{"id":16418,"date":"2022-11-21T07:25:09","date_gmt":"2022-11-21T06:25:09","guid":{"rendered":"https:\/\/www.alinto.com\/?p=16418"},"modified":"2024-01-18T21:27:15","modified_gmt":"2024-01-18T20:27:15","slug":"souverainete-et-cybersecurite-sont-elles-intimement-liees","status":"publish","type":"post","link":"https:\/\/www.alinto.com\/fr\/souverainete-et-cybersecurite-sont-elles-intimement-liees\/","title":{"rendered":"Souverainet\u00e9 et cybers\u00e9curit\u00e9 sont-elles intimement li\u00e9es ?"},"content":{"rendered":"<p>\u00c0 l\u2019heure o\u00f9 les cyberattaques sont toujours plus nombreuses et sophistiqu\u00e9es, la cybers\u00e9curit\u00e9 est un pr\u00e9requis \u00e0 la <a href=\"https:\/\/www.alinto.com\/fr\/les-enjeux-de-la-souverainete-numerique\/\">souverainet\u00e9 num\u00e9rique<\/a>. Les syst\u00e8mes d\u2019information gagnent en complexit\u00e9, avec des interconnexions public\/priv\u00e9 aux fronti\u00e8res souvent poreuses. Dans le m\u00eame temps, les volumes d\u2019\u00e9change par email augmentent jour apr\u00e8s jour, offrant autant de portes d\u2019entr\u00e9e pour les cybermenaces.<\/p>\n<p>En mati\u00e8re de protections de donn\u00e9es, <strong>la cybers\u00e9curit\u00e9 et la souverainet\u00e9 sont indissociables<\/strong>. Voici pourquoi.<\/p>\n<h2>La souverainet\u00e9 num\u00e9rique, premi\u00e8re marche pour la protection des donn\u00e9es<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-16424 alignleft\" src=\"https:\/\/www.alinto.com\/wp-content\/uploads\/2022\/11\/AdobeStock_276609005-700x420.jpg\" alt=\"cybers\u00e9curit\u00e9 \" width=\"408\" height=\"245\" srcset=\"https:\/\/www.alinto.com\/wp-content\/uploads\/2022\/11\/AdobeStock_276609005-700x420.jpg 700w, https:\/\/www.alinto.com\/wp-content\/uploads\/2022\/11\/AdobeStock_276609005-1024x614.jpg 1024w, https:\/\/www.alinto.com\/wp-content\/uploads\/2022\/11\/AdobeStock_276609005-768x461.jpg 768w, https:\/\/www.alinto.com\/wp-content\/uploads\/2022\/11\/AdobeStock_276609005-500x300.jpg 500w, https:\/\/www.alinto.com\/wp-content\/uploads\/2022\/11\/AdobeStock_276609005.jpg 1200w\" sizes=\"auto, (max-width: 408px) 100vw, 408px\" \/>Comme \u00e9voqu\u00e9 dans l\u2019article <a href=\"https:\/\/www.alinto.com\/fr\/souverainete-numerique-les-initiatives-europeennes\/\">\u201cSouverainet\u00e9 num\u00e9rique : les initiatives europ\u00e9ennes\u201d<\/a>, la souverainet\u00e9 vise \u00e0 mieux prot\u00e9ger les donn\u00e9es des organisations et des concitoyens europ\u00e9ens. En effet, en utilisant les services d\u2019un partenaire qui se dit souverain, on s\u2019attend \u00e0 ce qu\u2019il n\u2019utilise les donn\u00e9es que pour les usages sp\u00e9cifi\u00e9s, et qu\u2019il ne les divulgue pas. Cette garantie est \u00e9videmment assur\u00e9e par les processus de contr\u00f4le, de stockage et de traitement mis en place, le respect des r\u00e9glementations\u2026 mais aussi par les solutions technologiques utilis\u00e9es (h\u00e9bergement souverain, logiciels open source\u2026).<\/p>\n<p><strong>Les menaces de cyberattaques ou de divulgation des donn\u00e9es sont donc moins importantes en faisant appel \u00e0 un prestataire europ\u00e9en.<\/strong><\/p>\n<h2>La cybers\u00e9curit\u00e9 : protection contre les menaces externes<\/h2>\n<p>Par d\u00e9finition, la cybers\u00e9curit\u00e9 est un ensemble de mesures visant \u00e0 assurer la s\u00e9curit\u00e9 des syst\u00e8mes et donn\u00e9es informatiques contre des actes malveillants. Une cyberattaque peut affecter gravement les entreprises. Elles doivent donc \u00eatre capables de faire face \u00e0 un tel \u00e9v\u00e9nement, et mettre en place des mesures de s\u00e9curisation du SI.<\/p>\n<p>Cela passe, entre autres, par le d\u00e9ploiement de logiciels de protection (antivirus par exemple), par des plans de mise \u00e0 jour des syst\u00e8mes (patches), de syst\u00e8mes d&rsquo;authentification, mais aussi la formation des collaborateurs aux bonnes pratiques de cybers\u00e9curit\u00e9.<\/p>\n<p>Souvent, les entreprises n\u2019ont pas conscience de disposer de donn\u00e9es sensibles, ou pensent qu\u2019une attaque n\u2019arrive qu\u2019aux autres. Malheureusement, le nombre d\u2019incidents ne cesse d\u2019augmenter, et les techniques des cyberattaquants sont de plus en plus sophistiqu\u00e9es.<strong> Les cons\u00e9quences peuvent \u00eatre dramatiques.<\/strong> Par exemple, victime d\u2019 une attaque de type ransomware, le centre hospitalier sud-francilien de Corbeil-Essonnes a vu certaines donn\u00e9es sensibles (DPI, donn\u00e9es personnelles\u2026) divulgu\u00e9es sur Internet suite \u00e0 son refus de payer une ran\u00e7on.<\/p>\n<h2>Pas de souverainet\u00e9, sans cybers\u00e9curit\u00e9<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-16428 alignright\" src=\"https:\/\/www.alinto.com\/wp-content\/uploads\/2022\/11\/AdobeStock_246442495-700x481.jpg\" alt=\"souverainet\u00e9 et cybermenaces\" width=\"428\" height=\"294\" srcset=\"https:\/\/www.alinto.com\/wp-content\/uploads\/2022\/11\/AdobeStock_246442495-700x481.jpg 700w, https:\/\/www.alinto.com\/wp-content\/uploads\/2022\/11\/AdobeStock_246442495-1024x704.jpg 1024w, https:\/\/www.alinto.com\/wp-content\/uploads\/2022\/11\/AdobeStock_246442495-768x528.jpg 768w, https:\/\/www.alinto.com\/wp-content\/uploads\/2022\/11\/AdobeStock_246442495-500x344.jpg 500w, https:\/\/www.alinto.com\/wp-content\/uploads\/2022\/11\/AdobeStock_246442495.jpg 1200w\" sizes=\"auto, (max-width: 428px) 100vw, 428px\" \/>Cela devient une \u00e9vidence : <strong>la souverainet\u00e9 num\u00e9rique seule ne suffit pas \u00e0 prot\u00e9ger les donn\u00e9es sans inclure le volet cybers\u00e9curit\u00e9.<\/strong><\/p>\n<p>La souverainet\u00e9 num\u00e9rique permet certes de mieux ma\u00eetriser ses donn\u00e9es. Cependant, un environnement logiciel ou des applicatifs trop ouverts ou expos\u00e9s vont faire persister certaines failles. La souverainet\u00e9 ne peut donc pas \u00eatre dissoci\u00e9e de la cybers\u00e9curit\u00e9. Cette derni\u00e8re impose d\u2019insuffler les bonnes pratiques au sein des entreprises, ou encore, de construire une offre cyber europ\u00e9enne qui soit une v\u00e9ritable alternative aux solutions des mastodontes am\u00e9ricains.<\/p>\n<p>En attendant qu\u2019un tel dispositif soit d\u00e9ploy\u00e9, les entreprises ne doivent pas n\u00e9gliger l\u2019usage de solutions de cybers\u00e9curit\u00e9 et doivent s\u2019\u00e9quiper d\u2019antivirus, mettre en place des strat\u00e9gies de back up, s\u2019entourer d\u2019experts capables de les accompagner, suivre les conseils des organismes de r\u00e9f\u00e9rences comme l\u2019ANSSI en France et se tourner le plus possible vers des solutions d&rsquo;experts m\u00e9tiers de proximit\u00e9 travaillant sur des <a href=\"https:\/\/www.alinto.com\/fr\/sogo-opensource\/\">solutions open source<\/a>.<\/p>\n<p>Pour poursuivre votre lecture, d\u00e9couvrez notre article sur le sujet <a href=\"https:\/\/www.alinto.com\/fr\/open-source-souverainete-numerique\/\">Open source et souverainet\u00e9 num\u00e9rique<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u00c0 l\u2019heure o\u00f9 les cyberattaques sont toujours plus nombreuses et sophistiqu\u00e9es, la cybers\u00e9curit\u00e9 est un pr\u00e9requis (&#8230;)<\/p>\n","protected":false},"author":9,"featured_media":16420,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[183],"tags":[],"class_list":["post-16418","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-open-source"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Souverainet\u00e9 et cybers\u00e9curit\u00e9 sont-elles intimement li\u00e9es ?<\/title>\n<meta name=\"description\" content=\"\u00c0 l\u2019heure o\u00f9 les cyberattaques sont toujours plus nombreuses et sophistiqu\u00e9es, la cybers\u00e9curit\u00e9 est un pr\u00e9requis \u00e0 la souverainet\u00e9 num\u00e9rique.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.alinto.com\/fr\/souverainete-et-cybersecurite-sont-elles-intimement-liees\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Souverainet\u00e9 et cybers\u00e9curit\u00e9 sont-elles intimement li\u00e9es ?\" \/>\n<meta property=\"og:description\" content=\"\u00c0 l\u2019heure o\u00f9 les cyberattaques sont toujours plus nombreuses et sophistiqu\u00e9es, la cybers\u00e9curit\u00e9 est un pr\u00e9requis \u00e0 la souverainet\u00e9 num\u00e9rique.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.alinto.com\/fr\/souverainete-et-cybersecurite-sont-elles-intimement-liees\/\" \/>\n<meta property=\"og:site_name\" content=\"Alinto\" \/>\n<meta property=\"article:published_time\" content=\"2022-11-21T06:25:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-18T20:27:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.alinto.com\/wp-content\/uploads\/2022\/11\/AdobeStock_422695214.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"621\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Rodolphe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@rfrering@alinto.net\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Rodolphe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.alinto.com\\\/fr\\\/souverainete-et-cybersecurite-sont-elles-intimement-liees\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.alinto.com\\\/fr\\\/souverainete-et-cybersecurite-sont-elles-intimement-liees\\\/\"},\"author\":{\"name\":\"Rodolphe\",\"@id\":\"https:\\\/\\\/www.alinto.com\\\/fr\\\/#\\\/schema\\\/person\\\/4b8003811ac2b1c38db595ffb531b297\"},\"headline\":\"Souverainet\u00e9 et cybers\u00e9curit\u00e9 sont-elles intimement li\u00e9es ?\",\"datePublished\":\"2022-11-21T06:25:09+00:00\",\"dateModified\":\"2024-01-18T20:27:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.alinto.com\\\/fr\\\/souverainete-et-cybersecurite-sont-elles-intimement-liees\\\/\"},\"wordCount\":630,\"publisher\":{\"@id\":\"https:\\\/\\\/www.alinto.com\\\/fr\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.alinto.com\\\/fr\\\/souverainete-et-cybersecurite-sont-elles-intimement-liees\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.alinto.com\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/AdobeStock_422695214.jpg\",\"articleSection\":[\"Open source\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.alinto.com\\\/fr\\\/souverainete-et-cybersecurite-sont-elles-intimement-liees\\\/\",\"url\":\"https:\\\/\\\/www.alinto.com\\\/fr\\\/souverainete-et-cybersecurite-sont-elles-intimement-liees\\\/\",\"name\":\"Souverainet\u00e9 et cybers\u00e9curit\u00e9 sont-elles intimement li\u00e9es ?\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.alinto.com\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.alinto.com\\\/fr\\\/souverainete-et-cybersecurite-sont-elles-intimement-liees\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.alinto.com\\\/fr\\\/souverainete-et-cybersecurite-sont-elles-intimement-liees\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.alinto.com\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/AdobeStock_422695214.jpg\",\"datePublished\":\"2022-11-21T06:25:09+00:00\",\"dateModified\":\"2024-01-18T20:27:15+00:00\",\"description\":\"\u00c0 l\u2019heure o\u00f9 les cyberattaques sont toujours plus nombreuses et sophistiqu\u00e9es, la cybers\u00e9curit\u00e9 est un pr\u00e9requis \u00e0 la souverainet\u00e9 num\u00e9rique.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.alinto.com\\\/fr\\\/souverainete-et-cybersecurite-sont-elles-intimement-liees\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.alinto.com\\\/fr\\\/souverainete-et-cybersecurite-sont-elles-intimement-liees\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.alinto.com\\\/fr\\\/souverainete-et-cybersecurite-sont-elles-intimement-liees\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.alinto.com\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/AdobeStock_422695214.jpg\",\"contentUrl\":\"https:\\\/\\\/www.alinto.com\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/AdobeStock_422695214.jpg\",\"width\":1200,\"height\":621,\"caption\":\"souverainet\u00e9 et cybers\u00e9curit\u00e9\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.alinto.com\\\/fr\\\/souverainete-et-cybersecurite-sont-elles-intimement-liees\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/www.alinto.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Souverainet\u00e9 et cybers\u00e9curit\u00e9 sont-elles intimement li\u00e9es ?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.alinto.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/www.alinto.com\\\/fr\\\/\",\"name\":\"Alinto\",\"description\":\"Solutions email &amp; securit\u00e9 email\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.alinto.com\\\/fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.alinto.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.alinto.com\\\/fr\\\/#organization\",\"name\":\"Alinto\",\"url\":\"https:\\\/\\\/www.alinto.com\\\/fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.alinto.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.alinto.com\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/logo-alinto-1-1.svg\",\"contentUrl\":\"https:\\\/\\\/www.alinto.com\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/logo-alinto-1-1.svg\",\"caption\":\"Alinto\"},\"image\":{\"@id\":\"https:\\\/\\\/www.alinto.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.alinto.com\\\/fr\\\/#\\\/schema\\\/person\\\/4b8003811ac2b1c38db595ffb531b297\",\"name\":\"Rodolphe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/76b25f131e5166b4b5a6f3bf46d5f761868d10852374c4b64c26defa0f63e537?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/76b25f131e5166b4b5a6f3bf46d5f761868d10852374c4b64c26defa0f63e537?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/76b25f131e5166b4b5a6f3bf46d5f761868d10852374c4b64c26defa0f63e537?s=96&d=mm&r=g\",\"caption\":\"Rodolphe\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/rfrering@alinto.net\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Souverainet\u00e9 et cybers\u00e9curit\u00e9 sont-elles intimement li\u00e9es ?","description":"\u00c0 l\u2019heure o\u00f9 les cyberattaques sont toujours plus nombreuses et sophistiqu\u00e9es, la cybers\u00e9curit\u00e9 est un pr\u00e9requis \u00e0 la souverainet\u00e9 num\u00e9rique.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.alinto.com\/fr\/souverainete-et-cybersecurite-sont-elles-intimement-liees\/","og_locale":"fr_FR","og_type":"article","og_title":"Souverainet\u00e9 et cybers\u00e9curit\u00e9 sont-elles intimement li\u00e9es ?","og_description":"\u00c0 l\u2019heure o\u00f9 les cyberattaques sont toujours plus nombreuses et sophistiqu\u00e9es, la cybers\u00e9curit\u00e9 est un pr\u00e9requis \u00e0 la souverainet\u00e9 num\u00e9rique.","og_url":"https:\/\/www.alinto.com\/fr\/souverainete-et-cybersecurite-sont-elles-intimement-liees\/","og_site_name":"Alinto","article_published_time":"2022-11-21T06:25:09+00:00","article_modified_time":"2024-01-18T20:27:15+00:00","og_image":[{"width":1200,"height":621,"url":"https:\/\/www.alinto.com\/wp-content\/uploads\/2022\/11\/AdobeStock_422695214.jpg","type":"image\/jpeg"}],"author":"Rodolphe","twitter_card":"summary_large_image","twitter_creator":"@rfrering@alinto.net","twitter_misc":{"\u00c9crit par":"Rodolphe","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.alinto.com\/fr\/souverainete-et-cybersecurite-sont-elles-intimement-liees\/#article","isPartOf":{"@id":"https:\/\/www.alinto.com\/fr\/souverainete-et-cybersecurite-sont-elles-intimement-liees\/"},"author":{"name":"Rodolphe","@id":"https:\/\/www.alinto.com\/fr\/#\/schema\/person\/4b8003811ac2b1c38db595ffb531b297"},"headline":"Souverainet\u00e9 et cybers\u00e9curit\u00e9 sont-elles intimement li\u00e9es ?","datePublished":"2022-11-21T06:25:09+00:00","dateModified":"2024-01-18T20:27:15+00:00","mainEntityOfPage":{"@id":"https:\/\/www.alinto.com\/fr\/souverainete-et-cybersecurite-sont-elles-intimement-liees\/"},"wordCount":630,"publisher":{"@id":"https:\/\/www.alinto.com\/fr\/#organization"},"image":{"@id":"https:\/\/www.alinto.com\/fr\/souverainete-et-cybersecurite-sont-elles-intimement-liees\/#primaryimage"},"thumbnailUrl":"https:\/\/www.alinto.com\/wp-content\/uploads\/2022\/11\/AdobeStock_422695214.jpg","articleSection":["Open source"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.alinto.com\/fr\/souverainete-et-cybersecurite-sont-elles-intimement-liees\/","url":"https:\/\/www.alinto.com\/fr\/souverainete-et-cybersecurite-sont-elles-intimement-liees\/","name":"Souverainet\u00e9 et cybers\u00e9curit\u00e9 sont-elles intimement li\u00e9es ?","isPartOf":{"@id":"https:\/\/www.alinto.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.alinto.com\/fr\/souverainete-et-cybersecurite-sont-elles-intimement-liees\/#primaryimage"},"image":{"@id":"https:\/\/www.alinto.com\/fr\/souverainete-et-cybersecurite-sont-elles-intimement-liees\/#primaryimage"},"thumbnailUrl":"https:\/\/www.alinto.com\/wp-content\/uploads\/2022\/11\/AdobeStock_422695214.jpg","datePublished":"2022-11-21T06:25:09+00:00","dateModified":"2024-01-18T20:27:15+00:00","description":"\u00c0 l\u2019heure o\u00f9 les cyberattaques sont toujours plus nombreuses et sophistiqu\u00e9es, la cybers\u00e9curit\u00e9 est un pr\u00e9requis \u00e0 la souverainet\u00e9 num\u00e9rique.","breadcrumb":{"@id":"https:\/\/www.alinto.com\/fr\/souverainete-et-cybersecurite-sont-elles-intimement-liees\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.alinto.com\/fr\/souverainete-et-cybersecurite-sont-elles-intimement-liees\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.alinto.com\/fr\/souverainete-et-cybersecurite-sont-elles-intimement-liees\/#primaryimage","url":"https:\/\/www.alinto.com\/wp-content\/uploads\/2022\/11\/AdobeStock_422695214.jpg","contentUrl":"https:\/\/www.alinto.com\/wp-content\/uploads\/2022\/11\/AdobeStock_422695214.jpg","width":1200,"height":621,"caption":"souverainet\u00e9 et cybers\u00e9curit\u00e9"},{"@type":"BreadcrumbList","@id":"https:\/\/www.alinto.com\/fr\/souverainete-et-cybersecurite-sont-elles-intimement-liees\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.alinto.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Souverainet\u00e9 et cybers\u00e9curit\u00e9 sont-elles intimement li\u00e9es ?"}]},{"@type":"WebSite","@id":"https:\/\/www.alinto.com\/fr\/#website","url":"https:\/\/www.alinto.com\/fr\/","name":"Alinto","description":"Solutions email &amp; securit\u00e9 email","publisher":{"@id":"https:\/\/www.alinto.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.alinto.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.alinto.com\/fr\/#organization","name":"Alinto","url":"https:\/\/www.alinto.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.alinto.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.alinto.com\/wp-content\/uploads\/2022\/04\/logo-alinto-1-1.svg","contentUrl":"https:\/\/www.alinto.com\/wp-content\/uploads\/2022\/04\/logo-alinto-1-1.svg","caption":"Alinto"},"image":{"@id":"https:\/\/www.alinto.com\/fr\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.alinto.com\/fr\/#\/schema\/person\/4b8003811ac2b1c38db595ffb531b297","name":"Rodolphe","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/76b25f131e5166b4b5a6f3bf46d5f761868d10852374c4b64c26defa0f63e537?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/76b25f131e5166b4b5a6f3bf46d5f761868d10852374c4b64c26defa0f63e537?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/76b25f131e5166b4b5a6f3bf46d5f761868d10852374c4b64c26defa0f63e537?s=96&d=mm&r=g","caption":"Rodolphe"},"sameAs":["https:\/\/x.com\/rfrering@alinto.net"]}]}},"_links":{"self":[{"href":"https:\/\/www.alinto.com\/fr\/wp-json\/wp\/v2\/posts\/16418","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.alinto.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.alinto.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.alinto.com\/fr\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.alinto.com\/fr\/wp-json\/wp\/v2\/comments?post=16418"}],"version-history":[{"count":0,"href":"https:\/\/www.alinto.com\/fr\/wp-json\/wp\/v2\/posts\/16418\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.alinto.com\/fr\/wp-json\/wp\/v2\/media\/16420"}],"wp:attachment":[{"href":"https:\/\/www.alinto.com\/fr\/wp-json\/wp\/v2\/media?parent=16418"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.alinto.com\/fr\/wp-json\/wp\/v2\/categories?post=16418"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.alinto.com\/fr\/wp-json\/wp\/v2\/tags?post=16418"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}