9e s\u2019ils sont envisag\u00e9s \u00e0 la seule \u00e9chelle de la seule organisation, sans lien avec son \u00e9cosyst\u00e8me. \u00ab\u00a0<em>Le niveau de s\u00e9curit\u00e9 d\u2019une cha\u00eene est celui du maillon le plus faible<\/em>\u00a0\u00bb, rappelle en effet Florian Bonnet. Ainsi, pour chaque entreprise, tout l\u2019enjeu consiste \u00e0 sensibiliser ses sous-traitants au m\u00eame titre que ses \u00e9quipes.<\/p>\n<blockquote><p><em>Le niveau de s\u00e9curit\u00e9 d\u2019une cha\u00eene est celui du maillon le plus faible<\/em><\/p>\n<pre><strong>Florian Bonnet,<\/strong> Directeur du Product Management Stormshield<\/pre>\n<\/blockquote>\n<p>Dans la perspective d\u2019un meilleur partage s\u00e9curis\u00e9 de l\u2019information entre sous-traitants et donneurs d\u2019ordre, ces derniers sont en capacit\u00e9 de jouer un r\u00f4le d\u00e9terminant. \u00ab\u00a0<em>Par exemple lors des appels d\u2019offres, en s\u2019assurant que le sous-traitant remplit certains crit\u00e8res de cybers\u00e9curit\u00e9<\/em> \u00bb, estime Alain Dupont. Une \u00e9volution indispensable puisque, dans le mod\u00e8le actuel d\u2019externalisation massive sous forme d\u2019alliances, ne survivront que <a href=\"https:\/\/www.linkedin.com\/pulse\/value-chain-system-shift-from-supply-ludmila-morozova-buss\/\" target=\"_blank\" rel=\"noopener noreferrer\">les entreprises capables de garantir l\u2019int\u00e9grit\u00e9 de tous leurs processus et donn\u00e9es<\/a>, y compris ceux qu\u2019elles ne contr\u00f4lent pas directement.<\/p>\n<p>&nbsp;<\/p>\n<p>Cette ambition exige de s\u00e9lectionner rigoureusement ses partenaires, d\u2019automatiser encore et toujours les flux, mais surtout d\u2019insuffler un esprit de coop\u00e9ration d\u2019un bout \u00e0 l\u2019autre de la cha\u00eene. Et vous, \u00eates-vous pr\u00eat\u00a0?<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Confront\u00e9s \u00e0 une prise de conscience de la s\u00e9curit\u00e9 dans les grandes entreprises, les pirates informatiques ciblent de plus en plus les sous-traitants pour atteindre leurs objectifs. Une strat\u00e9gie du \u00ab\u00a0maillon faible\u00a0\u00bb qui n\u00e9cessite une collaboration accrue sur l\u2019ensemble de la cha\u00eene logistique. D\u00e9cryptage. &nbsp;&#8230;<\/p>\n","protected":false},"author":31,"featured_media":161182,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1612],"tags":[4368],"business_size":[682,683,681],"industry":[695,689,691,699,701,697],"help_mefind":[],"features":[],"type_security":[754,756,758],"maintenance":[],"offer":[],"administration_tools":[],"cloud_offers":[],"listing_product":[1595,1570,1565,1530],"class_list":["post-161213","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-veille-securite","tag-la-cybersecurite-par-stormshield","business_size-eti","business_size-grande-entreprise","business_size-pme","industry-administrations-publiques","industry-banque-et-finance","industry-defense-et-organisations-militaires","industry-industrie-fr","industry-operateurs-et-mssp","industry-sante-et-etablissements-de-soin","type_security-donnees","type_security-postes-et-serveurs","type_security-reseaux","listing_product-breach-fighter-fr","listing_product-sds-fr","listing_product-ses-fr","listing_product-sns-fr"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyber-menaces : la supply chain dans le collimateur | Stormshield<\/title>\n<meta name=\"description\" content=\"Les attaques sur la supply chain se multiplient entra\u00eenant des risques consid\u00e9rables en mati\u00e8re de cybers\u00e9curit\u00e9. Stormshield d\u00e9crypte le ph\u00e9nom\u00e8ne.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stormshield.com\/fr\/actus\/chaine-logistique-cyberattaques\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber-menaces : la supply chain dans le collimateur | Stormshield\" \/>\n<meta property=\"og:description\" content=\"Les attaques sur la supply chain se multiplient entra\u00eenant des risques consid\u00e9rables en mati\u00e8re de cybers\u00e9curit\u00e9. Stormshield d\u00e9crypte le ph\u00e9nom\u00e8ne.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stormshield.com\/fr\/actus\/chaine-logistique-cyberattaques\/\" \/>\n<meta property=\"og:site_name\" content=\"Stormshield\" \/>\n<meta property=\"article:published_time\" content=\"2019-11-04T05:25:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-22T08:39:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_507425737-e1618483677995.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"534\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Victor Poitevin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Stormshield\" \/>\n<meta name=\"twitter:site\" content=\"@Stormshield\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Victor Poitevin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.stormshield.com\/fr\/actus\/chaine-logistique-cyberattaques\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.stormshield.com\/fr\/actus\/chaine-logistique-cyberattaques\/\"},\"author\":{\"name\":\"Victor Poitevin\",\"@id\":\"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/0adf015dda8f00b6273db9b417b12da2\"},\"headline\":\"La cha\u00eene logistique \u00e0 l&rsquo;\u00e9preuve des cyberattaques\",\"datePublished\":\"2019-11-04T05:25:17+00:00\",\"dateModified\":\"2023-06-22T08:39:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.stormshield.com\/fr\/actus\/chaine-logistique-cyberattaques\/\"},\"wordCount\":1083,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.stormshield.com\/fr\/actus\/chaine-logistique-cyberattaques\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_507425737-e1618483677995.jpg\",\"keywords\":[\"La cybers\u00e9curit\u00e9 - par Stormshield\"],\"articleSection\":[\"Veille s\u00e9curit\u00e9\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.stormshield.com\/fr\/actus\/chaine-logistique-cyberattaques\/\",\"url\":\"https:\/\/www.stormshield.com\/fr\/actus\/chaine-logistique-cyberattaques\/\",\"name\":\"Cyber-menaces : la supply chain dans le collimateur | Stormshield\",\"isPartOf\":{\"@id\":\"https:\/\/www.stormshield.com\/fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.stormshield.com\/fr\/actus\/chaine-logistique-cyberattaques\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.stormshield.com\/fr\/actus\/chaine-logistique-cyberattaques\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_507425737-e1618483677995.jpg\",\"datePublished\":\"2019-11-04T05:25:17+00:00\",\"dateModified\":\"2023-06-22T08:39:20+00:00\",\"author\":{\"@id\":\"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/0adf015dda8f00b6273db9b417b12da2\"},\"description\":\"Les attaques sur la supply chain se multiplient entra\u00eenant des risques consid\u00e9rables en mati\u00e8re de cybers\u00e9curit\u00e9. Stormshield d\u00e9crypte le ph\u00e9nom\u00e8ne.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.stormshield.com\/fr\/actus\/chaine-logistique-cyberattaques\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.stormshield.com\/fr\/actus\/chaine-logistique-cyberattaques\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.stormshield.com\/fr\/actus\/chaine-logistique-cyberattaques\/#primaryimage\",\"url\":\"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_507425737-e1618483677995.jpg\",\"contentUrl\":\"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_507425737-e1618483677995.jpg\",\"width\":800,\"height\":534},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.stormshield.com\/fr\/actus\/chaine-logistique-cyberattaques\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.stormshield.com\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"La cha\u00eene logistique \u00e0 l&#8217;\u00e9preuve des cyberattaques\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.stormshield.com\/fr\/#website\",\"url\":\"https:\/\/www.stormshield.com\/fr\/\",\"name\":\"Stormshield\",\"description\":\"Stormshield\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.stormshield.com\/fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/0adf015dda8f00b6273db9b417b12da2\",\"name\":\"Victor Poitevin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0b6fdfc0b3c6bba351213934a589a60b221b4d00f83fe3bd4fb637c5e541d0e1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0b6fdfc0b3c6bba351213934a589a60b221b4d00f83fe3bd4fb637c5e541d0e1?s=96&d=mm&r=g\",\"caption\":\"Victor Poitevin\"},\"description\":\"Victor is Stormshield\u2019s Editorial &amp; Digital Manager. Attached to the Marketing Department, his role is to improve the Group\u2019s online visibility. This involves Stormshield\u2019s entire ecosystem, including websites, social networks and blogs. He will make use of his diverse experience, gained in several major French and international groups and communications agencies, to fulfill the Group\u2019s high digital aspirations.\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber-menaces : la supply chain dans le collimateur | Stormshield","description":"Les attaques sur la supply chain se multiplient entra\u00eenant des risques consid\u00e9rables en mati\u00e8re de cybers\u00e9curit\u00e9. Stormshield d\u00e9crypte le ph\u00e9nom\u00e8ne.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stormshield.com\/fr\/actus\/chaine-logistique-cyberattaques\/","og_locale":"fr_FR","og_type":"article","og_title":"Cyber-menaces : la supply chain dans le collimateur | Stormshield","og_description":"Les attaques sur la supply chain se multiplient entra\u00eenant des risques consid\u00e9rables en mati\u00e8re de cybers\u00e9curit\u00e9. Stormshield d\u00e9crypte le ph\u00e9nom\u00e8ne.","og_url":"https:\/\/www.stormshield.com\/fr\/actus\/chaine-logistique-cyberattaques\/","og_site_name":"Stormshield","article_published_time":"2019-11-04T05:25:17+00:00","article_modified_time":"2023-06-22T08:39:20+00:00","og_image":[{"width":800,"height":534,"url":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_507425737-e1618483677995.jpg","type":"image\/jpeg"}],"author":"Victor Poitevin","twitter_card":"summary_large_image","twitter_creator":"@Stormshield","twitter_site":"@Stormshield","twitter_misc":{"\u00c9crit par":"Victor Poitevin","Dur\u00e9e de lecture estim\u00e9e":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.stormshield.com\/fr\/actus\/chaine-logistique-cyberattaques\/#article","isPartOf":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/chaine-logistique-cyberattaques\/"},"author":{"name":"Victor Poitevin","@id":"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/0adf015dda8f00b6273db9b417b12da2"},"headline":"La cha\u00eene logistique \u00e0 l&rsquo;\u00e9preuve des cyberattaques","datePublished":"2019-11-04T05:25:17+00:00","dateModified":"2023-06-22T08:39:20+00:00","mainEntityOfPage":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/chaine-logistique-cyberattaques\/"},"wordCount":1083,"commentCount":0,"image":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/chaine-logistique-cyberattaques\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_507425737-e1618483677995.jpg","keywords":["La cybers\u00e9curit\u00e9 - par Stormshield"],"articleSection":["Veille s\u00e9curit\u00e9"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.stormshield.com\/fr\/actus\/chaine-logistique-cyberattaques\/","url":"https:\/\/www.stormshield.com\/fr\/actus\/chaine-logistique-cyberattaques\/","name":"Cyber-menaces : la supply chain dans le collimateur | Stormshield","isPartOf":{"@id":"https:\/\/www.stormshield.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/chaine-logistique-cyberattaques\/#primaryimage"},"image":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/chaine-logistique-cyberattaques\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_507425737-e1618483677995.jpg","datePublished":"2019-11-04T05:25:17+00:00","dateModified":"2023-06-22T08:39:20+00:00","author":{"@id":"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/0adf015dda8f00b6273db9b417b12da2"},"description":"Les attaques sur la supply chain se multiplient entra\u00eenant des risques consid\u00e9rables en mati\u00e8re de cybers\u00e9curit\u00e9. Stormshield d\u00e9crypte le ph\u00e9nom\u00e8ne.","breadcrumb":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/chaine-logistique-cyberattaques\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stormshield.com\/fr\/actus\/chaine-logistique-cyberattaques\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.stormshield.com\/fr\/actus\/chaine-logistique-cyberattaques\/#primaryimage","url":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_507425737-e1618483677995.jpg","contentUrl":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_507425737-e1618483677995.jpg","width":800,"height":534},{"@type":"BreadcrumbList","@id":"https:\/\/www.stormshield.com\/fr\/actus\/chaine-logistique-cyberattaques\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stormshield.com\/fr\/"},{"@type":"ListItem","position":2,"name":"La cha\u00eene logistique \u00e0 l&#8217;\u00e9preuve des cyberattaques"}]},{"@type":"WebSite","@id":"https:\/\/www.stormshield.com\/fr\/#website","url":"https:\/\/www.stormshield.com\/fr\/","name":"Stormshield","description":"Stormshield","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stormshield.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/0adf015dda8f00b6273db9b417b12da2","name":"Victor Poitevin","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/0b6fdfc0b3c6bba351213934a589a60b221b4d00f83fe3bd4fb637c5e541d0e1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0b6fdfc0b3c6bba351213934a589a60b221b4d00f83fe3bd4fb637c5e541d0e1?s=96&d=mm&r=g","caption":"Victor Poitevin"},"description":"Victor is Stormshield\u2019s Editorial &amp; Digital Manager. Attached to the Marketing Department, his role is to improve the Group\u2019s online visibility. This involves Stormshield\u2019s entire ecosystem, including websites, social networks and blogs. He will make use of his diverse experience, gained in several major French and international groups and communications agencies, to fulfill the Group\u2019s high digital aspirations."}]}},"_links":{"self":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts\/161213","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/users\/31"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/comments?post=161213"}],"version-history":[{"count":6,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts\/161213\/revisions"}],"predecessor-version":[{"id":437924,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts\/161213\/revisions\/437924"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/media\/161182"}],"wp:attachment":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/media?parent=161213"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/categories?post=161213"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/tags?post=161213"},{"taxonomy":"business_size","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/business_size?post=161213"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/industry?post=161213"},{"taxonomy":"help_mefind","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/help_mefind?post=161213"},{"taxonomy":"features","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/features?post=161213"},{"taxonomy":"type_security","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/type_security?post=161213"},{"taxonomy":"maintenance","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/maintenance?post=161213"},{"taxonomy":"offer","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/offer?post=161213"},{"taxonomy":"administration_tools","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/administration_tools?post=161213"},{"taxonomy":"cloud_offers","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/cloud_offers?post=161213"},{"taxonomy":"listing_product","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/listing_product?post=161213"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}