{"id":21,"count":68,"description":"Les donn\u00e9es sensibles des entreprises, y compris dans les syst\u00e8mes SAP, sont une cible attrayante pour les pirates informatiques.  Comment les entreprises peuvent-elles se prot\u00e9ger le plus efficacement possible contre les derni\u00e8res m\u00e9thodes des cybercriminels ?","link":"https:\/\/e3mag.com\/fr\/categorie\/avis\/securite-informatique\/","name":"Chronique sur la s\u00e9curit\u00e9 informatique","slug":"securite-informatique","taxonomy":"category","parent":7,"meta":[],"acf":[],"_links":{"self":[{"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/categories\/21","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/categories"}],"about":[{"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/taxonomies\/category"}],"up":[{"embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/categories\/7"}],"wp:post_type":[{"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/posts?categories=21"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}