{"id":131810,"date":"2018-01-29T17:59:31","date_gmt":"2018-01-29T17:59:31","guid":{"rendered":"https:\/\/\/quand-lia-saventure-dans-le-labyrinthe-de-la-cyber-securite\/"},"modified":"2018-01-29T17:59:31","modified_gmt":"2018-01-29T17:59:31","slug":"quand-lia-saventure-dans-le-labyrinthe-de-la-cyber-securite","status":"publish","type":"post","link":"https:\/\/www.ecinews.fr\/fr\/quand-lia-saventure-dans-le-labyrinthe-de-la-cyber-securite\/","title":{"rendered":"Quand l&rsquo;IA s&rsquo;aventure dans le labyrinthe de la cyber-s\u00e9curit\u00e9"},"content":{"rendered":"<p><span id=\"result_box\" lang=\"fr\"><span title=\"Broadly, the focus was on how to secure the cyberspace, protecting the digital services and infrastructures that nations and citizens have come to depend upon, implementing the right tools to protect data, &quot;a strategic asset&quot; as put it Juri Luik, Estonia's Minister of\">Globalement, l&rsquo;accent a \u00e9t\u00e9 mis sur la s\u00e9curisation du cyberespace, la protection des services et des infrastructures num\u00e9riques dont d\u00e9pendent d\u00e9sormais les nations et les citoyens, la mise en \u0153uvre des bons outils de protection des donn\u00e9es, \u00abun atout strat\u00e9gique\u00bb comme affirm\u00e9 par Juri Luik, Ministre de la <\/span><span title=\"Defence who came to testify how his country had been the first in Europe to suffer a full-out cyberattack from its Russian neighbour.\n\n\">D\u00e9fense de l&rsquo;Estonie qui est venu t\u00e9moigner comment son pays avait \u00e9t\u00e9 le premier en Europe \u00e0 subir une cyberattaque compl\u00e8te de son voisin russe.<\/span><\/span><\/p>\n<p><span id=\"result_box\" lang=\"fr\"><span title=\"&quot;Unlike in the past, the defence sector depends on the civilian sector that is driving the technology, innovation is led by the private sector and the state has to adjust to that. All states shall invest in cybersecurity as national borders do not exist in the\">\u00ab\u00a0Contrairement au pass\u00e9, le secteur de la d\u00e9fense d\u00e9pend du secteur civil qui pilote la technologie, l&rsquo;innovation est dirig\u00e9e par le secteur priv\u00e9 et l&rsquo;Etat doit s&rsquo;y adapter.\u00a0\u00bb Tous les Etats doivent investir dans la cybers\u00e9curit\u00e9 car les fronti\u00e8res nationales n&rsquo;existent pas dans <\/span><span title=\"cyberspace where everything is merged into one battlefield&quot;, Luik said during a plenary session titled &quot;Innovation and Cybersecurity&quot;.\n\n\">le cyberespace o\u00f9 tout est fusionn\u00e9 en un seul champ de bataille \u00ab\u00a0, a d\u00e9clar\u00e9 Luik lors d&rsquo;une s\u00e9ance pl\u00e9ni\u00e8re intitul\u00e9e\u00a0\u00bb Innovation et cybers\u00e9curit\u00e9 \u00ab\u00a0.<\/span><span title=\"&quot;It is not just a technical matter for tech junkies, but it impacts politics too&quot; he added, mentioning last year's European-level cyber defence exercises focusing on situational awareness, crisis response mechanisms and strategic communication.\n\">\u00ab\u00a0Ce n&rsquo;est pas seulement une question technique pour les mordus de la technologie, mais cela a aussi un impact sur la politique\u00a0\u00bb, at-il ajout\u00e9, mentionnant les exercices de cyberd\u00e9fense au niveau Europ\u00e9en de l&rsquo;ann\u00e9e derni\u00e8re ax\u00e9s sur la conscience situationnelle, les m\u00e9canismes de r\u00e9ponse aux crises et la communication strat\u00e9gique.<\/span><\/span><br \/>\n&nbsp;<\/p>\n<figure class=\"image\" style=\"float:right\"><img decoding=\"async\" alt=\"\" height=\"263\" data-src=\"http:\/\/www.eenewseurope.com\/sites\/default\/files\/images\/01-picture-library\/eenews\/2018\/n-fic1-florence-parly.jpg\" width=\"350\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" class=\"lazyload\" style=\"--smush-placeholder-width: 350px; --smush-placeholder-aspect-ratio: 350\/263;\" \/><figcaption>Florence Parly, ministre fran\u00e7aise des forces arm\u00e9es au FIC.<\/figcaption><\/figure>\n<p><span id=\"result_box\" lang=\"fr\"><span title=\"Florence Parly, France's Minister of the Armed Forces joined Luik on stage to highlight the necessary cooperation between all the European states on cybersecurity.\">Florence Parly, ministre fran\u00e7aise des Forces arm\u00e9es, a rejoint Luik sur la tribune pour souligner la n\u00e9cessaire coop\u00e9ration entre tous les \u00c9tats europ\u00e9ens en mati\u00e8re de cybers\u00e9curit\u00e9. <\/span><span title=\"&quot;Everything is connected, the IoT collects data, analyse it and with this hyperconnectivity, all our society and e-lifestyle is threatened by invisible untraceable enemies&quot; Parly said.\">\u00ab\u00a0Tout est connect\u00e9, l&rsquo;IoT recueille des donn\u00e9es, les analyse et avec cette hyperconnectivit\u00e9, toute notre soci\u00e9t\u00e9 et notre e-lifestyle sont menac\u00e9s par des ennemis invisibles et invisibles\u00a0\u00bb, a d\u00e9clar\u00e9 Parly. <\/span><span title=\"&quot;The digital space is structuring the battlefield, at home and abroad, and if we don't innovate and invest in research for cybersecurity, others will do it in our place. But I won't let this happen&quot;, she added before discussing\">\u00ab\u00a0L&rsquo;espace num\u00e9rique est en train de structurer le champ de bataille, ici et \u00e0 l&rsquo;\u00e9tranger, et si nous n&rsquo;innovons pas et n&rsquo;investissons pas dans la recherche pour la cybers\u00e9curit\u00e9, d&rsquo;autres le feront \u00e0 notre place. Mais je ne laisserai pas cela se produire\u00a0\u00bb a-t-elle ajout\u00e9 avant d&rsquo;affirmer la<\/span><span title=\"the need for reorganizing Europe's numerical resilience, to better anticipate threats, protect our networks and fight back when necessary.\n\n\"> n\u00e9cessit\u00e9 de r\u00e9organiser la r\u00e9silience num\u00e9rique de l&rsquo;Europe, de mieux anticiper les menaces, de prot\u00e9ger nos r\u00e9seaux et de riposter si n\u00e9cessaire.<\/span><\/span><\/p>\n<p><span id=\"result_box\" lang=\"fr\"><span title=\"As cyber-sovereignty as become a major stake, the French Minister of the Armed Forces unveiled plans for the French army to invest 1.6 billion Euros for cyber-defence between 2019 and 2015, increasing the ranks of its cyber-soldiers from 3,000 today to 4,000\">Alors que la cyber-souverainet\u00e9 est devenue un enjeu majeur, la ministre fran\u00e7aise des Forces arm\u00e9es a d\u00e9voil\u00e9 des plans pour l&rsquo;arm\u00e9e fran\u00e7aise d&rsquo;investir 1,6 milliard d&rsquo;euros pour la cyberd\u00e9fense entre 2019 et 2025, faisant passer le nombre de ses cyber-soldats de 3 000 aujourd&rsquo;hui \u00e0 4 000 <\/span><span title=\"by 2025. She also announced the creation of a European kernel of cyber-defence to share incoming threats in real time.\n\n\">d&rsquo;ici 2025. Elle a \u00e9galement annonc\u00e9 la cr\u00e9ation d&rsquo;un noyau europ\u00e9en de cyberd\u00e9fense pour partager les menaces entrantes en temps r\u00e9el.<\/span><\/span><\/p>\n<p><span id=\"result_box\" lang=\"fr\"><span title=\"A plethora of encryption and network traffic monitoring solutions were on display, but among the 350 exhibitors were also companies offering cyber security testing environments and so-called ethical hackers ready to safely hack into your system and disclose your network's vulnerabilities.\n\n\">Une pl\u00e9thore de solutions de cryptage et de surveillance du trafic r\u00e9seau ont \u00e9t\u00e9 expos\u00e9es, mais parmi les 350 exposants figuraient \u00e9galement des soci\u00e9t\u00e9s offrant des environnements de test de s\u00e9curit\u00e9 informatique et des pirates informatiques \u00ab\u00a0\u00e9thiques\u00a0\u00bb pr\u00eats \u00e0 pirater votre syst\u00e8me et \u00e0 vous divulguer les vuln\u00e9rabilit\u00e9s de votre r\u00e9seau.<\/span><\/span><\/p>\n<p>&nbsp;<\/p>\n<hr \/>\n<p><span id=\"result_box\" lang=\"fr\"><span title=\"In the European context, security consulting company Yes We Hack claims to offer the first Bug Bounty platform in Europe.\">Dans le contexte europ\u00e9en, la soci\u00e9t\u00e9 de conseil en s\u00e9curit\u00e9 Yes We Hack pr\u00e9tend offrir la premi\u00e8re plateforme Bug Bounty en Europe. <\/span><span title=\"One that allows companies to crowd-source their security tests, relying on so-called &quot;white hats&quot; or ethical hackers who've agreed to follow responsible vulnerability disclosure procedures, abiding by the rules, principles and legislation of the European economic area.\n\n\">Une approche qui permet aux entreprises d&rsquo;alimenter leurs tests de s\u00e9curit\u00e9 en s&rsquo;appuyant sur des \u00ab\u00a0white hats\u00a0\u00bb ou hackers \u00e9thiques qui ont accept\u00e9 de suivre des proc\u00e9dures de divulgation de la vuln\u00e9rabilit\u00e9, respectant les r\u00e8gles, les principes et la l\u00e9gislation de l&rsquo;espace \u00e9conomique europ\u00e9en.<\/span><\/span><\/p>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\" alt=\"\" height=\"219\" data-src=\"http:\/\/www.eenewseurope.com\/sites\/default\/files\/images\/01-picture-library\/eenews\/2018\/n-fic2-yes-we-hack.png\" style=\"--smush-placeholder-width: 300px; --smush-placeholder-aspect-ratio: 300\/219;float:left\" width=\"300\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" class=\"lazyload\" \/> <span id=\"result_box\" lang=\"fr\"><span title=\"Yes We Hack's Bounty Factory helps companies create a Bug Bounty Program (BBP) which rewards individual hackers for finding bugs in code (software, web sites, network protocols etc.).\n\n\">Oui, <\/span><\/span>We Hack&rsquo;s Bounty Factory<span lang=\"fr\"><span title=\"Yes We Hack's Bounty Factory helps companies create a Bug Bounty Program (BBP) which rewards individual hackers for finding bugs in code (software, web sites, network protocols etc.).\n\n\"> aide les entreprises \u00e0 cr\u00e9er un programme BBP (Bug Bounty Program) qui r\u00e9compense les pirates informatiques pour trouver des bogues dans le code (logiciels, sites Web, protocoles r\u00e9seau, etc.).<\/span><\/span><\/p>\n<p><span id=\"result_box\" lang=\"fr\"><span title=\"&quot;All our servers are situated in France and our encrypted data is hosted by French cloud provider OVH in compliance with European laws&quot; highlighted Nicolas Diaz, Communication Consultant at Yes We Hack during an interview with eeNews Europe.\">\u00ab\u00a0Tous nos serveurs sont situ\u00e9s en France et nos donn\u00e9es crypt\u00e9es sont h\u00e9berg\u00e9es par OVH, fournisseur de cloud fran\u00e7ais, conform\u00e9ment aux lois europ\u00e9ennes\u00a0\u00bb, a soulign\u00e9 Nicolas Diaz, consultant en communication chez Yes We Hack lors d&rsquo;un entretien avec eeNews Europe (partenaire de ECI). <\/span><span title=\"With its Bounty Factory and its 3700+ registered ethical hackers, the company can offer continuous testing while federating and ranking the white-hats, also raising their profiles for would-be recruiters in cybersecurity.\n\n\">Avec sa Bounty Factory et ses 3 700 hackers \u00e9thiques enregistr\u00e9s, l&rsquo;entreprise peut offrir des tests continus tout en f\u00e9d\u00e9rant et en classant les White Hats, ce qui augmente \u00e9galement leur profil pour les recruteurs en cybers\u00e9curit\u00e9.<\/span><\/span><\/p>\n<p><span id=\"result_box\" lang=\"fr\"><span title=\"One hot trend at the conference was the use of Artificial Intelligence (AI) to counter cyber-attacks or stop malware in its track.\">L&rsquo;une des grandes tendances de la conf\u00e9rence a \u00e9t\u00e9 l&rsquo;utilisation de l&rsquo;intelligence artificielle (IA) pour contrer les cyber-attaques ou arr\u00eater les logiciels malveillants. <\/span><span title=\"In a talk titled &quot;Connected Intelligence&quot;, Trend Micro's technical director Renaud Bidou gave us his vision for 2020, arguing that learning from experience, more bugs and more patches would follow, opening room for new worms exploiting unpatched vulnerabilities.\">Dans une conf\u00e9rence intitul\u00e9e \u00abConnected Intelligence\u00bb, le directeur technique de Trend Micro, Renaud Bidou, nous a pr\u00e9sent\u00e9 sa vision pour 2020, affirmant que l&rsquo;exp\u00e9rience nous montre que nous verrons encore plus de bugs et plus de correctifs ce qui ouvre la voie \u00e0 de nouveaux vers exploitant des vuln\u00e9rabilit\u00e9s non corrig\u00e9es. <\/span><span title=\"&quot;What will never change is that there will always be bugs, patches, and users will click&quot; (on links to malware or compromised documents), he said.\n\n\">\u00ab\u00a0Ce qui ne changera jamais, c&rsquo;est qu&rsquo;il y aura toujours des bugs, des correctifs, et que les utilisateurs cliqueront\u00a0\u00bb (sur les liens vers des logiciels malveillants ou des documents compromis), a-t-il dit.<\/span><\/span><\/p>\n<p><span id=\"result_box\" lang=\"fr\"><span title=\"&quot;Hackers will be hackers and someone will eventually enter your system, this will never change. What's new is that the surface attack will be less controllable as it expands, from contained servers to workstations, laptops, smartphones, connected watches, homes, smart factories\">\u00ab\u00a0Les pirates resteront des pirates et quelqu&rsquo;un finira par entrer dans votre syst\u00e8me, cela ne changera jamais. Ce qui est nouveau est que l&rsquo;attaque de surface sera moins contr\u00f4lable \u00e0 mesure qu&rsquo;elle s&rsquo;\u00e9tend, des serveurs confin\u00e9s aux postes de travail, ordinateurs portables, smartphones, montres connect\u00e9es, maisons, usines intelligentes <\/span><span title=\"and the pervasive cloud&quot; Bidou noted.\n\n\">et le cloud omnipr\u00e9sent \u00ab\u00a0a not\u00e9 Bidou.<\/span><\/span><\/p>\n<p><span id=\"result_box\" lang=\"fr\"><span title=\"&quot;But the good thing is that we can now use AI to secure the connected world and detect on-the-fly suspicious unknown threats. Tomorrow, smart security won't be good enough, we need intelligent security.&quot;\n\">\u00ab\u00a0Mais la bonne nouvelle est que nous pouvons maintenant utiliser l&rsquo;IA pour s\u00e9curiser le monde connect\u00e9 et d\u00e9tecter les menaces inconnues suspectes \u00e0 la vol\u00e9e\u00a0\u00bb. Demain, la s\u00e9curit\u00e9 fut\u00e9e ne sera pas assez bonne, nous avons besoin d&rsquo;une s\u00e9curit\u00e9 intelligente. \u00ab\u00a0<\/span><\/span><\/p>\n<p>&nbsp;<\/p>\n<hr \/>\n<figure class=\"image\" style=\"float:right\"><img decoding=\"async\" alt=\"\" height=\"170\" data-src=\"http:\/\/www.eenewseurope.com\/sites\/default\/files\/images\/01-picture-library\/eenews\/2018\/n-fic3-trendmicro.jpg\" width=\"330\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" class=\"lazyload\" style=\"--smush-placeholder-width: 330px; --smush-placeholder-aspect-ratio: 330\/170;\" \/><figcaption>Trend Micro&rsquo;s slide on the use of AI for threat detection.<\/figcaption><\/figure>\n<p><span id=\"result_box\" lang=\"fr\"><span title=\"Describing a successful phishing scenario where a hacker could impersonate a colleague with all his credentials, say the CFO, asking by direct email to the CEO an unusual money transfer, Bidou said that even such an attack could be automatically thwarted by an AI algorithm, modelling\">D\u00e9crivant un sc\u00e9nario d&rsquo;hame\u00e7onnage r\u00e9ussi o\u00f9 un pirate pourrait usurper l&rsquo;identit\u00e9 d&rsquo;un coll\u00e8gue avec toutes ses autorisations, disons le directeur financier, qui demanderait par mail direct au PDG un transfert d&rsquo;argent inhabituel, a d\u00e9clar\u00e9 Bidou, m\u00eame une telle attaque pouvait \u00eatre contrecarr\u00e9e automatiquement par un algorithme AI. Cet AI pourrait modeler <\/span><span title=\"all human behaviours in the company as well as the traffic patterns on the network to identify any deviation from standard behaviours.\">tous les comportements humains dans l&rsquo;entreprise ainsi que les mod\u00e8les de trafic sur le r\u00e9seau pour identifier toute d\u00e9viation par rapport aux comportements standard. <\/span><span title=\"&quot;An AI-driven security system could email back to the CFO and check if he really made that request, it could also warn the CEO&quot; Bidou put as an example.\n\n\">\u00ab\u00a0Un syst\u00e8me de s\u00e9curit\u00e9 pilot\u00e9 par l&rsquo;IA pourrait renvoyer un email au CFO et v\u00e9rifier s&rsquo;il a r\u00e9ellement fait cette demande, il pourrait \u00e9galement avertir le PDG\u00a0\u00bb&nbsp; dit Bidou dans son exemple.<\/span><\/span><\/p>\n<p><span id=\"result_box\" lang=\"fr\"><span title=\"&quot;In 2020, data will overload our traditional analysis capabilities, but AI takes its value from data and it will have plenty of it from IoT. So let's take advantage of this context to make security more reliable&quot;.\n\n\">\u00abEn 2020, les donn\u00e9es surchargeront nos capacit\u00e9s d&rsquo;analyse traditionnelles, mais l&rsquo;intelligence artificielle se norrit de donn\u00e9es et elle en aura beaucoup \u00e0 partir de l&rsquo;IdO. Profitons donc de ce contexte pour rendre la s\u00e9curit\u00e9 plus fiable\u00bb.<\/span><\/span><\/p>\n<p><span id=\"result_box\" lang=\"fr\"><span title=\"Asked if AI would also benefit hackers in the arms race, Bidou noted that AI was already being used by hackers to scavenge data on social networks and identify the profiles that would be the most susceptible to phishing.\">Interrog\u00e9 sur le fait que l&rsquo;IA pourrait \u00e9galement b\u00e9n\u00e9ficier aux hackers dans la course aux armements, Bidou a not\u00e9 que les hackers utilisaient d\u00e9j\u00e0 l&rsquo;IA pour fouiller les donn\u00e9es sur les r\u00e9seaux sociaux et identifier les profils les plus sensibles au phishing. <\/span><span title=\"&quot;That way, they augment their chances to successful phishing. Some adverts on the web are even compromised and monitored in order to identify the most gullible profiles&quot;, the technical director told eeNews Europe.\n\n\">\u00ab\u00a0De cette fa\u00e7on, ils accroissent leurs chances de r\u00e9ussir le phishing, certaines publicit\u00e9s sur le web sont m\u00eame compromises et surveill\u00e9es afin d&rsquo;identifier les profils les plus cr\u00e9dules\u00a0\u00bb, a d\u00e9clar\u00e9 le directeur technique \u00e0 eeNews Europe.<\/span><\/span><\/p>\n<p><span id=\"result_box\" lang=\"fr\"><span title=\"On the exhibition floor, a spokesperson for PhishMe somehow agreed that with increasing encryption and security checks at endpoints, phishing based on social engineering remains the surest way to get administration credentials and compromise a network.\">Sur l&rsquo;exposition, un porte-parole de PhishMe a convenu qu&rsquo;en augmentant le cryptage et les contr\u00f4les de s\u00e9curit\u00e9 sur les terminaux, le phishing bas\u00e9 sur l&rsquo;ing\u00e9nierie sociale reste le moyen le plus s\u00fbr d&rsquo;obtenir des informations d&rsquo;administrateur et de compromettre un r\u00e9seau. <\/span><span title=\"On its website, the company reports that more than 90% of breaches can be attributed to successful phishing campaigns.\">Sur son site Web, la soci\u00e9t\u00e9 signale que plus de 90% des violations peuvent \u00eatre attribu\u00e9es \u00e0 des campagnes de phishing r\u00e9ussies. <\/span><span title=\"Hence, it proposes to train employees and partners so they become part of the cybersecurity solution.\">Par cons\u00e9quent, il propose de former des employ\u00e9s et des partenaires afin qu&rsquo;ils deviennent partie int\u00e9grante de la solution de cybers\u00e9curit\u00e9. <\/span><span title=\"PhishMe does that by organizing innocuous phishing campaigns (taking the unapologetic clicking end-user to awareness campaigns about phishing).\n\n\">PhishMe le fait en organisant des campagnes d&rsquo;hame\u00e7onnage inoffensives (en poussant l&rsquo;utilisateur final qui clique \u00e0 prendre en compte les campagnes de sensibilisation au phishing).<\/span><\/span><\/p>\n<p><span id=\"result_box\" lang=\"fr\"><span title=\"Now, could hackers step up their game with AI to analyse and understand how colleagues communicate and what language patterns they use, so their phishing campaigns would be more successful?\">Maintenant, les pirates pourraient-ils am\u00e9liorer leur jeu avec l&rsquo;IA pour analyser et comprendre comment les coll\u00e8gues communiquent et quels mod\u00e8les de langage ils utilisent, afin que leurs campagnes d&rsquo;hame\u00e7onnage aient plus de succ\u00e8s? <\/span><span title=\"The possibility exists, though it may take a long time before such efforts pay-off, as humans are unique in understanding the specific social traits and forms of expression of their collaborators, argued the PhishMe representative.\n\n\">La possibilit\u00e9 existe, bien que cela puisse prendre beaucoup de temps avant que de tels efforts portent leurs fruits, car les humains sont uniques dans la compr\u00e9hension des traits sociaux sp\u00e9cifiques et des formes d&rsquo;expression de leurs collaborateurs, a soutenu le repr\u00e9sentant de PhishMe.<\/span><\/span><\/p>\n<p><span lang=\"fr\"><span title=\"The possibility exists, though it may take a long time before such efforts pay-off, as humans are unique in understanding the specific social traits and forms of expression of their collaborators, argued the PhishMe representative.\n\n\">La possibilit\u00e9 existe, bien que cela puisse prendre beaucoup de temps avant que de tels efforts portent leurs fruits, car les humains sont uniques dans la compr\u00e9hension des traits sociaux sp\u00e9cifiques et des formes d&rsquo;expression de leurs collaborateurs, a soutenu le repr\u00e9sentant de PhishMe.<\/span><\/span><br \/>\n&nbsp;<\/p>\n<hr \/>\n<p>\n<span lang=\"fr\"><span title=\"Going back to the use of AI for cybersecurity, American company Vectra leverages artificial intelligence to automate security operations, identifying threats by detecting abnormal data traffic across the network, starting at endpoints.\">Revenant \u00e0 l&rsquo;utilisation de l&rsquo;IA pour la cybers\u00e9curit\u00e9, la soci\u00e9t\u00e9 am\u00e9ricaine Vectra utilise l&rsquo;intelligence artificielle pour automatiser les op\u00e9rations de s\u00e9curit\u00e9, identifiant les menaces en d\u00e9tectant le trafic de donn\u00e9es anormal sur le r\u00e9seau, en commen\u00e7ant par les terminaux. <\/span><span title=\"Whether it is to exfiltrate data or encrypt it with ransomware, hackers need first to compromise an endpoint and scan for the protective measures in place.\">Qu&rsquo;il s&rsquo;agisse d&rsquo;exfiltrer des donn\u00e9es ou de les crypter avec un ransomware, les pirates doivent d&rsquo;abord compromettre un point de terminaison et rechercher les mesures de protection en place. <\/span><span title=\"Vectra's Cognito tool analyses the behaviour of every piece of equipment and of all users across the network and identifies any deviation from standard.\">L&rsquo;outil Cognito de Vectra analyse le comportement de chaque \u00e9quipement et de tous les utilisateurs du r\u00e9seau et identifie tout \u00e9cart par rapport \u00e0 la norme. <\/span><span title=\"The tool automates the hunt for cyber attackers and can instantly prioritize the highest-risk threats, triggering immediate response such as endpoint isolation if need be.\">L&rsquo;outil automatise la traque des cyber-attaquants et peut instantan\u00e9ment hi\u00e9rarchiser les menaces les plus \u00e0 risque, d\u00e9clenchant une r\u00e9ponse imm\u00e9diate telle que l&rsquo;isolation des points finaux si n\u00e9cessaire. <\/span><span title=\"&quot;80% of the algorithms they use are pre-trained for certain patterns but 20% of them learn on the go in the network so detection can be customised to the environment were Cognito operates&quot;, explained David Clarys from distribution partner Exclusive Networks.\">\u00ab\u00a080% des algorithmes qu&rsquo;ils utilisent sont pr\u00e9-form\u00e9s pour certains mod\u00e8les mais 20% d&rsquo;entre eux apprennent \u00e0 la vol\u00e9e sur le r\u00e9seau afin que la d\u00e9tection puisse \u00eatre adapt\u00e9e \u00e0 l&rsquo;environnement sur lequel fonctionne Cognito \u00ab\u00a0, explique David Clarys du partenaire de distribution Exclusive Networks. <\/span><span title=\"The AI algorithms and the data analysis are centralized in a dedicated Vectra appliance.\">Les algorithmes AI et l&rsquo;analyse des donn\u00e9es sont centralis\u00e9s dans une application Vectra d\u00e9di\u00e9e. <\/span><span title=\"Last year, the company reported a triple-digit revenue growth, quarter on quarter.\n\n\">L&rsquo;ann\u00e9e derni\u00e8re, la soci\u00e9t\u00e9 a enregistr\u00e9 une croissance \u00e0 trois chiffres de ses revenus, trimestre \u00e0 trimestre.<\/span><\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span id=\"result_box\" lang=\"fr\"><span title=\"Likewise, Cambridge startup Darktrace leverages unsupervised machine learning to detect data anomalies and threats across all network types, from physical, virtualized, and cloud, through to IoT and industrial control systems.\">De m\u00eame, la startup de Cambridge Darktrace tire parti de l&rsquo;apprentissage automatique non supervis\u00e9 pour d\u00e9tecter les anomalies de donn\u00e9es et les menaces sur tous les types de r\u00e9seaux, physique, virtuel et&nbsp; cloud, jusqu&rsquo;aux IoT et aux syst\u00e8mes de contr\u00f4le industriels. <\/span><span title=\"The company likes to describe its security solution, the Enterprise Immune System, as a set of AI algorithms that does not require previous experience of a threat or pattern of activity in order to understand that it is potentially threatening.\">L&rsquo;entreprise aime d\u00e9crire sa solution de s\u00e9curit\u00e9, l&rsquo;Enterprise Immune System, comme un ensemble d&rsquo;algorithmes IA qui ne n\u00e9cessite pas d&rsquo;exp\u00e9rience pr\u00e9alable d&rsquo;une menace ou d&rsquo;un mod\u00e8le d&rsquo;activit\u00e9 pour comprendre qu&rsquo;elle est potentiellement mena\u00e7ante. <\/span><span title=\"The Enterprise Immune System works automatically, without prior knowledge or signatures, detecting and fighting back against subtle, stealthy attacks inside the network, in real time.\">L&rsquo;Enterprise Immune System fonctionne automatiquement, sans connaissances ni signatures pr\u00e9alables, d\u00e9tectant et luttant contre les attaques subtiles et furtives \u00e0 l&rsquo;int\u00e9rieur du r\u00e9seau, en temps r\u00e9el. <\/span><span title=\"On its website, the company claims its unique, unsupervised machine learning has already identified over 63,500 previously unknown threats in over 5,000 networks, including zero-days, insider threats and subtle, stealthy attacks.\">Sur son site Web, l&rsquo;entreprise affirme que son apprentissage automatique unique et non supervis\u00e9 a d\u00e9j\u00e0 identifi\u00e9 plus de 63 500 menaces inconnues dans plus de 5 000 r\u00e9seaux, y compris des menaces de z\u00e9ro-jour, des menaces internes et des attaques subtiles et furtives.<\/span><\/span><\/p>\n<p><strong>La r\u00e9daction vous conseille aussi:<\/strong><\/p>\n<p><a href=\"http:\/\/www.electronique-eci.com\/node\/101403\"><strong>Meltdown et Spectre, les processeurs Intel pas seuls en cause<\/strong><\/a><\/p>\n<p><a href=\"http:\/\/www.electronique-eci.com\/news\/intel-lantidote-pour-meltdown-et-spectre\"><strong>Intel a l&rsquo;antidote pour Meltdown et Spectre<\/strong><\/a><\/p>\n<p><strong>Related articles in English:<\/strong><\/p>\n<p><a href=\"http:\/\/www.eenewseurope.com\/news\/liverpool-cyber-attack-sparks-debate\">Liverpool cyber-attack sparks debate<\/a><\/p>\n<p><a href=\"http:\/\/www.eenewseurope.com\/news\/research-claims-cyber-attack-vulnerability-rise-after-uk-quits-eu-0\">Research claims cyber-attack vulnerability to rise after UK quits EU<\/a><\/p>\n<p><a href=\"http:\/\/www.eenewseurope.com\/news\/ai-scrutinizes-gesture-biometrics-secure-smartphones\">AI scrutinizes gesture biometrics to secure smartphones<\/a><\/p>\n<p><a href=\"http:\/\/www.eenewseurope.com\/news\/infineon-preparing-post-quantum-cryptography-cars-infrastructure\">Infineon preparing post-quantum cryptography for cars, infrastructure<\/a><\/p>\n<p><a href=\"http:\/\/www.eenewseurope.com\/news\/uk-issues-security-guidelines-driverless-car-designers\">UK issues security guidelines for driverless car designers<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>La  10\u00e8me \u00e9dition du Forum International de la Cybers\u00e9curit\u00e9 (FIC) qui se tenait \u00e0 Lille la semaine derni\u00e8re en pr\u00e9sence de Florence Parly, Ministre de la D\u00e9fence, a r\u00e9uni environ 8 600 visiteurs sur 13 000 m2  d&rsquo;exposition,  une augmentation de 20% par rapport \u00e0 l&rsquo;ann\u00e9e derni\u00e8re.<\/p>\n","protected":false},"author":22,"featured_media":131811,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[883],"tags":[893,917],"domains":[47],"ppma_author":[1149],"class_list":["post-131810","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technologies","tag-authentication-encryption-fr","tag-software-embedded-tools-fr","domains-electronique-eci"],"acf":[],"yoast_head":"<title>Quand l&#039;IA s&#039;aventure dans le labyrinthe de la cyber-s\u00e9curit\u00e9 ...<\/title>\n<meta name=\"description\" content=\"La  10\u00e8me \u00e9dition du Forum International de la Cybers\u00e9curit\u00e9 (FIC) qui se tenait \u00e0 Lille la semaine derni\u00e8re en pr\u00e9sence de Florence Parly, Ministre...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/131810\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Quand l&#039;IA s&#039;aventure dans le labyrinthe de la cyber-s\u00e9curit\u00e9\" \/>\n<meta property=\"og:description\" content=\"La 10\u00e8me \u00e9dition du Forum International de la Cybers\u00e9curit\u00e9 (FIC) qui se tenait \u00e0 Lille la semaine derni\u00e8re en pr\u00e9sence de Florence Parly, Ministre de la D\u00e9fence, a r\u00e9uni environ 8 600 visiteurs sur 13 000 m2 d&#039;exposition, une augmentation de 20% par rapport \u00e0 l&#039;ann\u00e9e derni\u00e8re.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/131810\/\" \/>\n<meta property=\"og:site_name\" content=\"EENewsEurope\" \/>\n<meta property=\"article:published_time\" content=\"2018-01-29T17:59:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.ecinews.fr\/wp-content\/uploads\/import\/default\/files\/sites\/default\/files\/images\/n-fic3-trendmicro.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1557\" \/>\n\t<meta property=\"og:image:height\" content=\"801\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"eeNews Europe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"eeNews Europe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.ecinews.fr\/fr\/quand-lia-saventure-dans-le-labyrinthe-de-la-cyber-securite\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.ecinews.fr\/fr\/quand-lia-saventure-dans-le-labyrinthe-de-la-cyber-securite\/\"},\"author\":{\"name\":\"eeNews Europe\",\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#\/schema\/person\/9eff4051fa9dac8230052de45e32b0f4\"},\"headline\":\"Quand l&rsquo;IA s&rsquo;aventure dans le labyrinthe de la cyber-s\u00e9curit\u00e9\",\"datePublished\":\"2018-01-29T17:59:31+00:00\",\"dateModified\":\"2018-01-29T17:59:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.ecinews.fr\/fr\/quand-lia-saventure-dans-le-labyrinthe-de-la-cyber-securite\/\"},\"wordCount\":1988,\"publisher\":{\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#organization\"},\"keywords\":[\"Authentication &amp; Encryption\",\"Software &amp; Embedded tools\"],\"articleSection\":[\"Technologies\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.ecinews.fr\/fr\/quand-lia-saventure-dans-le-labyrinthe-de-la-cyber-securite\/\",\"url\":\"https:\/\/www.ecinews.fr\/fr\/quand-lia-saventure-dans-le-labyrinthe-de-la-cyber-securite\/\",\"name\":\"Quand l'IA s'aventure dans le labyrinthe de la cyber-s\u00e9curit\u00e9 -\",\"isPartOf\":{\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#website\"},\"datePublished\":\"2018-01-29T17:59:31+00:00\",\"dateModified\":\"2018-01-29T17:59:31+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.ecinews.fr\/fr\/quand-lia-saventure-dans-le-labyrinthe-de-la-cyber-securite\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.ecinews.fr\/fr\/quand-lia-saventure-dans-le-labyrinthe-de-la-cyber-securite\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.ecinews.fr\/fr\/quand-lia-saventure-dans-le-labyrinthe-de-la-cyber-securite\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.ecinews.fr\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Quand l&rsquo;IA s&rsquo;aventure dans le labyrinthe de la cyber-s\u00e9curit\u00e9\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#website\",\"url\":\"https:\/\/www.eenewseurope.com\/en\/\",\"name\":\"EENewsEurope\",\"description\":\"Just another WordPress site\",\"publisher\":{\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.eenewseurope.com\/en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#organization\",\"name\":\"EENewsEurope\",\"url\":\"https:\/\/www.eenewseurope.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.ecinews.fr\/wp-content\/uploads\/2022\/02\/logo-1.jpg\",\"contentUrl\":\"https:\/\/www.ecinews.fr\/wp-content\/uploads\/2022\/02\/logo-1.jpg\",\"width\":283,\"height\":113,\"caption\":\"EENewsEurope\"},\"image\":{\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#\/schema\/person\/9eff4051fa9dac8230052de45e32b0f4\",\"name\":\"eeNews Europe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#\/schema\/person\/image\/fae8f0cb15861c4ae0ed4872e2c9fc22\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5081509054e28b04ecd976976e723ce0?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5081509054e28b04ecd976976e723ce0?s=96&d=mm&r=g\",\"caption\":\"eeNews Europe\"}}]}<\/script>","yoast_head_json":{"title":"Quand l'IA s'aventure dans le labyrinthe de la cyber-s\u00e9curit\u00e9 ...","description":"La  10\u00e8me \u00e9dition du Forum International de la Cybers\u00e9curit\u00e9 (FIC) qui se tenait \u00e0 Lille la semaine derni\u00e8re en pr\u00e9sence de Florence Parly, Ministre...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/131810\/","og_locale":"fr_FR","og_type":"article","og_title":"Quand l'IA s'aventure dans le labyrinthe de la cyber-s\u00e9curit\u00e9","og_description":"La 10\u00e8me \u00e9dition du Forum International de la Cybers\u00e9curit\u00e9 (FIC) qui se tenait \u00e0 Lille la semaine derni\u00e8re en pr\u00e9sence de Florence Parly, Ministre de la D\u00e9fence, a r\u00e9uni environ 8 600 visiteurs sur 13 000 m2 d'exposition, une augmentation de 20% par rapport \u00e0 l'ann\u00e9e derni\u00e8re.","og_url":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/131810\/","og_site_name":"EENewsEurope","article_published_time":"2018-01-29T17:59:31+00:00","og_image":[{"width":1557,"height":801,"url":"https:\/\/www.ecinews.fr\/wp-content\/uploads\/import\/default\/files\/sites\/default\/files\/images\/n-fic3-trendmicro.jpg","type":"image\/jpeg"}],"author":"eeNews Europe","twitter_card":"summary_large_image","twitter_misc":{"Written by":"eeNews Europe","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.ecinews.fr\/fr\/quand-lia-saventure-dans-le-labyrinthe-de-la-cyber-securite\/#article","isPartOf":{"@id":"https:\/\/www.ecinews.fr\/fr\/quand-lia-saventure-dans-le-labyrinthe-de-la-cyber-securite\/"},"author":{"name":"eeNews Europe","@id":"https:\/\/www.eenewseurope.com\/en\/#\/schema\/person\/9eff4051fa9dac8230052de45e32b0f4"},"headline":"Quand l&rsquo;IA s&rsquo;aventure dans le labyrinthe de la cyber-s\u00e9curit\u00e9","datePublished":"2018-01-29T17:59:31+00:00","dateModified":"2018-01-29T17:59:31+00:00","mainEntityOfPage":{"@id":"https:\/\/www.ecinews.fr\/fr\/quand-lia-saventure-dans-le-labyrinthe-de-la-cyber-securite\/"},"wordCount":1988,"publisher":{"@id":"https:\/\/www.eenewseurope.com\/en\/#organization"},"keywords":["Authentication &amp; Encryption","Software &amp; Embedded tools"],"articleSection":["Technologies"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.ecinews.fr\/fr\/quand-lia-saventure-dans-le-labyrinthe-de-la-cyber-securite\/","url":"https:\/\/www.ecinews.fr\/fr\/quand-lia-saventure-dans-le-labyrinthe-de-la-cyber-securite\/","name":"Quand l'IA s'aventure dans le labyrinthe de la cyber-s\u00e9curit\u00e9 -","isPartOf":{"@id":"https:\/\/www.eenewseurope.com\/en\/#website"},"datePublished":"2018-01-29T17:59:31+00:00","dateModified":"2018-01-29T17:59:31+00:00","breadcrumb":{"@id":"https:\/\/www.ecinews.fr\/fr\/quand-lia-saventure-dans-le-labyrinthe-de-la-cyber-securite\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ecinews.fr\/fr\/quand-lia-saventure-dans-le-labyrinthe-de-la-cyber-securite\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.ecinews.fr\/fr\/quand-lia-saventure-dans-le-labyrinthe-de-la-cyber-securite\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.ecinews.fr\/fr\/"},{"@type":"ListItem","position":2,"name":"Quand l&rsquo;IA s&rsquo;aventure dans le labyrinthe de la cyber-s\u00e9curit\u00e9"}]},{"@type":"WebSite","@id":"https:\/\/www.eenewseurope.com\/en\/#website","url":"https:\/\/www.eenewseurope.com\/en\/","name":"EENewsEurope","description":"Just another WordPress site","publisher":{"@id":"https:\/\/www.eenewseurope.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eenewseurope.com\/en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.eenewseurope.com\/en\/#organization","name":"EENewsEurope","url":"https:\/\/www.eenewseurope.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.eenewseurope.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.ecinews.fr\/wp-content\/uploads\/2022\/02\/logo-1.jpg","contentUrl":"https:\/\/www.ecinews.fr\/wp-content\/uploads\/2022\/02\/logo-1.jpg","width":283,"height":113,"caption":"EENewsEurope"},"image":{"@id":"https:\/\/www.eenewseurope.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eenewseurope.com\/en\/#\/schema\/person\/9eff4051fa9dac8230052de45e32b0f4","name":"eeNews Europe","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.eenewseurope.com\/en\/#\/schema\/person\/image\/fae8f0cb15861c4ae0ed4872e2c9fc22","url":"https:\/\/secure.gravatar.com\/avatar\/5081509054e28b04ecd976976e723ce0?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5081509054e28b04ecd976976e723ce0?s=96&d=mm&r=g","caption":"eeNews Europe"}}]}},"authors":[{"term_id":1149,"user_id":22,"is_guest":0,"slug":"eenews-europe","display_name":"eeNews Europe","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/5081509054e28b04ecd976976e723ce0?s=96&d=mm&r=g","0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/131810"}],"collection":[{"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/users\/22"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/comments?post=131810"}],"version-history":[{"count":0,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/131810\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/media\/131811"}],"wp:attachment":[{"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/media?parent=131810"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/categories?post=131810"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/tags?post=131810"},{"taxonomy":"domains","embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/domains?post=131810"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/ppma_author?post=131810"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}