{"id":11170,"date":"2018-08-07T17:25:56","date_gmt":"2018-08-07T16:25:56","guid":{"rendered":"https:\/\/www.riskinsight-wavestone.com\/?p=11170\/"},"modified":"2020-01-03T09:17:27","modified_gmt":"2020-01-03T08:17:27","slug":"interview-gitguardian-securiser-cles-privees","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/08\/interview-gitguardian-securiser-cles-privees\/","title":{"rendered":"L&#8217;interview de GITGUARDIAN \u2013 S\u00e9curiser les cl\u00e9s priv\u00e9es"},"content":{"rendered":"<p><em>Dans le cadre des Banking CyberSecurity Innovation Awards, <strong>GitGuardian<\/strong> a \u00e9t\u00e9 r\u00e9compens\u00e9 du prix protection des donn\u00e9es clients. Cette solution aide les entreprises \u00e0 se prot\u00e9ger contre les fuites de donn\u00e9es sensibles h\u00e9berg\u00e9es dans le cloud. Elle alerte les entreprises lorsque les identifiants \u00e0 leurs services cloud sont compromis ou utilis\u00e9s de fa\u00e7on abusive. Voici l\u2019interview de son co-fondateur, Eric Fourier qui d\u00e9taille pour nous comment sa solution contribue \u00e0 la cybers\u00e9curit\u00e9 de la banque de demain.<\/em><\/p>\n<h2>Comment l&#8217;id\u00e9e vous est-elle venue ?<\/h2>\n<p><strong>GitGuardian<\/strong> souligne l&#8217;importance de l&#8217;exp\u00e9rience de ses cofondateurs ing\u00e9nieurs, sp\u00e9cialis\u00e9s en intelligence artificielle dans la conception de leur solution : \u00ab\u00a0<em>Nous utilisons au quotidien les outils de l\u2019open source, et en particulier la plateforme GitHub\u00a0\u00bb<\/em>, qui reste g\u00e9n\u00e9ratrice de risques pour ses utilisateurs. Certains codes source publi\u00e9s peuvent contenir une cl\u00e9 priv\u00e9e, suffisante pour \u00ab\u00a0<em>s\u2019introduire dans des syst\u00e8mes d\u2019information d\u2019entreprise, de la petite start-up aux grands groupes du CAC40<\/em>\u00a0\u00bb, la solution <strong>GitGardian<\/strong> a \u00e9t\u00e9 cr\u00e9\u00e9e pour \u00ab\u00a0<em>analyser en temps r\u00e9el l\u2019ensemble du code open source pour d\u00e9tecter les informations sensibles<\/em>\u00a0\u00bb.<\/p>\n<h2>Quel est le plus grand risque de s\u00e9curit\u00e9 pour les banques et pour ses clients selon vous ? Comment r\u00e9pondez-vous \u00e0 la menace qui p\u00e8se sur les banques ?<\/h2>\n<p><strong>Eric Fourier<\/strong> souligne l&#8217;interconnexion croissante entre les syst\u00e8mes bancaires : \u00ab\u00a0<em>cette augmentation de la surface de vuln\u00e9rabilit\u00e9 attire les hackers et le nombre de cyberattaques augmente tous les ans. Les failles de s\u00e9curit\u00e9 que nous d\u00e9tectons exposent r\u00e9guli\u00e8rement des donn\u00e9es personnelles, pouvant appartenir aux employ\u00e9s de la banque, \u00e0 ses clients, ou \u00e0 des tiers. Ces fuites d\u00e9t\u00e9riorent leurs images et leur font courir un risque\u00a0l\u00e9gal et strat\u00e9gique. Ainsi, <\/em><strong>GitGuardian<\/strong><em> permet de diminuer ces risques en d\u00e9tectant certaines vuln\u00e9rabilit\u00e9s au niveau des interfaces entre les syst\u00e8mes<\/em>\u00a0\u00bb bancaires.<\/p>\n<h2>L&#8217;enjeu pour les RSSI aujourd&#8217;hui est de parvenir \u00e0 concilier la facilit\u00e9 d&#8217;impl\u00e9mentation, la simplicit\u00e9 d&#8217;utilisation des solutions de s\u00e9curit\u00e9 avec une technologie s\u00e9curis\u00e9e. Comment convaincre un RSSI de la pertinence de votre solution et de la s\u00e9curit\u00e9 du produit ? Quels sont les diff\u00e9renciateurs qui vous d\u00e9marquent sur le march\u00e9\u00a0?<\/h2>\n<p><strong>GitGuardian<\/strong> met en avant la nature exog\u00e8ne de sa solution face \u00ab\u00a0<em>\u00e0 l\u2019infrastructure IT dans la mesure o\u00f9 nous analysons des donn\u00e9es disponibles publiquement. Il suffit donc de quelques minutes pour l\u2019installer. Nos algorithmes bas\u00e9s sur du Machine Learning nous permettent d\u2019alerter le RSSI et son \u00e9quipe s\u00e9curit\u00e9 d\u2019une vuln\u00e9rabilit\u00e9 moins de quatre secondes apr\u00e8s l\u2019\u00e9v\u00e9nement, lorsqu\u2019il est encore temps de limiter fortement les d\u00e9g\u00e2ts possibles\u00a0\u00bb.<\/em> Gr\u00e2ce \u00e0 ce temps de r\u00e9action tr\u00e8s faible, la solution est la seule sur le march\u00e9 \u00e0 fournir un service aussi pr\u00e9cis et rapide car \u00ab\u00a0<em>les acteurs traditionnels s\u2019appuient sur l\u2019analyse humaine, qui peut prendre quelques semaines\u00a0\u00bb.<\/em><\/p>\n<h2>Quelles sont les synergies entre votre innovation et les solutions de s\u00e9curit\u00e9 bancaires existantes \u00e0 l&#8217;heure actuelle\u00a0?<\/h2>\n<p><strong>GitGuardian <\/strong>note l&#8217;effort croissant des banques pour prot\u00e9ger leurs clients :<strong> <em>\u00ab\u00a0<\/em><\/strong><em>elles luttent contre la fraude bancaire avec des solutions de s\u00e9curisation des achats sur Internet, de protection contre les faux sites bancaires ou les tentatives d\u2019hame\u00e7onnage. Les banques poss\u00e8dent aussi des solutions standardis\u00e9es pour la protection de leurs syst\u00e8mes d\u2019information, telles que les pare-feus ou le chiffrement des donn\u00e9es. Cependant, les banques se prot\u00e8gent p\u00e9niblement contre les erreurs humaines de leurs milliers d\u2019employ\u00e9s et prestataires r\u00e9partis sur le territoire fran\u00e7ais et dans le monde entier. GitGuardian colmate ces br\u00e8ches en temps r\u00e9el, avant que des dommages soient caus\u00e9s par des acteurs malveillants <\/em>\u00bb.<\/p>\n<h2>Comment voyez-vous la banque de demain ? Quelles opportunit\u00e9s pour la cybers\u00e9curit\u00e9 dans la banque de demain\u00a0?<\/h2>\n<p>La principale tendance qui \u00e9merge est celle du num\u00e9rique et de la transparence. <strong>GitGuardian<\/strong> l\u2019explique ainsi\u00a0: \u00ab\u00a0<em>La banque de demain sera une banque enti\u00e8rement digitalis\u00e9e et connect\u00e9e. Les applications li\u00e9es au secteur bancaire se multiplient, les exigences des clients s\u2019intensifient et les fraudes bancaires s\u2019amplifient. La banque de demain se doit d&#8217;\u00eatre plus ouverte et transparente, comme en t\u00e9moigne l\u2019engouement qui s\u2019anime autour de la technologie blockchain. Tout cela se traduit n\u00e9cessairement par la mise en place de programmes de cybers\u00e9curit\u00e9 encore plus \u00e9labor\u00e9s pour prot\u00e9ger la transition et assurer la s\u00e9curit\u00e9 de millions de personnes\u00a0\u00bb.<\/em><\/p>\n<p>&nbsp;<\/p>\n<p>Pour en savoir plus\u00a0: <a href=\"https:\/\/www.gitguardian.com\/\">https:\/\/www.gitguardian.com\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Dans le cadre des Banking CyberSecurity Innovation Awards, GitGuardian a \u00e9t\u00e9 r\u00e9compens\u00e9 du prix protection des donn\u00e9es clients. Cette solution aide les entreprises \u00e0 se prot\u00e9ger contre les fuites de donn\u00e9es sensibles h\u00e9berg\u00e9es dans le cloud. Elle alerte les entreprises&#8230;<\/p>\n","protected":false},"author":21,"featured_media":9308,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[36,3224],"tags":[3021,3287,1145,3020,2885,254,3305,3288],"coauthors":[807,3023],"class_list":["post-11170","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-digital-trust","category-digital-identity","tag-analyse","tag-bcsia","tag-chiffrement","tag-code-source","tag-detection","tag-developpement","tag-identity-access-management","tag-pki"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>GITGUARDIAN : S\u00e9curiser les cl\u00e9s priv\u00e9es - RiskInsight<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/08\/interview-gitguardian-securiser-cles-privees\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"GITGUARDIAN : S\u00e9curiser les cl\u00e9s priv\u00e9es - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"Dans le cadre des Banking CyberSecurity Innovation Awards, GitGuardian a \u00e9t\u00e9 r\u00e9compens\u00e9 du prix protection des donn\u00e9es clients. Cette solution aide les entreprises \u00e0 se prot\u00e9ger contre les fuites de donn\u00e9es sensibles h\u00e9berg\u00e9es dans le cloud. Elle alerte les entreprises...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/08\/interview-gitguardian-securiser-cles-privees\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2018-08-07T16:25:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-01-03T08:17:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/11\/Fotolia_69519539_Subscription_Monthly_XXL-CUT-Flat-style-vector-illustration-brainstorming-process-concept-Sentavio.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"4124\" \/>\n\t<meta property=\"og:image:height\" content=\"2902\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Gabriel Amirault\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Gabriel Amirault\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/08\/interview-gitguardian-securiser-cles-privees\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/08\/interview-gitguardian-securiser-cles-privees\/\"},\"author\":{\"name\":\"Gabriel Amirault\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/6e59709056fa2859e362ae119d5370ca\"},\"headline\":\"L&#8217;interview de GITGUARDIAN \u2013 S\u00e9curiser les cl\u00e9s priv\u00e9es\",\"datePublished\":\"2018-08-07T16:25:56+00:00\",\"dateModified\":\"2020-01-03T08:17:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/08\/interview-gitguardian-securiser-cles-privees\/\"},\"wordCount\":802,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/08\/interview-gitguardian-securiser-cles-privees\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/11\/Fotolia_69519539_Subscription_Monthly_XXL-CUT-Flat-style-vector-illustration-brainstorming-process-concept-Sentavio.jpg\",\"keywords\":[\"analyse\",\"BCSIA\",\"chiffrement\",\"code source\",\"d\u00e9tection\",\"d\u00e9veloppement\",\"identity &amp; access management\",\"PKI\"],\"articleSection\":[\"Cybersecurity &amp; Digital Trust\",\"Digital Identity\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/08\/interview-gitguardian-securiser-cles-privees\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/08\/interview-gitguardian-securiser-cles-privees\/\",\"name\":\"GITGUARDIAN : S\u00e9curiser les cl\u00e9s priv\u00e9es - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/08\/interview-gitguardian-securiser-cles-privees\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/08\/interview-gitguardian-securiser-cles-privees\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/11\/Fotolia_69519539_Subscription_Monthly_XXL-CUT-Flat-style-vector-illustration-brainstorming-process-concept-Sentavio.jpg\",\"datePublished\":\"2018-08-07T16:25:56+00:00\",\"dateModified\":\"2020-01-03T08:17:27+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/08\/interview-gitguardian-securiser-cles-privees\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/08\/interview-gitguardian-securiser-cles-privees\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/08\/interview-gitguardian-securiser-cles-privees\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/11\/Fotolia_69519539_Subscription_Monthly_XXL-CUT-Flat-style-vector-illustration-brainstorming-process-concept-Sentavio.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/11\/Fotolia_69519539_Subscription_Monthly_XXL-CUT-Flat-style-vector-illustration-brainstorming-process-concept-Sentavio.jpg\",\"width\":4124,\"height\":2902,\"caption\":\"Print\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/08\/interview-gitguardian-securiser-cles-privees\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"L&#8217;interview de GITGUARDIAN \u2013 S\u00e9curiser les cl\u00e9s priv\u00e9es\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/6e59709056fa2859e362ae119d5370ca\",\"name\":\"Gabriel Amirault\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/gabriel-amirault\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"GITGUARDIAN : S\u00e9curiser les cl\u00e9s priv\u00e9es - RiskInsight","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/08\/interview-gitguardian-securiser-cles-privees\/","og_locale":"en_US","og_type":"article","og_title":"GITGUARDIAN : S\u00e9curiser les cl\u00e9s priv\u00e9es - RiskInsight","og_description":"Dans le cadre des Banking CyberSecurity Innovation Awards, GitGuardian a \u00e9t\u00e9 r\u00e9compens\u00e9 du prix protection des donn\u00e9es clients. Cette solution aide les entreprises \u00e0 se prot\u00e9ger contre les fuites de donn\u00e9es sensibles h\u00e9berg\u00e9es dans le cloud. Elle alerte les entreprises...","og_url":"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/08\/interview-gitguardian-securiser-cles-privees\/","og_site_name":"RiskInsight","article_published_time":"2018-08-07T16:25:56+00:00","article_modified_time":"2020-01-03T08:17:27+00:00","og_image":[{"width":4124,"height":2902,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/11\/Fotolia_69519539_Subscription_Monthly_XXL-CUT-Flat-style-vector-illustration-brainstorming-process-concept-Sentavio.jpg","type":"image\/jpeg"}],"author":"Gabriel Amirault","twitter_misc":{"Written by":"Gabriel Amirault","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/08\/interview-gitguardian-securiser-cles-privees\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/08\/interview-gitguardian-securiser-cles-privees\/"},"author":{"name":"Gabriel Amirault","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/6e59709056fa2859e362ae119d5370ca"},"headline":"L&#8217;interview de GITGUARDIAN \u2013 S\u00e9curiser les cl\u00e9s priv\u00e9es","datePublished":"2018-08-07T16:25:56+00:00","dateModified":"2020-01-03T08:17:27+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/08\/interview-gitguardian-securiser-cles-privees\/"},"wordCount":802,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/08\/interview-gitguardian-securiser-cles-privees\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/11\/Fotolia_69519539_Subscription_Monthly_XXL-CUT-Flat-style-vector-illustration-brainstorming-process-concept-Sentavio.jpg","keywords":["analyse","BCSIA","chiffrement","code source","d\u00e9tection","d\u00e9veloppement","identity &amp; access management","PKI"],"articleSection":["Cybersecurity &amp; Digital Trust","Digital Identity"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/08\/interview-gitguardian-securiser-cles-privees\/","url":"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/08\/interview-gitguardian-securiser-cles-privees\/","name":"GITGUARDIAN : S\u00e9curiser les cl\u00e9s priv\u00e9es - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/08\/interview-gitguardian-securiser-cles-privees\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/08\/interview-gitguardian-securiser-cles-privees\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/11\/Fotolia_69519539_Subscription_Monthly_XXL-CUT-Flat-style-vector-illustration-brainstorming-process-concept-Sentavio.jpg","datePublished":"2018-08-07T16:25:56+00:00","dateModified":"2020-01-03T08:17:27+00:00","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/08\/interview-gitguardian-securiser-cles-privees\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2018\/08\/interview-gitguardian-securiser-cles-privees\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/08\/interview-gitguardian-securiser-cles-privees\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/11\/Fotolia_69519539_Subscription_Monthly_XXL-CUT-Flat-style-vector-illustration-brainstorming-process-concept-Sentavio.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/11\/Fotolia_69519539_Subscription_Monthly_XXL-CUT-Flat-style-vector-illustration-brainstorming-process-concept-Sentavio.jpg","width":4124,"height":2902,"caption":"Print"},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/08\/interview-gitguardian-securiser-cles-privees\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"L&#8217;interview de GITGUARDIAN \u2013 S\u00e9curiser les cl\u00e9s priv\u00e9es"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/6e59709056fa2859e362ae119d5370ca","name":"Gabriel Amirault","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/gabriel-amirault\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/11170","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/21"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=11170"}],"version-history":[{"count":3,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/11170\/revisions"}],"predecessor-version":[{"id":12556,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/11170\/revisions\/12556"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/9308"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=11170"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=11170"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=11170"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=11170"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}