{"id":17944,"date":"2018-12-04T11:29:43","date_gmt":"2018-12-04T10:29:43","guid":{"rendered":"https:\/\/www.oodrive.fr\/?p=17944"},"modified":"2024-05-21T13:08:43","modified_gmt":"2024-05-21T13:08:43","slug":"2019-tendances-technologiques-strategiques-et-predictions-cybersecurite","status":"publish","type":"post","link":"https:\/\/pp2.oodrive.com\/fr\/blog\/actualites\/2019-tendances-technologiques-strategiques-et-predictions-cybersecurite\/","title":{"rendered":"2019 : tendances technologiques strat\u00e9giques et pr\u00e9dictions cybers\u00e9curit\u00e9"},"content":{"rendered":"\n<p>La fin de l\u2019ann\u00e9e sonne l\u2019heure du bilan. C\u2019est g\u00e9n\u00e9ralement l\u2019occasion de faire le point sur les \u00e9v\u00e9nements marquants des 12 derniers mois mais \u00e9galement un moment propice pour imaginer de quoi les 12 suivants seront faits. Le cabinet Gartner a par exemple d\u00e9voil\u00e9 ses grandes tendances pour l\u2019industrie num\u00e9rique ou sa vision pour le DSI du futur. De son c\u00f4t\u00e9, l\u2019\u00e9quipe d\u2019analystes du Threat Lab de WatchGuard a fait ses pr\u00e9dictions en mati\u00e8re de cybers\u00e9curit\u00e9.<\/p>\n\n\n\n<figure class=\"wp-block-image alignleft\"><img fetchpriority=\"high\" decoding=\"async\" width=\"562\" height=\"1024\" src=\"https:\/\/www.oodrive.fr\/wp-content\/uploads\/2018\/11\/pr_499538_top_10_technology_trends_for_2019_infographic-562x1024.png\" alt=\"gartner-predictions-technologiques\" class=\"wp-image-17947\" srcset=\"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2018\/11\/pr_499538_top_10_technology_trends_for_2019_infographic-562x1024.png 562w, https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2018\/11\/pr_499538_top_10_technology_trends_for_2019_infographic-165x300.png 165w, https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2018\/11\/pr_499538_top_10_technology_trends_for_2019_infographic-191x349.png 191w, https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2018\/11\/pr_499538_top_10_technology_trends_for_2019_infographic-228x416.png 228w, https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2018\/11\/pr_499538_top_10_technology_trends_for_2019_infographic-317x578.png 317w, https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2018\/11\/pr_499538_top_10_technology_trends_for_2019_infographic-216x394.png 216w, https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2018\/11\/pr_499538_top_10_technology_trends_for_2019_infographic.png 768w\" sizes=\"(max-width: 562px) 100vw, 562px\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>D\u00e9but novembre, \u00e0 l\u2019occasion de son symposium 2018 organis\u00e9 \u00e0 Barcelone, Gartner a livr\u00e9 ses pr\u00e9dictions en ce qui concerne les grandes tendances qui auront un impact sur le d\u00e9veloppement des syst\u00e8mes d\u2019information en 2019. L\u2019intelligence artificielle, la protection de la vie priv\u00e9e et <a href=\"https:\/\/pp2.oodrive.com\/fr\/blog\/innovation\/la-blockchain-une-base-de-donnees-decentralisee-infalsifiable-et-securisee-2\/\">la blockchain<\/a> sont quelque uns des grands axes sur lesquels le cabinet a particuli\u00e8rement insist\u00e9.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Assurer la confidentialit\u00e9 des donn\u00e9es<\/h2>\n\n\n\n<p>D\u2019apr\u00e8s les analystes du Gartner, la confidentialit\u00e9 sera un sujet majeur \u00e0 l\u2019avenir. La <a href=\"https:\/\/pp2.oodrive.com\/fr\/blog\/reglementation\/protection-donnees-personnelles-reglement-europeen\/\">mise en application du RGPD<\/a> en mai dernier a chang\u00e9 la donne et entrain\u00e9 une v\u00e9ritable prise de conscience aupr\u00e8s de la population. Chaque entreprise doit \u00eatre en mesure aujourd\u2019hui d\u2019assurer \u00e0 ses collaborateurs comme \u00e0 ses clients que les donn\u00e9es qu\u2019on lui a confi\u00e9es sont en s\u00e9curit\u00e9.<\/p>\n\n\n\n<p>De son c\u00f4t\u00e9 WatchGuard a fait ses pr\u00e9dictions en mati\u00e8re de <a href=\"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/cout-failles-securite\/\">s\u00e9curit\u00e9 informatique<\/a>. A quels types de menaces devront faire face les entreprises l\u2019ann\u00e9e prochaine&nbsp;?<\/p>\n\n\n\n<p>\u00ab&nbsp;<em>Les cybercriminels ne cessent de remodeler le paysage des menaces en mettant \u00e0 jour leurs tactiques et en intensifiant leurs attaques contre les entreprises, les gouvernements et m\u00eame l\u2019infrastructure de l\u2019internet en elle-m\u00eame&nbsp;<\/em>\u00bb, a d\u00e9clar\u00e9 Corey Nachreiner, CTO chez WatchGuard Technologies. \u00ab&nbsp;<em>Les entreprises de toutes tailles doivent s\u2019attendre \u00e0 voir appara\u00eetre de nouvelles menaces, se pr\u00e9parer \u00e0 des attaques \u00e9volutives et s\u2019assurer qu\u2019elles sont dot\u00e9es de moyens de d\u00e9fense multicouche pour y faire face<\/em>&nbsp;\u00bb.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Quelles menaces en 2019&nbsp;?<\/h2>\n\n\n\n<p>Dans ses pr\u00e9dictions, l\u2019entreprise fait notamment r\u00e9f\u00e9rence \u00e0 la <a href=\"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/cybersecurite-top-10-des-cyberattaques-frequentes-en-2024\/\">multiplication des cyberattaques<\/a> d\u00e9clench\u00e9es par les Etats-Nations ou encore au piratage des chatbots aliment\u00e9s par l\u2019intelligence artificielle. Les pirates informatiques vont cr\u00e9er des chatbots malicieux sur des sites l\u00e9gitimes pour inciter les internautes \u00e0 t\u00e9l\u00e9charger des fichiers infect\u00e9s ou \u00e0 divulguer des informations sensibles. L\u2019ann\u00e9e 2019 pourrait \u00e9galement \u00eatre marqu\u00e9e par une attaque biom\u00e9trique qui marquera le d\u00e9but de la fin pour les syst\u00e8mes reposant sur une authentification \u00e0 facteur unique.<\/p>\n\n\n\n<p>Pour 2019, WatchGuard met aussi en garde contre les vaporworms, un nouveau genre de malware sans fichier. Ce type d\u2019attaque est assez compliqu\u00e9 \u00e0 d\u00e9tecter car elle s\u2019ex\u00e9cute enti\u00e8rement en m\u00e9moire sans implanter le moindre fichier dans le syst\u00e8me infect\u00e9.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Les tendances 2019 de McAfee<\/h2>\n\n\n\n<p>Pour les experts du McAfee Lab et du centre McAfee Advances Threat Research, l\u2019ann\u00e9e 2019 sera marqu\u00e9e par trois grandes tendances en mati\u00e8re de cybers\u00e9curit\u00e9&nbsp;:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Une cybercriminalit\u00e9 \u00ab\u00a0souterraine\u00a0\u00bb plus forte et plus efficace<\/li>\n\n\n\n<li>Un acc\u00e8s facilit\u00e9 aux nouvelles technologies qui conduit \u00e0 des cyberattaques simplifi\u00e9es<\/li>\n\n\n\n<li>Le cloud, l\u2019IoT domotique et les plateformes de r\u00e9seaux sociaux assaillis par des menaces<\/li>\n<\/ul>\n\n\n\n<p>\u00ab&nbsp;<em>En 2018, nous avons observ\u00e9 une collaboration encore plus forte entre les cybercriminels gr\u00e2ce \u00e0 des alliances clandestines<\/em>&nbsp;\u00bb, explique Raj Samani, Chief scientist chez McAfee. \u00ab <em>Cet \u00e9tat d\u2019esprit collaboratif a rendu les technologies et tactiques clandestines plus efficaces. Cela a permis, en outre, la transformation de certains acteurs malveillants en de v\u00e9ritables adversaires parmi les plus organis\u00e9s au monde. Toutefois, alors que l\u2019on s\u2019attend \u00e0 ce que la collaboration du march\u00e9 clandestin se maintienne en 2019, cette ann\u00e9e sera \u00e9galement marqu\u00e9e par des alliances en mati\u00e8re de cybers\u00e9curit\u00e9 entre les diff\u00e9rents acteurs de l\u2019industrie&nbsp;<\/em>\u00bb.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>La fin de l\u2019ann\u00e9e sonne l\u2019heure du bilan. C\u2019est g\u00e9n\u00e9ralement l\u2019occasion de faire le point sur les \u00e9v\u00e9nements marquants des 12 derniers mois mais \u00e9galement un moment propice pour imaginer de quoi les 12 suivants seront faits. Le cabinet Gartner a par exemple d\u00e9voil\u00e9 ses grandes tendances pour l\u2019industrie num\u00e9rique ou sa vision pour le [&hellip;]<\/p>\n","protected":false},"author":21,"featured_media":18004,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[305],"class_list":["post-17944","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualites"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>2019 : tendances technologiques strat\u00e9giques et pr\u00e9dictions cybers\u00e9curit\u00e9<\/title>\n<meta name=\"description\" content=\"La fin de l\u2019ann\u00e9e est g\u00e9n\u00e9ralement l\u2019occasion de faire le point sur les \u00e9v\u00e9nements marquants des 12 derniers mois mais \u00e9galement d&#039;imaginer les 12 suivants\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"2019 : tendances technologiques strat\u00e9giques et pr\u00e9dictions cybers\u00e9curit\u00e9\" \/>\n<meta property=\"og:description\" content=\"La fin de l\u2019ann\u00e9e est g\u00e9n\u00e9ralement l\u2019occasion de faire le point sur les \u00e9v\u00e9nements marquants des 12 derniers mois mais \u00e9galement d&#039;imaginer les 12 suivants\" \/>\n<meta property=\"og:url\" content=\"https:\/\/pp2.oodrive.com\/fr\/blog\/actualites\/2019-tendances-technologiques-strategiques-et-predictions-cybersecurite\/\" \/>\n<meta property=\"og:site_name\" content=\"Oodrive\" \/>\n<meta property=\"article:published_time\" content=\"2018-12-04T10:29:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-21T13:08:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2018\/12\/new-years-day-3683748_1920.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Lea Vaquero\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lea Vaquero\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/pp2.oodrive.com\/fr\/blog\/actualites\/2019-tendances-technologiques-strategiques-et-predictions-cybersecurite\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/pp2.oodrive.com\/fr\/blog\/actualites\/2019-tendances-technologiques-strategiques-et-predictions-cybersecurite\/\"},\"author\":{\"name\":\"Lea Vaquero\",\"@id\":\"https:\/\/pp2.oodrive.com\/#\/schema\/person\/e3a0ef237a13b8f9852ee65a1de3baaa\"},\"headline\":\"2019 : tendances technologiques strat\u00e9giques et pr\u00e9dictions cybers\u00e9curit\u00e9\",\"datePublished\":\"2018-12-04T10:29:43+00:00\",\"dateModified\":\"2024-05-21T13:08:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/pp2.oodrive.com\/fr\/blog\/actualites\/2019-tendances-technologiques-strategiques-et-predictions-cybersecurite\/\"},\"wordCount\":678,\"publisher\":{\"@id\":\"https:\/\/pp2.oodrive.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/pp2.oodrive.com\/fr\/blog\/actualites\/2019-tendances-technologiques-strategiques-et-predictions-cybersecurite\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2018\/12\/new-years-day-3683748_1920.jpg\",\"articleSection\":[\"Actualit\u00e9s\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/pp2.oodrive.com\/fr\/blog\/actualites\/2019-tendances-technologiques-strategiques-et-predictions-cybersecurite\/\",\"url\":\"https:\/\/pp2.oodrive.com\/fr\/blog\/actualites\/2019-tendances-technologiques-strategiques-et-predictions-cybersecurite\/\",\"name\":\"2019 : tendances technologiques strat\u00e9giques et pr\u00e9dictions cybers\u00e9curit\u00e9\",\"isPartOf\":{\"@id\":\"https:\/\/pp2.oodrive.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/pp2.oodrive.com\/fr\/blog\/actualites\/2019-tendances-technologiques-strategiques-et-predictions-cybersecurite\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/pp2.oodrive.com\/fr\/blog\/actualites\/2019-tendances-technologiques-strategiques-et-predictions-cybersecurite\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2018\/12\/new-years-day-3683748_1920.jpg\",\"datePublished\":\"2018-12-04T10:29:43+00:00\",\"dateModified\":\"2024-05-21T13:08:43+00:00\",\"description\":\"La fin de l\u2019ann\u00e9e est g\u00e9n\u00e9ralement l\u2019occasion de faire le point sur les \u00e9v\u00e9nements marquants des 12 derniers mois mais \u00e9galement d'imaginer les 12 suivants\",\"breadcrumb\":{\"@id\":\"https:\/\/pp2.oodrive.com\/fr\/blog\/actualites\/2019-tendances-technologiques-strategiques-et-predictions-cybersecurite\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/pp2.oodrive.com\/fr\/blog\/actualites\/2019-tendances-technologiques-strategiques-et-predictions-cybersecurite\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/pp2.oodrive.com\/fr\/blog\/actualites\/2019-tendances-technologiques-strategiques-et-predictions-cybersecurite\/#primaryimage\",\"url\":\"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2018\/12\/new-years-day-3683748_1920.jpg\",\"contentUrl\":\"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2018\/12\/new-years-day-3683748_1920.jpg\",\"width\":800,\"height\":400},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/pp2.oodrive.com\/fr\/blog\/actualites\/2019-tendances-technologiques-strategiques-et-predictions-cybersecurite\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/pp2.oodrive.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Actualit\u00e9s\",\"item\":\"https:\/\/pp2.oodrive.com\/fr\/blog\/category\/actualites\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"2019 : tendances technologiques strat\u00e9giques et pr\u00e9dictions cybers\u00e9curit\u00e9\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/pp2.oodrive.com\/#website\",\"url\":\"https:\/\/pp2.oodrive.com\/\",\"name\":\"Oodrive\",\"description\":\"Plateforme de collaboration s\u00e9curis\u00e9e et souveraine, Oodrive propose des solutions pour la gestion de vos donn\u00e9es sensibles : partage de fichier, signature \u00e9lectronique, sauvegarde, ...\",\"publisher\":{\"@id\":\"https:\/\/pp2.oodrive.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/pp2.oodrive.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/pp2.oodrive.com\/#organization\",\"name\":\"Oodrive\",\"url\":\"https:\/\/pp2.oodrive.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/pp2.oodrive.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2021\/12\/oodrive_black_logo.svg\",\"contentUrl\":\"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2021\/12\/oodrive_black_logo.svg\",\"width\":132,\"height\":27,\"caption\":\"Oodrive\"},\"image\":{\"@id\":\"https:\/\/pp2.oodrive.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/pp2.oodrive.com\/#\/schema\/person\/e3a0ef237a13b8f9852ee65a1de3baaa\",\"name\":\"Lea Vaquero\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/pp2.oodrive.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2025\/02\/Photo-de-Lea-96x96.jpg\",\"contentUrl\":\"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2025\/02\/Photo-de-Lea-96x96.jpg\",\"caption\":\"Lea Vaquero\"},\"description\":\"Responsable Marketing Op\u00e9rationnel\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"2019 : tendances technologiques strat\u00e9giques et pr\u00e9dictions cybers\u00e9curit\u00e9","description":"La fin de l\u2019ann\u00e9e est g\u00e9n\u00e9ralement l\u2019occasion de faire le point sur les \u00e9v\u00e9nements marquants des 12 derniers mois mais \u00e9galement d'imaginer les 12 suivants","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"fr_FR","og_type":"article","og_title":"2019 : tendances technologiques strat\u00e9giques et pr\u00e9dictions cybers\u00e9curit\u00e9","og_description":"La fin de l\u2019ann\u00e9e est g\u00e9n\u00e9ralement l\u2019occasion de faire le point sur les \u00e9v\u00e9nements marquants des 12 derniers mois mais \u00e9galement d'imaginer les 12 suivants","og_url":"https:\/\/pp2.oodrive.com\/fr\/blog\/actualites\/2019-tendances-technologiques-strategiques-et-predictions-cybersecurite\/","og_site_name":"Oodrive","article_published_time":"2018-12-04T10:29:43+00:00","article_modified_time":"2024-05-21T13:08:43+00:00","og_image":[{"width":800,"height":400,"url":"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2018\/12\/new-years-day-3683748_1920.jpg","type":"image\/jpeg"}],"author":"Lea Vaquero","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Lea Vaquero","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/pp2.oodrive.com\/fr\/blog\/actualites\/2019-tendances-technologiques-strategiques-et-predictions-cybersecurite\/#article","isPartOf":{"@id":"https:\/\/pp2.oodrive.com\/fr\/blog\/actualites\/2019-tendances-technologiques-strategiques-et-predictions-cybersecurite\/"},"author":{"name":"Lea Vaquero","@id":"https:\/\/pp2.oodrive.com\/#\/schema\/person\/e3a0ef237a13b8f9852ee65a1de3baaa"},"headline":"2019 : tendances technologiques strat\u00e9giques et pr\u00e9dictions cybers\u00e9curit\u00e9","datePublished":"2018-12-04T10:29:43+00:00","dateModified":"2024-05-21T13:08:43+00:00","mainEntityOfPage":{"@id":"https:\/\/pp2.oodrive.com\/fr\/blog\/actualites\/2019-tendances-technologiques-strategiques-et-predictions-cybersecurite\/"},"wordCount":678,"publisher":{"@id":"https:\/\/pp2.oodrive.com\/#organization"},"image":{"@id":"https:\/\/pp2.oodrive.com\/fr\/blog\/actualites\/2019-tendances-technologiques-strategiques-et-predictions-cybersecurite\/#primaryimage"},"thumbnailUrl":"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2018\/12\/new-years-day-3683748_1920.jpg","articleSection":["Actualit\u00e9s"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/pp2.oodrive.com\/fr\/blog\/actualites\/2019-tendances-technologiques-strategiques-et-predictions-cybersecurite\/","url":"https:\/\/pp2.oodrive.com\/fr\/blog\/actualites\/2019-tendances-technologiques-strategiques-et-predictions-cybersecurite\/","name":"2019 : tendances technologiques strat\u00e9giques et pr\u00e9dictions cybers\u00e9curit\u00e9","isPartOf":{"@id":"https:\/\/pp2.oodrive.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/pp2.oodrive.com\/fr\/blog\/actualites\/2019-tendances-technologiques-strategiques-et-predictions-cybersecurite\/#primaryimage"},"image":{"@id":"https:\/\/pp2.oodrive.com\/fr\/blog\/actualites\/2019-tendances-technologiques-strategiques-et-predictions-cybersecurite\/#primaryimage"},"thumbnailUrl":"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2018\/12\/new-years-day-3683748_1920.jpg","datePublished":"2018-12-04T10:29:43+00:00","dateModified":"2024-05-21T13:08:43+00:00","description":"La fin de l\u2019ann\u00e9e est g\u00e9n\u00e9ralement l\u2019occasion de faire le point sur les \u00e9v\u00e9nements marquants des 12 derniers mois mais \u00e9galement d'imaginer les 12 suivants","breadcrumb":{"@id":"https:\/\/pp2.oodrive.com\/fr\/blog\/actualites\/2019-tendances-technologiques-strategiques-et-predictions-cybersecurite\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/pp2.oodrive.com\/fr\/blog\/actualites\/2019-tendances-technologiques-strategiques-et-predictions-cybersecurite\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/pp2.oodrive.com\/fr\/blog\/actualites\/2019-tendances-technologiques-strategiques-et-predictions-cybersecurite\/#primaryimage","url":"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2018\/12\/new-years-day-3683748_1920.jpg","contentUrl":"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2018\/12\/new-years-day-3683748_1920.jpg","width":800,"height":400},{"@type":"BreadcrumbList","@id":"https:\/\/pp2.oodrive.com\/fr\/blog\/actualites\/2019-tendances-technologiques-strategiques-et-predictions-cybersecurite\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/pp2.oodrive.com\/"},{"@type":"ListItem","position":2,"name":"Actualit\u00e9s","item":"https:\/\/pp2.oodrive.com\/fr\/blog\/category\/actualites\/"},{"@type":"ListItem","position":3,"name":"2019 : tendances technologiques strat\u00e9giques et pr\u00e9dictions cybers\u00e9curit\u00e9"}]},{"@type":"WebSite","@id":"https:\/\/pp2.oodrive.com\/#website","url":"https:\/\/pp2.oodrive.com\/","name":"Oodrive","description":"Plateforme de collaboration s\u00e9curis\u00e9e et souveraine, Oodrive propose des solutions pour la gestion de vos donn\u00e9es sensibles : partage de fichier, signature \u00e9lectronique, sauvegarde, ...","publisher":{"@id":"https:\/\/pp2.oodrive.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/pp2.oodrive.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/pp2.oodrive.com\/#organization","name":"Oodrive","url":"https:\/\/pp2.oodrive.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/pp2.oodrive.com\/#\/schema\/logo\/image\/","url":"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2021\/12\/oodrive_black_logo.svg","contentUrl":"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2021\/12\/oodrive_black_logo.svg","width":132,"height":27,"caption":"Oodrive"},"image":{"@id":"https:\/\/pp2.oodrive.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/pp2.oodrive.com\/#\/schema\/person\/e3a0ef237a13b8f9852ee65a1de3baaa","name":"Lea Vaquero","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/pp2.oodrive.com\/#\/schema\/person\/image\/","url":"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2025\/02\/Photo-de-Lea-96x96.jpg","contentUrl":"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2025\/02\/Photo-de-Lea-96x96.jpg","caption":"Lea Vaquero"},"description":"Responsable Marketing Op\u00e9rationnel"}]}},"_links":{"self":[{"href":"https:\/\/pp2.oodrive.com\/fr\/wp-json\/wp\/v2\/posts\/17944","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pp2.oodrive.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pp2.oodrive.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pp2.oodrive.com\/fr\/wp-json\/wp\/v2\/users\/21"}],"replies":[{"embeddable":true,"href":"https:\/\/pp2.oodrive.com\/fr\/wp-json\/wp\/v2\/comments?post=17944"}],"version-history":[{"count":0,"href":"https:\/\/pp2.oodrive.com\/fr\/wp-json\/wp\/v2\/posts\/17944\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pp2.oodrive.com\/fr\/wp-json\/wp\/v2\/media\/18004"}],"wp:attachment":[{"href":"https:\/\/pp2.oodrive.com\/fr\/wp-json\/wp\/v2\/media?parent=17944"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pp2.oodrive.com\/fr\/wp-json\/wp\/v2\/categories?post=17944"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}