{"id":116162,"date":"2022-07-20T10:00:00","date_gmt":"2022-07-20T08:00:00","guid":{"rendered":"http:\/\/e3mag.com\/?p=116162"},"modified":"2022-06-21T11:06:26","modified_gmt":"2022-06-21T09:06:26","slug":"les-investissements-ne-suivent-pas","status":"publish","type":"post","link":"https:\/\/e3mag.com\/fr\/investitionen-halten-nicht-schritt\/","title":{"rendered":"Les investissements ne suivent pas"},"content":{"rendered":"<p>L'\u00e9tude globale \"Identity Security Threat Landscape\" de CyberArk montre que le nombre d'identit\u00e9s humaines et de machines est de plus en plus \u00e9lev\u00e9 dans les entreprises. Ce nombre se chiffre souvent en centaines de milliers. Les entreprises sont donc in\u00e9vitablement confront\u00e9es \u00e0 des risques accrus en mati\u00e8re de cybers\u00e9curit\u00e9. Les tendances telles que la transformation num\u00e9rique, le cloud computing et la cybers\u00e9curit\u00e9 sont autant de d\u00e9fis \u00e0 relever.<br>La migration et les nouvelles techniques d'attaque menacent de plus en plus la s\u00e9curit\u00e9 informatique. Le contournement des mesures de d\u00e9fense (39 %) repr\u00e9sente le plus grand risque pour les personnes interrog\u00e9es, suivi par l'acc\u00e8s aux informations d'identification (37 %) et l'extension des autorisations (37 %). 69 pour cent des entreprises interrog\u00e9es ont \u00e9t\u00e9 touch\u00e9es par des attaques de ransomware au cours de l'ann\u00e9e \u00e9coul\u00e9e. 59 % n'ont rien fait pour s\u00e9curiser leur cha\u00eene d'approvisionnement en logiciels apr\u00e8s l'attaque de SolarWinds, et 66 % admettent que la compromission d'un fournisseur de logiciels signifierait qu'une attaque contre leur entreprise ne peut pas \u00eatre arr\u00eat\u00e9e. <\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"286\" src=\"https:\/\/e3mag.com\/wp-content\/uploads\/2022\/07\/cybersecurity-debt-permeates-organizations.jpg\" alt=\"Surfaces d&#039;attaque Cybers\u00e9curit\u00e9\" class=\"wp-image-116169\" srcset=\"https:\/\/e3mag.com\/wp-content\/uploads\/2022\/07\/cybersecurity-debt-permeates-organizations.jpg 800w, https:\/\/e3mag.com\/wp-content\/uploads\/2022\/07\/cybersecurity-debt-permeates-organizations-768x275.jpg 768w, https:\/\/e3mag.com\/wp-content\/uploads\/2022\/07\/cybersecurity-debt-permeates-organizations-100x36.jpg 100w, https:\/\/e3mag.com\/wp-content\/uploads\/2022\/07\/cybersecurity-debt-permeates-organizations-480x172.jpg 480w, https:\/\/e3mag.com\/wp-content\/uploads\/2022\/07\/cybersecurity-debt-permeates-organizations-640x229.jpg 640w, https:\/\/e3mag.com\/wp-content\/uploads\/2022\/07\/cybersecurity-debt-permeates-organizations-720x257.jpg 720w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><figcaption><em>Les tendances telles que la transformation num\u00e9rique, la migration vers le cloud et les nouvelles techniques d'attaque \u00e9largissent la surface d'attaque pour les cybercriminels. Source : CyberArk.<\/em><\/figcaption><\/figure>\n\n\n\n<p>Les experts en s\u00e9curit\u00e9 s'accordent \u00e0 dire que les initiatives num\u00e9riques de l'entreprise ne sont pas soutenues de mani\u00e8re ad\u00e9quate par les programmes et les outils de s\u00e9curit\u00e9. Par exemple, 73 % des entreprises ont d\u00e9clar\u00e9 qu'au cours des douze derniers mois, elles ont donn\u00e9 la priorit\u00e9 \u00e0 la continuit\u00e9 des activit\u00e9s plut\u00f4t qu'\u00e0 une cybers\u00e9curit\u00e9 solide. En outre, 52 % d\u00e9clarent ne pas avoir mis en place de contr\u00f4les de s\u00e9curit\u00e9 des identit\u00e9s pour leurs applications critiques. C'est dans le secteur de la sant\u00e9 ainsi que dans l'industrie de l'\u00e9nergie et des services publics que les attaques se multiplient, sp\u00e9cialement contre la cha\u00eene d'approvisionnement en logiciels.<\/p>","protected":false},"excerpt":{"rendered":"<p>La majorit\u00e9 des d\u00e9cideurs informatiques en Allemagne estiment que la cybers\u00e9curit\u00e9 a \u00e9t\u00e9 rel\u00e9gu\u00e9e au second plan dans les initiatives commerciales num\u00e9riques au cours de l'ann\u00e9e \u00e9coul\u00e9e.<\/p>","protected":false},"author":38,"featured_media":116164,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pmpro_default_level":"","footnotes":""},"categories":[2,40892],"tags":[17967,26082,40893,5207],"coauthors":[19920],"class_list":["post-116162","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sap-nachrichten","category-mag-22-06","tag-cyberark","tag-cybersicherheit","tag-mag-22-06","tag-sapanoptikum","pmpro-has-access"],"acf":[],"featured_image_urls_v2":{"full":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/06\/shutterstock_287395955_deepadesigns.jpg",1000,450,false],"thumbnail":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/06\/shutterstock_287395955_deepadesigns-150x150.jpg",150,150,true],"medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/06\/shutterstock_287395955_deepadesigns.jpg",400,180,false],"medium_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/06\/shutterstock_287395955_deepadesigns-768x346.jpg",768,346,true],"large":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/06\/shutterstock_287395955_deepadesigns.jpg",1000,450,false],"image-100":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/06\/shutterstock_287395955_deepadesigns-100x45.jpg",100,45,true],"image-480":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/06\/shutterstock_287395955_deepadesigns-480x216.jpg",480,216,true],"image-640":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/06\/shutterstock_287395955_deepadesigns-640x288.jpg",640,288,true],"image-720":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/06\/shutterstock_287395955_deepadesigns-720x324.jpg",720,324,true],"image-960":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/06\/shutterstock_287395955_deepadesigns-960x432.jpg",960,432,true],"image-1168":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/06\/shutterstock_287395955_deepadesigns.jpg",1000,450,false],"image-1440":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/06\/shutterstock_287395955_deepadesigns.jpg",1000,450,false],"image-1920":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/06\/shutterstock_287395955_deepadesigns.jpg",1000,450,false],"1536x1536":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/06\/shutterstock_287395955_deepadesigns.jpg",1000,450,false],"2048x2048":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/06\/shutterstock_287395955_deepadesigns.jpg",1000,450,false],"trp-custom-language-flag":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/06\/shutterstock_287395955_deepadesigns.jpg",18,8,false],"bricks_large_16x9":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/06\/shutterstock_287395955_deepadesigns.jpg",1000,450,false],"bricks_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/06\/shutterstock_287395955_deepadesigns.jpg",1000,450,false],"bricks_large_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/06\/shutterstock_287395955_deepadesigns.jpg",1000,450,false],"bricks_medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/06\/shutterstock_287395955_deepadesigns.jpg",600,270,false],"bricks_medium_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/06\/shutterstock_287395955_deepadesigns.jpg",600,270,false],"profile_24":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/06\/shutterstock_287395955_deepadesigns-24x24.jpg",24,24,true],"profile_48":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/06\/shutterstock_287395955_deepadesigns-48x48.jpg",48,48,true],"profile_96":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/06\/shutterstock_287395955_deepadesigns-96x96.jpg",96,96,true],"profile_150":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/06\/shutterstock_287395955_deepadesigns-150x150.jpg",150,150,true],"profile_300":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/06\/shutterstock_287395955_deepadesigns-300x300.jpg",300,300,true]},"post_excerpt_stackable_v2":"<p>Die Mehrheit der IT-Entscheider in Deutschland ist der Meinung, dass das Thema Cybersicherheit im vergangenen Jahr bei digitalen Gesch\u00e4ftsinitiativen in den Hintergrund getreten ist.<\/p>\n","category_list_v2":"<a href=\"https:\/\/e3mag.com\/fr\/category\/sap-nachrichten\/\" rel=\"category tag\">Community Nachrichten<\/a>, <a href=\"https:\/\/e3mag.com\/fr\/category\/mag-22-06\/\" rel=\"category tag\">Mag 22-06<\/a>","author_info_v2":{"name":"Magazine E-3","url":"https:\/\/e3mag.com\/fr\/author\/e-3-magazin\/"},"comments_num_v2":"0 commentaire","_links":{"self":[{"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/posts\/116162","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/users\/38"}],"replies":[{"embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/comments?post=116162"}],"version-history":[{"count":0,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/posts\/116162\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/media\/116164"}],"wp:attachment":[{"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/media?parent=116162"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/categories?post=116162"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/tags?post=116162"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/coauthors?post=116162"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}