{"id":16877,"date":"2024-01-08T14:09:50","date_gmt":"2024-01-08T13:09:50","guid":{"rendered":"https:\/\/cyberesponse.eu\/?page_id=16877"},"modified":"2024-01-30T14:07:35","modified_gmt":"2024-01-30T13:07:35","slug":"actualite","status":"publish","type":"page","link":"https:\/\/cyberesponse.eu\/en\/actualite\/","title":{"rendered":"Actualit\u00e9"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"16877\" class=\"elementor elementor-16877\">\n\t\t\t\t\t\t\t\t\t<section class=\"wd-negative-gap elementor-section elementor-top-section elementor-element elementor-element-f859507 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"f859507\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f137a62\" data-id=\"f137a62\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8449114 wd-width-100 elementor-widget elementor-widget-wd_blog\" data-id=\"8449114\" data-element_type=\"widget\" data-widget_type=\"wd_blog.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"wd-blog-element\">\n\t\t\t\t\t<div class=\"wd-posts wd-blog-holder wd-grid-g\" id=\"69f5fc6d6c086\" data-paged=\"1\" data-atts=\"{&quot;post_type&quot;:&quot;post&quot;,&quot;items_per_page&quot;:12,&quot;include&quot;:null,&quot;taxonomies&quot;:&quot;&quot;,&quot;offset&quot;:&quot;&quot;,&quot;orderby&quot;:&quot;date&quot;,&quot;order&quot;:&quot;DESC&quot;,&quot;meta_key&quot;:null,&quot;exclude&quot;:&quot;&quot;,&quot;parts_media&quot;:true,&quot;parts_title&quot;:&quot;1&quot;,&quot;parts_meta&quot;:&quot;1&quot;,&quot;parts_text&quot;:&quot;1&quot;,&quot;parts_btn&quot;:&quot;1&quot;,&quot;img_size&quot;:&quot;large&quot;,&quot;blog_design&quot;:&quot;default-alt&quot;,&quot;blog_carousel_design&quot;:null,&quot;blog_columns&quot;:null,&quot;blog_columns_tablet&quot;:{&quot;size&quot;:&quot;&quot;},&quot;blog_columns_mobile&quot;:{&quot;size&quot;:&quot;&quot;},&quot;blog_spacing&quot;:null,&quot;blog_spacing_tablet&quot;:&quot;&quot;,&quot;blog_spacing_mobile&quot;:&quot;&quot;,&quot;pagination&quot;:&quot;&quot;,&quot;speed&quot;:null,&quot;slides_per_view&quot;:null,&quot;slides_per_view_tablet&quot;:{&quot;size&quot;:&quot;&quot;},&quot;slides_per_view_mobile&quot;:{&quot;size&quot;:&quot;&quot;},&quot;wrap&quot;:null,&quot;autoplay&quot;:null,&quot;hide_pagination_control&quot;:null,&quot;hide_prev_next_buttons&quot;:null,&quot;scroll_per_page&quot;:null,&quot;lazy_loading&quot;:&quot;no&quot;,&quot;scroll_carousel_init&quot;:null,&quot;ajax_page&quot;:&quot;&quot;,&quot;custom_sizes&quot;:false,&quot;elementor&quot;:true}\" data-source=\"shortcode\">\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n<article id=\"post-17292\" class=\"wd-post blog-design-default-alt blog-post-loop blog-style-bg wd-add-shadow wd-col post-17292 post type-post status-publish format-standard has-post-thumbnail hentry category-supervision-et-journalisation tag-cybersecurite tag-deepfake tag-label-cyberesponse\">\n\t<div class=\"article-inner\">\n\t\t\t\t\t\t\t\t\t<div class=\"meta-post-categories wd-post-cat wd-style-with-bg\"><a href=\"https:\/\/cyberesponse.eu\/en\/category\/supervision-et-journalisation\/\" rel=\"category tag\">Supervision et Journalisation<\/a><\/div>\n\t\t\t\n\t\t\t\t\t\t\t<h3 id=\"boomdevs_1\" class=\"wd-entities-title title post-title\">\n\t\t\t\t\t<a href=\"https:\/\/cyberesponse.eu\/en\/la-supervision-et-la-journalisation\/\" rel=\"bookmark\">l&#8217;importance de la supervision et de la journalisation<\/a>\n\t\t\t\t<\/h3>\n\t\t\t\n\t\t\t\t\t\t\t<div class=\"entry-meta wd-entry-meta\">\n\t\t\t\t\t\t\t\t<ul class=\"entry-meta-list\">\n\t\t\t\t\t\t\t\t\t<li class=\"modified-date\">\n\t\t\t\t\t\t\t\t<time class=\"updated\" datetime=\"2024-03-20T12:47:08+01:00\">\n\t\t\t20\/03\/2024\t\t<\/time>\n\t\t\t\t\t\t\t<\/li>\n\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<li class=\"meta-author\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span>Posted by<\/span>\n\t\t\n\t\t\t\t\t<img alt='author-avatar' src='https:\/\/secure.gravatar.com\/avatar\/f31481682cb75ec8f4d61ff076c79521?s=32&#038;d=mm&#038;r=g' srcset='https:\/\/secure.gravatar.com\/avatar\/f31481682cb75ec8f4d61ff076c79521?s=64&#038;d=mm&#038;r=g 2x' class='avatar avatar-32 photo' height='32' width='32' \/>\t\t\n\t\t<a href=\"https:\/\/cyberesponse.eu\/en\/author\/pascal\/\" rel=\"author\">\n\t\t\t<span class=\"vcard author author_name\">\n\t\t\t\t<span class=\"fn\">Cyberesponse<\/span>\n\t\t\t<\/span>\n\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div><!-- .entry-meta -->\n\t\t\t\t\t\t\t\t<header class=\"entry-header\">\n\t\t\t\t\t\t\t\t\t<figure id=\"carousel-797\" class=\"entry-thumbnail\">\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t<div class=\"post-img-wrapp\">\n\t\t\t\t\t\t\t\t<a href=\"https:\/\/cyberesponse.eu\/en\/la-supervision-et-la-journalisation\/\">\n\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1300\" height=\"731\" src=\"https:\/\/cyberesponse.eu\/wp-content\/uploads\/2024\/03\/la-supervision-et-la-journalisation-1300x731.webp\" class=\"attachment-large size-large\" alt=\"la supervision et la journalisation\" srcset=\"https:\/\/cyberesponse.eu\/wp-content\/uploads\/2024\/03\/la-supervision-et-la-journalisation-1300x731.webp 1300w, https:\/\/cyberesponse.eu\/wp-content\/uploads\/2024\/03\/la-supervision-et-la-journalisation-400x225.webp 400w, https:\/\/cyberesponse.eu\/wp-content\/uploads\/2024\/03\/la-supervision-et-la-journalisation-768x432.webp 768w, https:\/\/cyberesponse.eu\/wp-content\/uploads\/2024\/03\/la-supervision-et-la-journalisation-1536x864.webp 1536w, https:\/\/cyberesponse.eu\/wp-content\/uploads\/2024\/03\/la-supervision-et-la-journalisation-18x10.webp 18w, https:\/\/cyberesponse.eu\/wp-content\/uploads\/2024\/03\/la-supervision-et-la-journalisation-860x484.webp 860w, https:\/\/cyberesponse.eu\/wp-content\/uploads\/2024\/03\/la-supervision-et-la-journalisation-430x242.webp 430w, https:\/\/cyberesponse.eu\/wp-content\/uploads\/2024\/03\/la-supervision-et-la-journalisation-700x394.webp 700w, https:\/\/cyberesponse.eu\/wp-content\/uploads\/2024\/03\/la-supervision-et-la-journalisation-150x84.webp 150w, https:\/\/cyberesponse.eu\/wp-content\/uploads\/2024\/03\/la-supervision-et-la-journalisation.webp 1920w\" sizes=\"(max-width: 1300px) 100vw, 1300px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"post-image-mask\">\n\t\t\t\t\t\t\t\t<span><\/span>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\n\t\t\t\t\t<\/figure>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"post-date wd-post-date wd-style-with-bg\">\n\t\t\t\t<span class=\"post-date-day\">\n\t\t\t\t\t20\t\t\t\t<\/span>\n\t\t\t\t<span class=\"post-date-month\">\n\t\t\t\t\tMar\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t<\/header><!-- .entry-header -->\n\n\t\t<div class=\"article-body-container\">\n\t\t\t\n\t\t\t\t\t\t\t\n\t\t\t\t                    <div class=\"entry-content wd-entry-content\">\n\t\t\t\t\t\t<p>Dans le monde num\u00e9rique d\u2019aujourd\u2019hui, la cybers\u00e9curit\u00e9 est devenue un enjeu critique pour les entreprises, ind\u00e9pendamment de leur taille ou de leur secteur d\u2019activit\u00e9. La gestion s\u00e9curis\u00e9e de vos outils informatiques est indispensable pour assurer la protection de vos donn\u00e9es et de votre infrastructure. <\/p>\n\n\t\t\t\t\t\t\t\t\t\t\t<\/div><!-- .entry-content -->\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"read-more-section\">\n\t\t\t\t\t\t<a class=\"btn-read-more more-link\" href=\"https:\/\/cyberesponse.eu\/en\/la-supervision-et-la-journalisation\/\">Continue reading<\/a>\t\t\t\t\t<\/p>\n\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<div class=\"share-with-lines\">\n\t\t\t\t\t<span class=\"left-line\"><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t<div class=\"wd-social-icons icons-design-bordered icons-size-small color-scheme-dark social-share social-form-circle text-center\">\n\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<a rel=\"noopener noreferrer nofollow\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/cyberesponse.eu\/en\/la-supervision-et-la-journalisation\/\" target=\"_blank\" class=\"wd-social-icon social-facebook\" aria-label=\"Facebook social link\">\n\t\t\t\t\t\t<span class=\"wd-icon\"><\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<a rel=\"noopener noreferrer nofollow\" href=\"https:\/\/x.com\/share?url=https:\/\/cyberesponse.eu\/en\/la-supervision-et-la-journalisation\/\" target=\"_blank\" class=\"wd-social-icon social-twitter\" aria-label=\"X social link\">\n\t\t\t\t\t\t<span class=\"wd-icon\"><\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<a rel=\"noopener noreferrer nofollow\" href=\"mailto:?subject=Check this https:\/\/cyberesponse.eu\/en\/la-supervision-et-la-journalisation\/\" target=\"_blank\" class=\"wd-social-icon social-email\" aria-label=\"Email social link\">\n\t\t\t\t\t\t<span class=\"wd-icon\"><\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<a rel=\"noopener noreferrer nofollow\" href=\"https:\/\/www.linkedin.com\/shareArticle?mini=true&url=https:\/\/cyberesponse.eu\/en\/la-supervision-et-la-journalisation\/\" target=\"_blank\" class=\"wd-social-icon social-linkedin\" aria-label=\"Linkedin social link\">\n\t\t\t\t\t\t<span class=\"wd-icon\"><\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<a rel=\"noopener noreferrer nofollow\" href=\"https:\/\/api.whatsapp.com\/send?text=https%3A%2F%2Fcyberesponse.eu%2Fen%2Fla-supervision-et-la-journalisation%2F\" target=\"_blank\" class=\"whatsapp-desktop  wd-social-icon social-whatsapp\" aria-label=\"WhatsApp social link\">\n\t\t\t\t\t\t<span class=\"wd-icon\"><\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\n\t\t\t\t\t<a rel=\"noopener noreferrer nofollow\" href=\"whatsapp:\/\/send?text=https%3A%2F%2Fcyberesponse.eu%2Fen%2Fla-supervision-et-la-journalisation%2F\" target=\"_blank\" class=\"whatsapp-mobile  wd-social-icon social-whatsapp\" aria-label=\"WhatsApp social link\">\n\t\t\t\t\t\t<span class=\"wd-icon\"><\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"right-line\"><\/span>\n\t\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t<\/div>\n\t<\/div>\n<\/article><!-- #post -->\n\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n<article id=\"post-17238\" class=\"wd-post blog-design-default-alt blog-post-loop blog-style-bg wd-add-shadow wd-col post-17238 post type-post status-publish format-standard has-post-thumbnail hentry category-actualites tag-cybersecurite tag-deepfake tag-label-cyberesponse\">\n\t<div class=\"article-inner\">\n\t\t\t\t\t\t\t\t\t<div class=\"meta-post-categories wd-post-cat wd-style-with-bg\"><a href=\"https:\/\/cyberesponse.eu\/en\/category\/actualites\/\" rel=\"category tag\">Actualit\u00e9s<\/a><\/div>\n\t\t\t\n\t\t\t\t\t\t\t<h3 id=\"boomdevs_2\" class=\"wd-entities-title title post-title\">\n\t\t\t\t\t<a href=\"https:\/\/cyberesponse.eu\/en\/le-danger-des-deepfakes\/\" rel=\"bookmark\">2024 et le danger des Deepfakes : Comprendre les cyber risques<\/a>\n\t\t\t\t<\/h3>\n\t\t\t\n\t\t\t\t\t\t\t<div class=\"entry-meta wd-entry-meta\">\n\t\t\t\t\t\t\t\t<ul class=\"entry-meta-list\">\n\t\t\t\t\t\t\t\t\t<li class=\"modified-date\">\n\t\t\t\t\t\t\t\t<time class=\"updated\" datetime=\"2024-03-05T13:04:41+01:00\">\n\t\t\t05\/03\/2024\t\t<\/time>\n\t\t\t\t\t\t\t<\/li>\n\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<li class=\"meta-author\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span>Posted by<\/span>\n\t\t\n\t\t\t\t\t<img alt='author-avatar' src='https:\/\/secure.gravatar.com\/avatar\/f31481682cb75ec8f4d61ff076c79521?s=32&#038;d=mm&#038;r=g' srcset='https:\/\/secure.gravatar.com\/avatar\/f31481682cb75ec8f4d61ff076c79521?s=64&#038;d=mm&#038;r=g 2x' class='avatar avatar-32 photo' height='32' width='32' \/>\t\t\n\t\t<a href=\"https:\/\/cyberesponse.eu\/en\/author\/pascal\/\" rel=\"author\">\n\t\t\t<span class=\"vcard author author_name\">\n\t\t\t\t<span class=\"fn\">Cyberesponse<\/span>\n\t\t\t<\/span>\n\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div><!-- .entry-meta -->\n\t\t\t\t\t\t\t\t<header class=\"entry-header\">\n\t\t\t\t\t\t\t\t\t<figure id=\"carousel-278\" class=\"entry-thumbnail\">\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t<div class=\"post-img-wrapp\">\n\t\t\t\t\t\t\t\t<a href=\"https:\/\/cyberesponse.eu\/en\/le-danger-des-deepfakes\/\">\n\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1300\" height=\"731\" src=\"https:\/\/cyberesponse.eu\/wp-content\/uploads\/2024\/03\/le-danger-des-Deepfakes-copie-1300x731.webp\" class=\"attachment-large size-large\" alt=\"le danger des Deepfakes\" srcset=\"https:\/\/cyberesponse.eu\/wp-content\/uploads\/2024\/03\/le-danger-des-Deepfakes-copie-1300x731.webp 1300w, https:\/\/cyberesponse.eu\/wp-content\/uploads\/2024\/03\/le-danger-des-Deepfakes-copie-400x225.webp 400w, https:\/\/cyberesponse.eu\/wp-content\/uploads\/2024\/03\/le-danger-des-Deepfakes-copie-768x432.webp 768w, https:\/\/cyberesponse.eu\/wp-content\/uploads\/2024\/03\/le-danger-des-Deepfakes-copie-1536x864.webp 1536w, https:\/\/cyberesponse.eu\/wp-content\/uploads\/2024\/03\/le-danger-des-Deepfakes-copie-18x10.webp 18w, https:\/\/cyberesponse.eu\/wp-content\/uploads\/2024\/03\/le-danger-des-Deepfakes-copie-860x484.webp 860w, https:\/\/cyberesponse.eu\/wp-content\/uploads\/2024\/03\/le-danger-des-Deepfakes-copie-430x242.webp 430w, https:\/\/cyberesponse.eu\/wp-content\/uploads\/2024\/03\/le-danger-des-Deepfakes-copie-700x394.webp 700w, https:\/\/cyberesponse.eu\/wp-content\/uploads\/2024\/03\/le-danger-des-Deepfakes-copie-150x84.webp 150w, https:\/\/cyberesponse.eu\/wp-content\/uploads\/2024\/03\/le-danger-des-Deepfakes-copie.webp 1920w\" sizes=\"(max-width: 1300px) 100vw, 1300px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"post-image-mask\">\n\t\t\t\t\t\t\t\t<span><\/span>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\n\t\t\t\t\t<\/figure>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"post-date wd-post-date wd-style-with-bg\">\n\t\t\t\t<span class=\"post-date-day\">\n\t\t\t\t\t05\t\t\t\t<\/span>\n\t\t\t\t<span class=\"post-date-month\">\n\t\t\t\t\tMar\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t<\/header><!-- .entry-header -->\n\n\t\t<div class=\"article-body-container\">\n\t\t\t\n\t\t\t\t\t\t\t\n\t\t\t\t                    <div class=\"entry-content wd-entry-content\">\n\t\t\t\t\t\t<p>Dans le monde num\u00e9rique d\u2019aujourd\u2019hui, la cybers\u00e9curit\u00e9 est devenue un enjeu critique pour les entreprises, ind\u00e9pendamment de leur taille ou de leur secteur d\u2019activit\u00e9. La gestion s\u00e9curis\u00e9e de vos outils informatiques est indispensable pour assurer la protection de vos donn\u00e9es et de votre infrastructure. <\/p>\n\n\t\t\t\t\t\t\t\t\t\t\t<\/div><!-- .entry-content -->\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"read-more-section\">\n\t\t\t\t\t\t<a class=\"btn-read-more more-link\" href=\"https:\/\/cyberesponse.eu\/en\/le-danger-des-deepfakes\/\">Continue reading<\/a>\t\t\t\t\t<\/p>\n\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<div class=\"share-with-lines\">\n\t\t\t\t\t<span class=\"left-line\"><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t<div class=\"wd-social-icons icons-design-bordered icons-size-small color-scheme-dark social-share social-form-circle text-center\">\n\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<a rel=\"noopener noreferrer nofollow\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/cyberesponse.eu\/en\/le-danger-des-deepfakes\/\" target=\"_blank\" class=\"wd-social-icon social-facebook\" aria-label=\"Facebook social link\">\n\t\t\t\t\t\t<span class=\"wd-icon\"><\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<a rel=\"noopener noreferrer nofollow\" href=\"https:\/\/x.com\/share?url=https:\/\/cyberesponse.eu\/en\/le-danger-des-deepfakes\/\" target=\"_blank\" class=\"wd-social-icon social-twitter\" aria-label=\"X social link\">\n\t\t\t\t\t\t<span class=\"wd-icon\"><\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<a rel=\"noopener noreferrer nofollow\" href=\"mailto:?subject=Check this https:\/\/cyberesponse.eu\/en\/le-danger-des-deepfakes\/\" target=\"_blank\" class=\"wd-social-icon social-email\" aria-label=\"Email social link\">\n\t\t\t\t\t\t<span class=\"wd-icon\"><\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<a rel=\"noopener noreferrer nofollow\" href=\"https:\/\/www.linkedin.com\/shareArticle?mini=true&url=https:\/\/cyberesponse.eu\/en\/le-danger-des-deepfakes\/\" target=\"_blank\" class=\"wd-social-icon social-linkedin\" aria-label=\"Linkedin social link\">\n\t\t\t\t\t\t<span class=\"wd-icon\"><\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<a rel=\"noopener noreferrer nofollow\" href=\"https:\/\/api.whatsapp.com\/send?text=https%3A%2F%2Fcyberesponse.eu%2Fen%2Fle-danger-des-deepfakes%2F\" target=\"_blank\" class=\"whatsapp-desktop  wd-social-icon social-whatsapp\" aria-label=\"WhatsApp social link\">\n\t\t\t\t\t\t<span class=\"wd-icon\"><\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\n\t\t\t\t\t<a rel=\"noopener noreferrer nofollow\" href=\"whatsapp:\/\/send?text=https%3A%2F%2Fcyberesponse.eu%2Fen%2Fle-danger-des-deepfakes%2F\" target=\"_blank\" class=\"whatsapp-mobile  wd-social-icon social-whatsapp\" aria-label=\"WhatsApp social link\">\n\t\t\t\t\t\t<span class=\"wd-icon\"><\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"right-line\"><\/span>\n\t\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t<\/div>\n\t<\/div>\n<\/article><!-- #post -->\n\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n<article id=\"post-17223\" class=\"wd-post blog-design-default-alt blog-post-loop blog-style-bg wd-add-shadow wd-col post-17223 post type-post status-publish format-standard has-post-thumbnail hentry category-gestion-des-acces tag-cybersecurite tag-fic-2024 tag-forum-incyber tag-invyber2024 tag-label-cyberesponse\">\n\t<div class=\"article-inner\">\n\t\t\t\t\t\t\t\t\t<div class=\"meta-post-categories wd-post-cat wd-style-with-bg\"><a href=\"https:\/\/cyberesponse.eu\/en\/category\/gestion-des-acces\/\" rel=\"category tag\">Gestion des acc\u00e8s<\/a><\/div>\n\t\t\t\n\t\t\t\t\t\t\t<h3 id=\"boomdevs_3\" class=\"wd-entities-title title post-title\">\n\t\t\t\t\t<a href=\"https:\/\/cyberesponse.eu\/en\/label-cyberesponse-au-forum-incyber-2024\/\" rel=\"bookmark\">D\u00e9couvrez le Label Cyberesponse au Forum InCyber 2024<\/a>\n\t\t\t\t<\/h3>\n\t\t\t\n\t\t\t\t\t\t\t<div class=\"entry-meta wd-entry-meta\">\n\t\t\t\t\t\t\t\t<ul class=\"entry-meta-list\">\n\t\t\t\t\t\t\t\t\t<li class=\"modified-date\">\n\t\t\t\t\t\t\t\t<time class=\"updated\" datetime=\"2024-03-04T07:48:06+01:00\">\n\t\t\t04\/03\/2024\t\t<\/time>\n\t\t\t\t\t\t\t<\/li>\n\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<li class=\"meta-author\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span>Posted by<\/span>\n\t\t\n\t\t\t\t\t<img alt='author-avatar' src='https:\/\/secure.gravatar.com\/avatar\/f31481682cb75ec8f4d61ff076c79521?s=32&#038;d=mm&#038;r=g' srcset='https:\/\/secure.gravatar.com\/avatar\/f31481682cb75ec8f4d61ff076c79521?s=64&#038;d=mm&#038;r=g 2x' class='avatar avatar-32 photo' height='32' width='32' \/>\t\t\n\t\t<a href=\"https:\/\/cyberesponse.eu\/en\/author\/pascal\/\" rel=\"author\">\n\t\t\t<span class=\"vcard author author_name\">\n\t\t\t\t<span class=\"fn\">Cyberesponse<\/span>\n\t\t\t<\/span>\n\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div><!-- .entry-meta -->\n\t\t\t\t\t\t\t\t<header class=\"entry-header\">\n\t\t\t\t\t\t\t\t\t<figure id=\"carousel-619\" class=\"entry-thumbnail\">\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t<div class=\"post-img-wrapp\">\n\t\t\t\t\t\t\t\t<a href=\"https:\/\/cyberesponse.eu\/en\/label-cyberesponse-au-forum-incyber-2024\/\">\n\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1300\" height=\"731\" src=\"https:\/\/cyberesponse.eu\/wp-content\/uploads\/2024\/03\/Label-Cyberesponse-InCyber-2024-1300x731.webp\" class=\"attachment-large size-large\" alt=\"Forum InCyber 2024\" srcset=\"https:\/\/cyberesponse.eu\/wp-content\/uploads\/2024\/03\/Label-Cyberesponse-InCyber-2024-1300x731.webp 1300w, https:\/\/cyberesponse.eu\/wp-content\/uploads\/2024\/03\/Label-Cyberesponse-InCyber-2024-400x225.webp 400w, https:\/\/cyberesponse.eu\/wp-content\/uploads\/2024\/03\/Label-Cyberesponse-InCyber-2024-768x432.webp 768w, https:\/\/cyberesponse.eu\/wp-content\/uploads\/2024\/03\/Label-Cyberesponse-InCyber-2024-1536x864.webp 1536w, https:\/\/cyberesponse.eu\/wp-content\/uploads\/2024\/03\/Label-Cyberesponse-InCyber-2024-18x10.webp 18w, https:\/\/cyberesponse.eu\/wp-content\/uploads\/2024\/03\/Label-Cyberesponse-InCyber-2024-860x484.webp 860w, https:\/\/cyberesponse.eu\/wp-content\/uploads\/2024\/03\/Label-Cyberesponse-InCyber-2024-430x242.webp 430w, https:\/\/cyberesponse.eu\/wp-content\/uploads\/2024\/03\/Label-Cyberesponse-InCyber-2024-700x394.webp 700w, https:\/\/cyberesponse.eu\/wp-content\/uploads\/2024\/03\/Label-Cyberesponse-InCyber-2024-150x84.webp 150w, https:\/\/cyberesponse.eu\/wp-content\/uploads\/2024\/03\/Label-Cyberesponse-InCyber-2024.webp 1920w\" sizes=\"(max-width: 1300px) 100vw, 1300px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"post-image-mask\">\n\t\t\t\t\t\t\t\t<span><\/span>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\n\t\t\t\t\t<\/figure>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"post-date wd-post-date wd-style-with-bg\">\n\t\t\t\t<span class=\"post-date-day\">\n\t\t\t\t\t04\t\t\t\t<\/span>\n\t\t\t\t<span class=\"post-date-month\">\n\t\t\t\t\tMar\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t<\/header><!-- .entry-header -->\n\n\t\t<div class=\"article-body-container\">\n\t\t\t\n\t\t\t\t\t\t\t\n\t\t\t\t                    <div class=\"entry-content wd-entry-content\">\n\t\t\t\t\t\t<p>Dans le monde num\u00e9rique d\u2019aujourd\u2019hui, la cybers\u00e9curit\u00e9 est devenue un enjeu critique pour les entreprises, ind\u00e9pendamment de leur taille ou de leur secteur d\u2019activit\u00e9. La gestion s\u00e9curis\u00e9e de vos outils informatiques est indispensable pour assurer la protection de vos donn\u00e9es et de votre infrastructure. <\/p>\n\n\t\t\t\t\t\t\t\t\t\t\t<\/div><!-- .entry-content -->\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"read-more-section\">\n\t\t\t\t\t\t<a class=\"btn-read-more more-link\" href=\"https:\/\/cyberesponse.eu\/en\/label-cyberesponse-au-forum-incyber-2024\/\">Continue reading<\/a>\t\t\t\t\t<\/p>\n\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<div class=\"share-with-lines\">\n\t\t\t\t\t<span class=\"left-line\"><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t<div class=\"wd-social-icons icons-design-bordered icons-size-small color-scheme-dark social-share social-form-circle text-center\">\n\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<a rel=\"noopener noreferrer nofollow\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/cyberesponse.eu\/en\/label-cyberesponse-au-forum-incyber-2024\/\" target=\"_blank\" class=\"wd-social-icon social-facebook\" aria-label=\"Facebook social link\">\n\t\t\t\t\t\t<span class=\"wd-icon\"><\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<a rel=\"noopener noreferrer nofollow\" href=\"https:\/\/x.com\/share?url=https:\/\/cyberesponse.eu\/en\/label-cyberesponse-au-forum-incyber-2024\/\" target=\"_blank\" class=\"wd-social-icon social-twitter\" aria-label=\"X social link\">\n\t\t\t\t\t\t<span class=\"wd-icon\"><\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<a rel=\"noopener noreferrer nofollow\" href=\"mailto:?subject=Check this https:\/\/cyberesponse.eu\/en\/label-cyberesponse-au-forum-incyber-2024\/\" target=\"_blank\" class=\"wd-social-icon social-email\" aria-label=\"Email social link\">\n\t\t\t\t\t\t<span class=\"wd-icon\"><\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<a rel=\"noopener noreferrer nofollow\" href=\"https:\/\/www.linkedin.com\/shareArticle?mini=true&url=https:\/\/cyberesponse.eu\/en\/label-cyberesponse-au-forum-incyber-2024\/\" target=\"_blank\" class=\"wd-social-icon social-linkedin\" aria-label=\"Linkedin social link\">\n\t\t\t\t\t\t<span class=\"wd-icon\"><\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<a rel=\"noopener noreferrer nofollow\" href=\"https:\/\/api.whatsapp.com\/send?text=https%3A%2F%2Fcyberesponse.eu%2Fen%2Flabel-cyberesponse-au-forum-incyber-2024%2F\" target=\"_blank\" class=\"whatsapp-desktop  wd-social-icon social-whatsapp\" aria-label=\"WhatsApp social link\">\n\t\t\t\t\t\t<span class=\"wd-icon\"><\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\n\t\t\t\t\t<a rel=\"noopener noreferrer nofollow\" href=\"whatsapp:\/\/send?text=https%3A%2F%2Fcyberesponse.eu%2Fen%2Flabel-cyberesponse-au-forum-incyber-2024%2F\" target=\"_blank\" class=\"whatsapp-mobile  wd-social-icon social-whatsapp\" aria-label=\"WhatsApp social link\">\n\t\t\t\t\t\t<span class=\"wd-icon\"><\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"right-line\"><\/span>\n\t\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t<\/div>\n\t<\/div>\n<\/article><!-- #post -->\n\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n<article id=\"post-17025\" class=\"wd-post blog-design-default-alt blog-post-loop blog-style-bg wd-add-shadow wd-col post-17025 post type-post status-publish format-standard has-post-thumbnail hentry category-gestion-des-acces tag-acces-informatique tag-cyberesponse tag-cybersecurite tag-gestion-des-acces tag-guide-complet\">\n\t<div class=\"article-inner\">\n\t\t\t\t\t\t\t\t\t<div class=\"meta-post-categories wd-post-cat wd-style-with-bg\"><a href=\"https:\/\/cyberesponse.eu\/en\/category\/gestion-des-acces\/\" rel=\"category tag\">Gestion des acc\u00e8s<\/a><\/div>\n\t\t\t\n\t\t\t\t\t\t\t<h3 id=\"boomdevs_4\" class=\"wd-entities-title title post-title\">\n\t\t\t\t\t<a href=\"https:\/\/cyberesponse.eu\/en\/la-gestion-des-acces-la-cle-de-la-securite\/\" rel=\"bookmark\">Ma\u00eetriser la gestion des acc\u00e8s : la cl\u00e9 de la s\u00e9curit\u00e9 informatique en entreprise<\/a>\n\t\t\t\t<\/h3>\n\t\t\t\n\t\t\t\t\t\t\t<div class=\"entry-meta wd-entry-meta\">\n\t\t\t\t\t\t\t\t<ul class=\"entry-meta-list\">\n\t\t\t\t\t\t\t\t\t<li class=\"modified-date\">\n\t\t\t\t\t\t\t\t<time class=\"updated\" datetime=\"2024-02-05T08:19:29+01:00\">\n\t\t\t05\/02\/2024\t\t<\/time>\n\t\t\t\t\t\t\t<\/li>\n\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<li class=\"meta-author\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span>Posted by<\/span>\n\t\t\n\t\t\t\t\t<img alt='author-avatar' src='https:\/\/secure.gravatar.com\/avatar\/f31481682cb75ec8f4d61ff076c79521?s=32&#038;d=mm&#038;r=g' srcset='https:\/\/secure.gravatar.com\/avatar\/f31481682cb75ec8f4d61ff076c79521?s=64&#038;d=mm&#038;r=g 2x' class='avatar avatar-32 photo' height='32' width='32' \/>\t\t\n\t\t<a href=\"https:\/\/cyberesponse.eu\/en\/author\/pascal\/\" rel=\"author\">\n\t\t\t<span class=\"vcard author author_name\">\n\t\t\t\t<span class=\"fn\">Cyberesponse<\/span>\n\t\t\t<\/span>\n\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div><!-- .entry-meta -->\n\t\t\t\t\t\t\t\t<header class=\"entry-header\">\n\t\t\t\t\t\t\t\t\t<figure id=\"carousel-749\" class=\"entry-thumbnail\">\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t<div class=\"post-img-wrapp\">\n\t\t\t\t\t\t\t\t<a href=\"https:\/\/cyberesponse.eu\/en\/la-gestion-des-acces-la-cle-de-la-securite\/\">\n\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1300\" height=\"731\" src=\"https:\/\/cyberesponse.eu\/wp-content\/uploads\/2024\/01\/Gestion-des-acces-1300x731.jpg\" class=\"attachment-large size-large\" alt=\"gestion des acc\u00e8s\" srcset=\"https:\/\/cyberesponse.eu\/wp-content\/uploads\/2024\/01\/Gestion-des-acces-1300x731.jpg 1300w, https:\/\/cyberesponse.eu\/wp-content\/uploads\/2024\/01\/Gestion-des-acces-400x225.jpg 400w, https:\/\/cyberesponse.eu\/wp-content\/uploads\/2024\/01\/Gestion-des-acces-768x432.jpg 768w, https:\/\/cyberesponse.eu\/wp-content\/uploads\/2024\/01\/Gestion-des-acces-1536x864.jpg 1536w, https:\/\/cyberesponse.eu\/wp-content\/uploads\/2024\/01\/Gestion-des-acces-18x10.jpg 18w, https:\/\/cyberesponse.eu\/wp-content\/uploads\/2024\/01\/Gestion-des-acces-860x484.jpg 860w, https:\/\/cyberesponse.eu\/wp-content\/uploads\/2024\/01\/Gestion-des-acces-430x242.jpg 430w, https:\/\/cyberesponse.eu\/wp-content\/uploads\/2024\/01\/Gestion-des-acces-700x394.jpg 700w, https:\/\/cyberesponse.eu\/wp-content\/uploads\/2024\/01\/Gestion-des-acces-150x84.jpg 150w, https:\/\/cyberesponse.eu\/wp-content\/uploads\/2024\/01\/Gestion-des-acces.jpg 1920w\" sizes=\"(max-width: 1300px) 100vw, 1300px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"post-image-mask\">\n\t\t\t\t\t\t\t\t<span><\/span>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\n\t\t\t\t\t<\/figure>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"post-date wd-post-date wd-style-with-bg\">\n\t\t\t\t<span class=\"post-date-day\">\n\t\t\t\t\t27\t\t\t\t<\/span>\n\t\t\t\t<span class=\"post-date-month\">\n\t\t\t\t\tJan\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t<\/header><!-- .entry-header -->\n\n\t\t<div class=\"article-body-container\">\n\t\t\t\n\t\t\t\t\t\t\t\n\t\t\t\t                    <div class=\"entry-content wd-entry-content\">\n\t\t\t\t\t\t<p>Dans le monde num\u00e9rique d\u2019aujourd\u2019hui, la cybers\u00e9curit\u00e9 est devenue un enjeu critique pour les entreprises, ind\u00e9pendamment de leur taille ou de leur secteur d\u2019activit\u00e9. La gestion s\u00e9curis\u00e9e de vos outils informatiques est indispensable pour assurer la protection de vos donn\u00e9es et de votre infrastructure. <\/p>\n\n\t\t\t\t\t\t\t\t\t\t\t<\/div><!-- .entry-content -->\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"read-more-section\">\n\t\t\t\t\t\t<a class=\"btn-read-more more-link\" href=\"https:\/\/cyberesponse.eu\/en\/la-gestion-des-acces-la-cle-de-la-securite\/\">Continue reading<\/a>\t\t\t\t\t<\/p>\n\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<div class=\"share-with-lines\">\n\t\t\t\t\t<span class=\"left-line\"><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t<div class=\"wd-social-icons icons-design-bordered icons-size-small color-scheme-dark social-share social-form-circle text-center\">\n\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<a rel=\"noopener noreferrer nofollow\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/cyberesponse.eu\/en\/la-gestion-des-acces-la-cle-de-la-securite\/\" target=\"_blank\" class=\"wd-social-icon social-facebook\" aria-label=\"Facebook social link\">\n\t\t\t\t\t\t<span class=\"wd-icon\"><\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<a rel=\"noopener noreferrer nofollow\" href=\"https:\/\/x.com\/share?url=https:\/\/cyberesponse.eu\/en\/la-gestion-des-acces-la-cle-de-la-securite\/\" target=\"_blank\" class=\"wd-social-icon social-twitter\" aria-label=\"X social link\">\n\t\t\t\t\t\t<span class=\"wd-icon\"><\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<a rel=\"noopener noreferrer nofollow\" href=\"mailto:?subject=Check this https:\/\/cyberesponse.eu\/en\/la-gestion-des-acces-la-cle-de-la-securite\/\" target=\"_blank\" class=\"wd-social-icon social-email\" aria-label=\"Email social link\">\n\t\t\t\t\t\t<span class=\"wd-icon\"><\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<a rel=\"noopener noreferrer nofollow\" href=\"https:\/\/www.linkedin.com\/shareArticle?mini=true&url=https:\/\/cyberesponse.eu\/en\/la-gestion-des-acces-la-cle-de-la-securite\/\" target=\"_blank\" class=\"wd-social-icon social-linkedin\" aria-label=\"Linkedin social link\">\n\t\t\t\t\t\t<span class=\"wd-icon\"><\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<a rel=\"noopener noreferrer nofollow\" href=\"https:\/\/api.whatsapp.com\/send?text=https%3A%2F%2Fcyberesponse.eu%2Fen%2Fla-gestion-des-acces-la-cle-de-la-securite%2F\" target=\"_blank\" class=\"whatsapp-desktop  wd-social-icon social-whatsapp\" aria-label=\"WhatsApp social link\">\n\t\t\t\t\t\t<span class=\"wd-icon\"><\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\n\t\t\t\t\t<a rel=\"noopener noreferrer nofollow\" href=\"whatsapp:\/\/send?text=https%3A%2F%2Fcyberesponse.eu%2Fen%2Fla-gestion-des-acces-la-cle-de-la-securite%2F\" target=\"_blank\" class=\"whatsapp-mobile  wd-social-icon social-whatsapp\" aria-label=\"WhatsApp social link\">\n\t\t\t\t\t\t<span class=\"wd-icon\"><\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"right-line\"><\/span>\n\t\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t<\/div>\n\t<\/div>\n<\/article><!-- #post -->\n\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n<article id=\"post-17003\" class=\"wd-post blog-design-default-alt blog-post-loop blog-style-bg wd-add-shadow wd-col post-17003 post type-post status-publish format-standard has-post-thumbnail hentry category-glossaire tag-anssi tag-byod tag-cnil tag-cyberesponse tag-cybersecurite tag-dicp tag-dkim tag-dlp tag-dmarc tag-edr-epdr tag-enisa tag-glossaire-cybersecurite tag-ikev2 tag-lan tag-lexique-cybersecurite tag-mac tag-mdm tag-mfa tag-nis2 tag-pra tag-pssi tag-rgpd tag-rpo tag-rto tag-si tag-spf tag-ssl tag-terminaux tag-token tag-tse-rds tag-tsl tag-utm tag-vpn tag-wan tag-wpa2\">\n\t<div class=\"article-inner\">\n\t\t\t\t\t\t\t\t\t<div class=\"meta-post-categories wd-post-cat wd-style-with-bg\"><a href=\"https:\/\/cyberesponse.eu\/en\/category\/glossaire\/\" rel=\"category tag\">Glossaire<\/a><\/div>\n\t\t\t\n\t\t\t\t\t\t\t<h3 id=\"boomdevs_5\" class=\"wd-entities-title title post-title\">\n\t\t\t\t\t<a href=\"https:\/\/cyberesponse.eu\/en\/glossaire-de-la-cybersecurite\/\" rel=\"bookmark\">Lexique de la Cybers\u00e9curit\u00e9 : guide complet pour d\u00e9coder le jargon du monde num\u00e9rique<\/a>\n\t\t\t\t<\/h3>\n\t\t\t\n\t\t\t\t\t\t\t<div class=\"entry-meta wd-entry-meta\">\n\t\t\t\t\t\t\t\t<ul class=\"entry-meta-list\">\n\t\t\t\t\t\t\t\t\t<li class=\"modified-date\">\n\t\t\t\t\t\t\t\t<time class=\"updated\" datetime=\"2024-01-30T13:53:52+01:00\">\n\t\t\t30\/01\/2024\t\t<\/time>\n\t\t\t\t\t\t\t<\/li>\n\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<li class=\"meta-author\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span>Posted by<\/span>\n\t\t\n\t\t\t\t\t<img alt='author-avatar' src='https:\/\/secure.gravatar.com\/avatar\/f31481682cb75ec8f4d61ff076c79521?s=32&#038;d=mm&#038;r=g' srcset='https:\/\/secure.gravatar.com\/avatar\/f31481682cb75ec8f4d61ff076c79521?s=64&#038;d=mm&#038;r=g 2x' class='avatar avatar-32 photo' height='32' width='32' \/>\t\t\n\t\t<a href=\"https:\/\/cyberesponse.eu\/en\/author\/pascal\/\" rel=\"author\">\n\t\t\t<span class=\"vcard author author_name\">\n\t\t\t\t<span class=\"fn\">Cyberesponse<\/span>\n\t\t\t<\/span>\n\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div><!-- .entry-meta -->\n\t\t\t\t\t\t\t\t<header class=\"entry-header\">\n\t\t\t\t\t\t\t\t\t<figure id=\"carousel-417\" class=\"entry-thumbnail\">\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t<div class=\"post-img-wrapp\">\n\t\t\t\t\t\t\t\t<a href=\"https:\/\/cyberesponse.eu\/en\/glossaire-de-la-cybersecurite\/\">\n\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1300\" height=\"731\" src=\"https:\/\/cyberesponse.eu\/wp-content\/uploads\/2024\/01\/Lexique-1300x731.jpg\" class=\"attachment-large size-large\" alt=\"Glossaire de la Cybers\u00e9curit\u00e9\" srcset=\"https:\/\/cyberesponse.eu\/wp-content\/uploads\/2024\/01\/Lexique-1300x731.jpg 1300w, https:\/\/cyberesponse.eu\/wp-content\/uploads\/2024\/01\/Lexique-400x225.jpg 400w, https:\/\/cyberesponse.eu\/wp-content\/uploads\/2024\/01\/Lexique-768x432.jpg 768w, https:\/\/cyberesponse.eu\/wp-content\/uploads\/2024\/01\/Lexique-1536x864.jpg 1536w, https:\/\/cyberesponse.eu\/wp-content\/uploads\/2024\/01\/Lexique-18x10.jpg 18w, https:\/\/cyberesponse.eu\/wp-content\/uploads\/2024\/01\/Lexique-860x484.jpg 860w, https:\/\/cyberesponse.eu\/wp-content\/uploads\/2024\/01\/Lexique-430x242.jpg 430w, https:\/\/cyberesponse.eu\/wp-content\/uploads\/2024\/01\/Lexique-700x394.jpg 700w, https:\/\/cyberesponse.eu\/wp-content\/uploads\/2024\/01\/Lexique-150x84.jpg 150w, https:\/\/cyberesponse.eu\/wp-content\/uploads\/2024\/01\/Lexique.jpg 1920w\" sizes=\"(max-width: 1300px) 100vw, 1300px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"post-image-mask\">\n\t\t\t\t\t\t\t\t<span><\/span>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\n\t\t\t\t\t<\/figure>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"post-date wd-post-date wd-style-with-bg\">\n\t\t\t\t<span class=\"post-date-day\">\n\t\t\t\t\t17\t\t\t\t<\/span>\n\t\t\t\t<span class=\"post-date-month\">\n\t\t\t\t\tJan\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t<\/header><!-- .entry-header -->\n\n\t\t<div class=\"article-body-container\">\n\t\t\t\n\t\t\t\t\t\t\t\n\t\t\t\t                    <div class=\"entry-content wd-entry-content\">\n\t\t\t\t\t\t<p>Ce Glossaire de la Cybers\u00e9curit\u00e9 vise \u00e0 fournir des d\u00e9finitions claires et concises des termes et concepts essentiels dans le domaine de la cybers\u00e9curit\u00e9. Qu\u2019il s\u2019agisse de comprendre la diff\u00e9rence entre un virus et un cheval de Troie, de saisir les subtilit\u00e9s du phishing ou de d\u00e9mystifier le cryptage, ce guide est votre alli\u00e9 incontournable<\/p>\n\n\t\t\t\t\t\t\t\t\t\t\t<\/div><!-- .entry-content -->\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"read-more-section\">\n\t\t\t\t\t\t<a class=\"btn-read-more more-link\" href=\"https:\/\/cyberesponse.eu\/en\/glossaire-de-la-cybersecurite\/\">Continue reading<\/a>\t\t\t\t\t<\/p>\n\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<div class=\"share-with-lines\">\n\t\t\t\t\t<span class=\"left-line\"><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t<div class=\"wd-social-icons icons-design-bordered icons-size-small color-scheme-dark social-share social-form-circle text-center\">\n\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<a rel=\"noopener noreferrer nofollow\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/cyberesponse.eu\/en\/glossaire-de-la-cybersecurite\/\" target=\"_blank\" class=\"wd-social-icon social-facebook\" aria-label=\"Facebook social link\">\n\t\t\t\t\t\t<span class=\"wd-icon\"><\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<a rel=\"noopener noreferrer nofollow\" href=\"https:\/\/x.com\/share?url=https:\/\/cyberesponse.eu\/en\/glossaire-de-la-cybersecurite\/\" target=\"_blank\" class=\"wd-social-icon social-twitter\" aria-label=\"X social link\">\n\t\t\t\t\t\t<span class=\"wd-icon\"><\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<a rel=\"noopener noreferrer nofollow\" href=\"mailto:?subject=Check this https:\/\/cyberesponse.eu\/en\/glossaire-de-la-cybersecurite\/\" target=\"_blank\" class=\"wd-social-icon social-email\" aria-label=\"Email social link\">\n\t\t\t\t\t\t<span class=\"wd-icon\"><\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<a rel=\"noopener noreferrer nofollow\" href=\"https:\/\/www.linkedin.com\/shareArticle?mini=true&url=https:\/\/cyberesponse.eu\/en\/glossaire-de-la-cybersecurite\/\" target=\"_blank\" class=\"wd-social-icon social-linkedin\" aria-label=\"Linkedin social link\">\n\t\t\t\t\t\t<span class=\"wd-icon\"><\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<a rel=\"noopener noreferrer nofollow\" href=\"https:\/\/api.whatsapp.com\/send?text=https%3A%2F%2Fcyberesponse.eu%2Fen%2Fglossaire-de-la-cybersecurite%2F\" target=\"_blank\" class=\"whatsapp-desktop  wd-social-icon social-whatsapp\" aria-label=\"WhatsApp social link\">\n\t\t\t\t\t\t<span class=\"wd-icon\"><\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\n\t\t\t\t\t<a rel=\"noopener noreferrer nofollow\" href=\"whatsapp:\/\/send?text=https%3A%2F%2Fcyberesponse.eu%2Fen%2Fglossaire-de-la-cybersecurite%2F\" target=\"_blank\" class=\"whatsapp-mobile  wd-social-icon social-whatsapp\" aria-label=\"WhatsApp social link\">\n\t\t\t\t\t\t<span class=\"wd-icon\"><\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"right-line\"><\/span>\n\t\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t<\/div>\n\t<\/div>\n<\/article><!-- #post -->\n\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n<article id=\"post-16886\" class=\"wd-post blog-design-default-alt blog-post-loop blog-style-bg wd-add-shadow wd-col post-16886 post type-post status-publish format-standard has-post-thumbnail hentry category-parc-informatique tag-cyberesponse tag-cybersecurite tag-guide-complet tag-parc-informatique\">\n\t<div class=\"article-inner\">\n\t\t\t\t\t\t\t\t\t<div class=\"meta-post-categories wd-post-cat wd-style-with-bg\"><a href=\"https:\/\/cyberesponse.eu\/en\/category\/parc-informatique\/\" rel=\"category tag\">Parc informatique<\/a><\/div>\n\t\t\t\n\t\t\t\t\t\t\t<h3 id=\"boomdevs_6\" class=\"wd-entities-title title post-title\">\n\t\t\t\t\t<a href=\"https:\/\/cyberesponse.eu\/en\/gestion-securisee-du-parc-informatique\/\" rel=\"bookmark\">Gestion s\u00e9curis\u00e9e du parc informatique : le guide complet<\/a>\n\t\t\t\t<\/h3>\n\t\t\t\n\t\t\t\t\t\t\t<div class=\"entry-meta wd-entry-meta\">\n\t\t\t\t\t\t\t\t<ul class=\"entry-meta-list\">\n\t\t\t\t\t\t\t\t\t<li class=\"modified-date\">\n\t\t\t\t\t\t\t\t<time class=\"updated\" datetime=\"2024-01-30T13:54:01+01:00\">\n\t\t\t30\/01\/2024\t\t<\/time>\n\t\t\t\t\t\t\t<\/li>\n\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<li class=\"meta-author\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span>Posted by<\/span>\n\t\t\n\t\t\t\t\t<img alt='author-avatar' src='https:\/\/secure.gravatar.com\/avatar\/f31481682cb75ec8f4d61ff076c79521?s=32&#038;d=mm&#038;r=g' srcset='https:\/\/secure.gravatar.com\/avatar\/f31481682cb75ec8f4d61ff076c79521?s=64&#038;d=mm&#038;r=g 2x' class='avatar avatar-32 photo' height='32' width='32' \/>\t\t\n\t\t<a href=\"https:\/\/cyberesponse.eu\/en\/author\/pascal\/\" rel=\"author\">\n\t\t\t<span class=\"vcard author author_name\">\n\t\t\t\t<span class=\"fn\">Cyberesponse<\/span>\n\t\t\t<\/span>\n\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div><!-- .entry-meta -->\n\t\t\t\t\t\t\t\t<header class=\"entry-header\">\n\t\t\t\t\t\t\t\t\t<figure id=\"carousel-101\" class=\"entry-thumbnail\">\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t<div class=\"post-img-wrapp\">\n\t\t\t\t\t\t\t\t<a href=\"https:\/\/cyberesponse.eu\/en\/gestion-securisee-du-parc-informatique\/\">\n\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1300\" height=\"731\" src=\"https:\/\/cyberesponse.eu\/wp-content\/uploads\/2024\/01\/Gestion-du-parc-1300x731.jpg\" class=\"attachment-large size-large\" alt=\"Gestion s\u00e9curis\u00e9e du parc informatique\" srcset=\"https:\/\/cyberesponse.eu\/wp-content\/uploads\/2024\/01\/Gestion-du-parc-1300x731.jpg 1300w, https:\/\/cyberesponse.eu\/wp-content\/uploads\/2024\/01\/Gestion-du-parc-400x225.jpg 400w, https:\/\/cyberesponse.eu\/wp-content\/uploads\/2024\/01\/Gestion-du-parc-768x432.jpg 768w, https:\/\/cyberesponse.eu\/wp-content\/uploads\/2024\/01\/Gestion-du-parc-1536x864.jpg 1536w, https:\/\/cyberesponse.eu\/wp-content\/uploads\/2024\/01\/Gestion-du-parc-18x10.jpg 18w, https:\/\/cyberesponse.eu\/wp-content\/uploads\/2024\/01\/Gestion-du-parc-860x484.jpg 860w, https:\/\/cyberesponse.eu\/wp-content\/uploads\/2024\/01\/Gestion-du-parc-430x242.jpg 430w, https:\/\/cyberesponse.eu\/wp-content\/uploads\/2024\/01\/Gestion-du-parc-700x394.jpg 700w, https:\/\/cyberesponse.eu\/wp-content\/uploads\/2024\/01\/Gestion-du-parc-150x84.jpg 150w, https:\/\/cyberesponse.eu\/wp-content\/uploads\/2024\/01\/Gestion-du-parc.jpg 1920w\" sizes=\"(max-width: 1300px) 100vw, 1300px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"post-image-mask\">\n\t\t\t\t\t\t\t\t<span><\/span>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\n\t\t\t\t\t<\/figure>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"post-date wd-post-date wd-style-with-bg\">\n\t\t\t\t<span class=\"post-date-day\">\n\t\t\t\t\t08\t\t\t\t<\/span>\n\t\t\t\t<span class=\"post-date-month\">\n\t\t\t\t\tJan\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t<\/header><!-- .entry-header -->\n\n\t\t<div class=\"article-body-container\">\n\t\t\t\n\t\t\t\t\t\t\t\n\t\t\t\t                    <div class=\"entry-content wd-entry-content\">\n\t\t\t\t\t\t<p>Dans le monde num\u00e9rique d\u2019aujourd\u2019hui, la cybers\u00e9curit\u00e9 est devenue un enjeu critique pour les entreprises, ind\u00e9pendamment de leur taille ou de leur secteur d\u2019activit\u00e9. La gestion s\u00e9curis\u00e9e de vos outils informatiques est indispensable pour assurer la protection de vos donn\u00e9es et de votre infrastructure. <\/p>\n\n\t\t\t\t\t\t\t\t\t\t\t<\/div><!-- .entry-content -->\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"read-more-section\">\n\t\t\t\t\t\t<a class=\"btn-read-more more-link\" href=\"https:\/\/cyberesponse.eu\/en\/gestion-securisee-du-parc-informatique\/\">Continue reading<\/a>\t\t\t\t\t<\/p>\n\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<div class=\"share-with-lines\">\n\t\t\t\t\t<span class=\"left-line\"><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t<div class=\"wd-social-icons icons-design-bordered icons-size-small color-scheme-dark social-share social-form-circle text-center\">\n\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<a rel=\"noopener noreferrer nofollow\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/cyberesponse.eu\/en\/gestion-securisee-du-parc-informatique\/\" target=\"_blank\" class=\"wd-social-icon social-facebook\" aria-label=\"Facebook social link\">\n\t\t\t\t\t\t<span class=\"wd-icon\"><\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<a rel=\"noopener noreferrer nofollow\" href=\"https:\/\/x.com\/share?url=https:\/\/cyberesponse.eu\/en\/gestion-securisee-du-parc-informatique\/\" target=\"_blank\" class=\"wd-social-icon social-twitter\" aria-label=\"X social link\">\n\t\t\t\t\t\t<span class=\"wd-icon\"><\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<a rel=\"noopener noreferrer nofollow\" href=\"mailto:?subject=Check this https:\/\/cyberesponse.eu\/en\/gestion-securisee-du-parc-informatique\/\" target=\"_blank\" class=\"wd-social-icon social-email\" aria-label=\"Email social link\">\n\t\t\t\t\t\t<span class=\"wd-icon\"><\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<a rel=\"noopener noreferrer nofollow\" href=\"https:\/\/www.linkedin.com\/shareArticle?mini=true&url=https:\/\/cyberesponse.eu\/en\/gestion-securisee-du-parc-informatique\/\" target=\"_blank\" class=\"wd-social-icon social-linkedin\" aria-label=\"Linkedin social link\">\n\t\t\t\t\t\t<span class=\"wd-icon\"><\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<a rel=\"noopener noreferrer nofollow\" href=\"https:\/\/api.whatsapp.com\/send?text=https%3A%2F%2Fcyberesponse.eu%2Fen%2Fgestion-securisee-du-parc-informatique%2F\" target=\"_blank\" class=\"whatsapp-desktop  wd-social-icon social-whatsapp\" aria-label=\"WhatsApp social link\">\n\t\t\t\t\t\t<span class=\"wd-icon\"><\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\n\t\t\t\t\t<a rel=\"noopener noreferrer nofollow\" href=\"whatsapp:\/\/send?text=https%3A%2F%2Fcyberesponse.eu%2Fen%2Fgestion-securisee-du-parc-informatique%2F\" target=\"_blank\" class=\"whatsapp-mobile  wd-social-icon social-whatsapp\" aria-label=\"WhatsApp social link\">\n\t\t\t\t\t\t<span class=\"wd-icon\"><\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"right-line\"><\/span>\n\t\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t<\/div>\n\t<\/div>\n<\/article><!-- #post -->\n\n\n\t\t\t\t\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Gestion des acc\u00e8s Ma\u00eetriser la gestion des acc\u00e8s : la cl\u00e9 de la s\u00e9curit\u00e9 informatique en entreprise 30\/01\/2024 Publi\u00e9 par<\/p>","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"rank_math_lock_modified_date":false,"footnotes":""},"_links":{"self":[{"href":"https:\/\/cyberesponse.eu\/en\/wp-json\/wp\/v2\/pages\/16877"}],"collection":[{"href":"https:\/\/cyberesponse.eu\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberesponse.eu\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberesponse.eu\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberesponse.eu\/en\/wp-json\/wp\/v2\/comments?post=16877"}],"version-history":[{"count":8,"href":"https:\/\/cyberesponse.eu\/en\/wp-json\/wp\/v2\/pages\/16877\/revisions"}],"predecessor-version":[{"id":17094,"href":"https:\/\/cyberesponse.eu\/en\/wp-json\/wp\/v2\/pages\/16877\/revisions\/17094"}],"wp:attachment":[{"href":"https:\/\/cyberesponse.eu\/en\/wp-json\/wp\/v2\/media?parent=16877"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}