{"id":2929,"date":"2024-05-20T23:20:14","date_gmt":"2024-05-20T21:20:14","guid":{"rendered":"http:\/\/iypxhnp.cluster029.hosting.ovh.net\/index.php\/2024\/05\/20\/liot-cheval-de-troie-dans-la-cybersecurite-des-entreprises\/"},"modified":"2024-05-20T23:20:14","modified_gmt":"2024-05-20T21:20:14","slug":"liot-cheval-de-troie-dans-la-cybersecurite-des-entreprises","status":"publish","type":"post","link":"https:\/\/www.r2ie.org\/index.php\/2024\/05\/20\/liot-cheval-de-troie-dans-la-cybersecurite-des-entreprises\/","title":{"rendered":"L\u2019IoT, cheval de Troie dans la cybers\u00e9curit\u00e9 des entreprises"},"content":{"rendered":"<p>Avec la prolif\u00e9ration des objets connect\u00e9s, la surface d\u2019exposition aux attaques num\u00e9riques ne cesse de cro\u00eetre. Tr\u00e8s peu s\u00e9curis\u00e9, l\u2019IoT est une proie de choix pour des acteurs malveillants souhaitant<br \/>\nL\u2019article L\u2019IoT, cheval de Troie dans la cybers\u00e9curit\u00e9 des entreprises est apparu en premier sur Portail de l&rsquo;IE.\u00a0<a href=\"https:\/\/www.portail-ie.fr\/univers\/risques-et-gouvernance-cyber\/2024\/liot-cheval-de-troie-pour-la-cybersecurite-des-entreprises\/\" target=\"_blank\" class=\"feedzy-rss-link-icon\" rel=\"noopener\">Read More<\/a>\u00a0Portail de l&rsquo;IE\u00a0<\/p>\n<p>\u200b\u00a0\u00a0<\/p>\n<p>\u00a0<\/p>","protected":false},"excerpt":{"rendered":"<p>Avec la prolif\u00e9ration des objets connect\u00e9s, la surface d\u2019exposition aux attaques num\u00e9riques ne cesse de cro\u00eetre. Tr\u00e8s peu s\u00e9curis\u00e9, l\u2019IoT est une proie de choix pour des acteurs malveillants souhaitant L\u2019article L\u2019IoT, cheval de Troie dans la cybers\u00e9curit\u00e9 des entreprises est apparu en premier sur Portail de l&rsquo;IE.\u00a0Read More\u00a0Portail de l&rsquo;IE\u00a0 \u200b\u00a0\u00a0 \u00a0<\/p>\n","protected":false},"author":0,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"footnotes":""},"categories":[12],"tags":[],"class_list":["post-2929","post","type-post","status-publish","format-standard","hentry","category-portail-de-lintelligence-economique"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>L\u2019IoT, cheval de Troie dans la cybers\u00e9curit\u00e9 des entreprises - Revue Internationale d&#039;Intelligence Economique<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.r2ie.org\/index.php\/2024\/05\/20\/liot-cheval-de-troie-dans-la-cybersecurite-des-entreprises\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"L\u2019IoT, cheval de Troie dans la cybers\u00e9curit\u00e9 des entreprises - Revue Internationale d&#039;Intelligence Economique\" \/>\n<meta property=\"og:description\" content=\"Avec la prolif\u00e9ration des objets connect\u00e9s, la surface d\u2019exposition aux attaques num\u00e9riques ne cesse de cro\u00eetre. Tr\u00e8s peu s\u00e9curis\u00e9, l\u2019IoT est une proie de choix pour des acteurs malveillants souhaitant L\u2019article L\u2019IoT, cheval de Troie dans la cybers\u00e9curit\u00e9 des entreprises est apparu en premier sur Portail de l&rsquo;IE.\u00a0Read More\u00a0Portail de l&rsquo;IE\u00a0 \u200b\u00a0\u00a0 \u00a0\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.r2ie.org\/index.php\/2024\/05\/20\/liot-cheval-de-troie-dans-la-cybersecurite-des-entreprises\/\" \/>\n<meta property=\"og:site_name\" content=\"Revue Internationale d&#039;Intelligence Economique\" \/>\n<meta property=\"article:published_time\" content=\"2024-05-20T21:20:14+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.r2ie.org\/index.php\/2024\/05\/20\/liot-cheval-de-troie-dans-la-cybersecurite-des-entreprises\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.r2ie.org\/index.php\/2024\/05\/20\/liot-cheval-de-troie-dans-la-cybersecurite-des-entreprises\/\"},\"author\":{\"name\":\"\",\"@id\":\"\"},\"headline\":\"L\u2019IoT, cheval de Troie dans la cybers\u00e9curit\u00e9 des entreprises\",\"datePublished\":\"2024-05-20T21:20:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.r2ie.org\/index.php\/2024\/05\/20\/liot-cheval-de-troie-dans-la-cybersecurite-des-entreprises\/\"},\"wordCount\":75,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.r2ie.org\/#organization\"},\"articleSection\":[\"Portail de l'intelligence \u00e9conomique\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.r2ie.org\/index.php\/2024\/05\/20\/liot-cheval-de-troie-dans-la-cybersecurite-des-entreprises\/\",\"url\":\"https:\/\/www.r2ie.org\/index.php\/2024\/05\/20\/liot-cheval-de-troie-dans-la-cybersecurite-des-entreprises\/\",\"name\":\"L\u2019IoT, cheval de Troie dans la cybers\u00e9curit\u00e9 des entreprises - Revue Internationale d&#039;Intelligence Economique\",\"isPartOf\":{\"@id\":\"https:\/\/www.r2ie.org\/#website\"},\"datePublished\":\"2024-05-20T21:20:14+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.r2ie.org\/index.php\/2024\/05\/20\/liot-cheval-de-troie-dans-la-cybersecurite-des-entreprises\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.r2ie.org\/index.php\/2024\/05\/20\/liot-cheval-de-troie-dans-la-cybersecurite-des-entreprises\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.r2ie.org\/index.php\/2024\/05\/20\/liot-cheval-de-troie-dans-la-cybersecurite-des-entreprises\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.r2ie.org\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"L\u2019IoT, cheval de Troie dans la cybers\u00e9curit\u00e9 des entreprises\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.r2ie.org\/#website\",\"url\":\"https:\/\/www.r2ie.org\/\",\"name\":\"Revue Internationale d&#039;Intelligence Economique\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.r2ie.org\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.r2ie.org\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.r2ie.org\/#organization\",\"name\":\"Revue Internationale d&#039;Intelligence Economique\",\"url\":\"https:\/\/www.r2ie.org\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.r2ie.org\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.r2ie.org\/wp-content\/uploads\/2023\/01\/cropped-cropped-logo-r2ie-dc3a9gradc3a9.webp\",\"contentUrl\":\"https:\/\/www.r2ie.org\/wp-content\/uploads\/2023\/01\/cropped-cropped-logo-r2ie-dc3a9gradc3a9.webp\",\"width\":654,\"height\":251,\"caption\":\"Revue Internationale d&#039;Intelligence Economique\"},\"image\":{\"@id\":\"https:\/\/www.r2ie.org\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"L\u2019IoT, cheval de Troie dans la cybers\u00e9curit\u00e9 des entreprises - Revue Internationale d&#039;Intelligence Economique","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.r2ie.org\/index.php\/2024\/05\/20\/liot-cheval-de-troie-dans-la-cybersecurite-des-entreprises\/","og_locale":"fr_FR","og_type":"article","og_title":"L\u2019IoT, cheval de Troie dans la cybers\u00e9curit\u00e9 des entreprises - Revue Internationale d&#039;Intelligence Economique","og_description":"Avec la prolif\u00e9ration des objets connect\u00e9s, la surface d\u2019exposition aux attaques num\u00e9riques ne cesse de cro\u00eetre. Tr\u00e8s peu s\u00e9curis\u00e9, l\u2019IoT est une proie de choix pour des acteurs malveillants souhaitant L\u2019article L\u2019IoT, cheval de Troie dans la cybers\u00e9curit\u00e9 des entreprises est apparu en premier sur Portail de l&rsquo;IE.\u00a0Read More\u00a0Portail de l&rsquo;IE\u00a0 \u200b\u00a0\u00a0 \u00a0","og_url":"https:\/\/www.r2ie.org\/index.php\/2024\/05\/20\/liot-cheval-de-troie-dans-la-cybersecurite-des-entreprises\/","og_site_name":"Revue Internationale d&#039;Intelligence Economique","article_published_time":"2024-05-20T21:20:14+00:00","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.r2ie.org\/index.php\/2024\/05\/20\/liot-cheval-de-troie-dans-la-cybersecurite-des-entreprises\/#article","isPartOf":{"@id":"https:\/\/www.r2ie.org\/index.php\/2024\/05\/20\/liot-cheval-de-troie-dans-la-cybersecurite-des-entreprises\/"},"author":{"name":"","@id":""},"headline":"L\u2019IoT, cheval de Troie dans la cybers\u00e9curit\u00e9 des entreprises","datePublished":"2024-05-20T21:20:14+00:00","mainEntityOfPage":{"@id":"https:\/\/www.r2ie.org\/index.php\/2024\/05\/20\/liot-cheval-de-troie-dans-la-cybersecurite-des-entreprises\/"},"wordCount":75,"commentCount":0,"publisher":{"@id":"https:\/\/www.r2ie.org\/#organization"},"articleSection":["Portail de l'intelligence \u00e9conomique"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.r2ie.org\/index.php\/2024\/05\/20\/liot-cheval-de-troie-dans-la-cybersecurite-des-entreprises\/","url":"https:\/\/www.r2ie.org\/index.php\/2024\/05\/20\/liot-cheval-de-troie-dans-la-cybersecurite-des-entreprises\/","name":"L\u2019IoT, cheval de Troie dans la cybers\u00e9curit\u00e9 des entreprises - Revue Internationale d&#039;Intelligence Economique","isPartOf":{"@id":"https:\/\/www.r2ie.org\/#website"},"datePublished":"2024-05-20T21:20:14+00:00","breadcrumb":{"@id":"https:\/\/www.r2ie.org\/index.php\/2024\/05\/20\/liot-cheval-de-troie-dans-la-cybersecurite-des-entreprises\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.r2ie.org\/index.php\/2024\/05\/20\/liot-cheval-de-troie-dans-la-cybersecurite-des-entreprises\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.r2ie.org\/index.php\/2024\/05\/20\/liot-cheval-de-troie-dans-la-cybersecurite-des-entreprises\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.r2ie.org\/"},{"@type":"ListItem","position":2,"name":"L\u2019IoT, cheval de Troie dans la cybers\u00e9curit\u00e9 des entreprises"}]},{"@type":"WebSite","@id":"https:\/\/www.r2ie.org\/#website","url":"https:\/\/www.r2ie.org\/","name":"Revue Internationale d&#039;Intelligence Economique","description":"","publisher":{"@id":"https:\/\/www.r2ie.org\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.r2ie.org\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.r2ie.org\/#organization","name":"Revue Internationale d&#039;Intelligence Economique","url":"https:\/\/www.r2ie.org\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.r2ie.org\/#\/schema\/logo\/image\/","url":"https:\/\/www.r2ie.org\/wp-content\/uploads\/2023\/01\/cropped-cropped-logo-r2ie-dc3a9gradc3a9.webp","contentUrl":"https:\/\/www.r2ie.org\/wp-content\/uploads\/2023\/01\/cropped-cropped-logo-r2ie-dc3a9gradc3a9.webp","width":654,"height":251,"caption":"Revue Internationale d&#039;Intelligence Economique"},"image":{"@id":"https:\/\/www.r2ie.org\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.r2ie.org\/index.php\/wp-json\/wp\/v2\/posts\/2929","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.r2ie.org\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.r2ie.org\/index.php\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/www.r2ie.org\/index.php\/wp-json\/wp\/v2\/comments?post=2929"}],"version-history":[{"count":0,"href":"https:\/\/www.r2ie.org\/index.php\/wp-json\/wp\/v2\/posts\/2929\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.r2ie.org\/index.php\/wp-json\/wp\/v2\/media?parent=2929"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.r2ie.org\/index.php\/wp-json\/wp\/v2\/categories?post=2929"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.r2ie.org\/index.php\/wp-json\/wp\/v2\/tags?post=2929"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}