{"version":"1.0","provider_name":"RiskInsight","provider_url":"https:\/\/www.riskinsight-wavestone.com\/en\/","title":"R\u00e9seaux industriels : prot\u00e9ger ou reconstruire ? - SolucomINSIGHT","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"Aq3Ue2Vfsi\"><a href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2013\/02\/reseaux-industriels-proteger-ou-reconstruire\/\">R\u00e9seaux industriels : prot\u00e9ger ou reconstruire ?<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.riskinsight-wavestone.com\/en\/2013\/02\/reseaux-industriels-proteger-ou-reconstruire\/embed\/#?secret=Aq3Ue2Vfsi\" width=\"600\" height=\"338\" title=\"&#8220;R\u00e9seaux industriels : prot\u00e9ger ou reconstruire ?&#8221; &#8212; RiskInsight\" data-secret=\"Aq3Ue2Vfsi\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.riskinsight-wavestone.com\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2013\/02\/Fotolia_46003418_S.jpg","thumbnail_width":848,"thumbnail_height":566,"description":"Les r\u00e9seaux industriels sont de plus en plus vis\u00e9s par des attaques cibl\u00e9es. Souvent d\u00e9ploy\u00e9s depuis de nombreuses ann\u00e9es, ils souffrent d\u2019un manque criant de s\u00e9curit\u00e9 par d\u00e9faut. Une question agite actuellement la communaut\u00e9 s\u00e9curit\u00e9 : quelle strat\u00e9gie adopter face \u00e0 cette situation ? Faut-il investir dans des \u00e9quipements additionnels de protection ou alors envisager le renouvellement des \u00e9quipements pour tirer partie des avanc\u00e9es des constructeurs en mati\u00e8re de s\u00e9curit\u00e9 ?"}