{"id":56654,"date":"2019-03-22T07:00:18","date_gmt":"2019-03-22T06:00:18","guid":{"rendered":"http:\/\/e3mag.com\/?p=56654"},"modified":"2020-02-09T14:40:22","modified_gmt":"2020-02-09T13:40:22","slug":"les-tendances-de-la-securite-informatique-en-2019","status":"publish","type":"post","link":"https:\/\/e3mag.com\/fr\/les-tendances-de-la-securite-informatique-en-2019\/","title":{"rendered":"Voici les tendances en mati\u00e8re de s\u00e9curit\u00e9 informatique pour 2019"},"content":{"rendered":"<p>Pour Norbert Pohlmann, expert en s\u00e9curit\u00e9 et membre du conseil d'administration d'Eco, les questions de cybers\u00e9curit\u00e9 li\u00e9es \u00e0 l'intelligence artificielle sont le sujet tendance dominant de 2019.<\/p>\n<p><em>\"Les syst\u00e8mes de cybers\u00e9curit\u00e9 qui prennent en compte l'intelligence artificielle (IA) aideront \u00e0 l'avenir \u00e0 d\u00e9tecter beaucoup mieux les pirates intelligents et leurs attaques. Cela minimise les risques dans le processus de num\u00e9risation souhait\u00e9\".<\/em><\/p>\n<p>dit Pohlmann. Avec l'aide de l'intelligence artificielle, le taux de d\u00e9tection des attaques dans le r\u00e9seau et dans les terminaux informatiques comme les smartphones, les ordinateurs portables, les serveurs ou dans l'Internet des objets pourrait \u00eatre consid\u00e9rablement augment\u00e9.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-56655\" src=\"https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/Pohlmann-Norbert.jpg\" alt=\"Pohlmann Norbert\" width=\"800\" height=\"800\" srcset=\"https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/Pohlmann-Norbert.jpg 800w, https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/Pohlmann-Norbert-150x150.jpg 150w, https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/Pohlmann-Norbert-768x768.jpg 768w, https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/Pohlmann-Norbert-100x100.jpg 100w, https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/Pohlmann-Norbert-480x480.jpg 480w, https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/Pohlmann-Norbert-640x640.jpg 640w, https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/Pohlmann-Norbert-720x720.jpg 720w, https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/Pohlmann-Norbert-24x24.jpg 24w, https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/Pohlmann-Norbert-48x48.jpg 48w, https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/Pohlmann-Norbert-96x96.jpg 96w, https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/Pohlmann-Norbert-300x300.jpg 300w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/p>\n<p>La majorit\u00e9 des d\u00e9cideurs d'entreprise en Allemagne sont du m\u00eame avis.<\/p>\n<p><em>\"L'IA et l'apprentissage automatique peuvent aider les responsables de la cybers\u00e9curit\u00e9 dans leurs t\u00e2ches de routine, par exemple pour \u00e9valuer correctement les alertes de s\u00e9curit\u00e9\".<\/em><\/p>\n<p>environ 72 % des 541 d\u00e9cideurs d'entreprise interrog\u00e9s sur ce th\u00e8me fin 2018 par l'institut d'\u00e9tudes de march\u00e9 et d'opinion YouGov pour le compte d'Eco sont d'accord avec cette affirmation.<\/p>\n<p>65 % des personnes interrog\u00e9es ont d\u00e9clar\u00e9 que les m\u00e9thodes d'IA devraient \u00eatre utilis\u00e9es d\u00e8s aujourd'hui pour lutter contre les cyber-attaques. 59 % pensent m\u00eame que dans quelques ann\u00e9es, les syst\u00e8mes d'IA prendront en charge la d\u00e9fense contre les cyberattaques de mani\u00e8re largement autonome.<\/p>\n<h3>Les cybercriminels misent davantage sur l'IA en 2019<\/h3>\n<p>Oliver Dehning, responsable du groupe de comp\u00e9tence S\u00e9curit\u00e9 au sein de l'association Eco, abonde dans ce sens, car les cybercriminels s'\u00e9quipent eux aussi en cons\u00e9quence avec l'intelligence artificielle.<\/p>\n<p><em>\"Les m\u00e9thodes d'IA sont aujourd'hui de plus en plus utilis\u00e9es du c\u00f4t\u00e9 des attaquants - ne serait-ce que pour cette raison, nous devons nous en pr\u00e9occuper\".<\/em><\/p>\n<p>dit Dehning, qui relativise en m\u00eame temps les attentes des d\u00e9cideurs d'entreprise interrog\u00e9s.<\/p>\n<p><em><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-56656\" src=\"https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/Dehning-Oliver.jpg\" alt=\"Dehning Oliver\" width=\"800\" height=\"800\" srcset=\"https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/Dehning-Oliver.jpg 800w, https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/Dehning-Oliver-150x150.jpg 150w, https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/Dehning-Oliver-768x768.jpg 768w, https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/Dehning-Oliver-100x100.jpg 100w, https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/Dehning-Oliver-480x480.jpg 480w, https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/Dehning-Oliver-640x640.jpg 640w, https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/Dehning-Oliver-720x720.jpg 720w, https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/Dehning-Oliver-24x24.jpg 24w, https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/Dehning-Oliver-48x48.jpg 48w, https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/Dehning-Oliver-96x96.jpg 96w, https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/Dehning-Oliver-300x300.jpg 300w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/em><\/p>\n<p><em>\"L'IA appara\u00eet actuellement \u00e0 beaucoup comme une arme miracle - mais il n'est pas encore possible de r\u00e9pondre clairement \u00e0 la question de savoir si l'IA r\u00e9pondra pleinement aux attentes \u00e9lev\u00e9es d\u00e8s cette ann\u00e9e\".<\/em><\/p>\n<p>Dehning cite la s\u00e9curit\u00e9 pour l'Internet des objets (IoT) comme une autre tendance en mati\u00e8re de s\u00e9curit\u00e9 informatique pour 2019.<\/p>\n<p><em>\"Les appareils IoT sont de plus en plus souvent la cible d'attaques - souvent pas du tout pour attaquer l'appareil lui-m\u00eame ou son fonctionnement, mais pour utiliser l'appareil dans le cadre d'un r\u00e9seau de bots pour des attaques massives contre d'autres infrastructures\".<\/em><\/p>\n<p>dit Dehning.<\/p>","protected":false},"excerpt":{"rendered":"<p>L'IA peut soutenir la cybers\u00e9curit\u00e9, pense la majorit\u00e9 des d\u00e9cideurs d'entreprise - et ils ont raison.<\/p>","protected":false},"author":38,"featured_media":56657,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pmpro_default_level":"","footnotes":""},"categories":[2,27969],"tags":[26082,369,624,18159],"coauthors":[19920],"class_list":["post-56654","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sap-nachrichten","category-mag-1902","tag-cybersicherheit","tag-it","tag-ki-joule","tag-kuenstlicher-intelligenz","pmpro-has-access"],"acf":[],"featured_image_urls_v2":{"full":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_1090002608.jpg",1000,450,false],"thumbnail":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_1090002608-150x150.jpg",150,150,true],"medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_1090002608.jpg",400,180,false],"medium_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_1090002608-768x346.jpg",768,346,true],"large":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_1090002608.jpg",1000,450,false],"image-100":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_1090002608-100x45.jpg",100,45,true],"image-480":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_1090002608-480x216.jpg",480,216,true],"image-640":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_1090002608-640x288.jpg",640,288,true],"image-720":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_1090002608-720x324.jpg",720,324,true],"image-960":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_1090002608-960x432.jpg",960,432,true],"image-1168":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_1090002608.jpg",1000,450,false],"image-1440":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_1090002608.jpg",1000,450,false],"image-1920":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_1090002608.jpg",1000,450,false],"1536x1536":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_1090002608.jpg",1000,450,false],"2048x2048":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_1090002608.jpg",1000,450,false],"trp-custom-language-flag":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_1090002608.jpg",18,8,false],"bricks_large_16x9":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_1090002608.jpg",1000,450,false],"bricks_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_1090002608.jpg",1000,450,false],"bricks_large_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_1090002608.jpg",1000,450,false],"bricks_medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_1090002608.jpg",600,270,false],"bricks_medium_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_1090002608.jpg",600,270,false],"profile_24":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_1090002608-24x24.jpg",24,24,true],"profile_48":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_1090002608-48x48.jpg",48,48,true],"profile_96":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_1090002608-96x96.jpg",96,96,true],"profile_150":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_1090002608-150x150.jpg",150,150,true],"profile_300":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_1090002608-300x300.jpg",300,300,true]},"post_excerpt_stackable_v2":"<p>KI kann Cyber-Security unterst\u00fctzen, glaubt die Mehrheit der Unternehmensentscheider \u2013 und liegt damit goldrichtig.<\/p>\n","category_list_v2":"<a href=\"https:\/\/e3mag.com\/fr\/categorie\/sap-nouvelles\/\" rel=\"category tag\">Community Nachrichten<\/a>, <a href=\"https:\/\/e3mag.com\/fr\/categorie\/mag-1902\/\" rel=\"category tag\">MAG 19-02<\/a>","author_info_v2":{"name":"Magazine E-3","url":"https:\/\/e3mag.com\/fr\/author\/e-3-magazin\/"},"comments_num_v2":"0 commentaire","_links":{"self":[{"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/posts\/56654","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/users\/38"}],"replies":[{"embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/comments?post=56654"}],"version-history":[{"count":0,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/posts\/56654\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/media\/56657"}],"wp:attachment":[{"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/media?parent=56654"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/categories?post=56654"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/tags?post=56654"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/coauthors?post=56654"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}