{"id":903,"date":"2011-11-22T15:43:05","date_gmt":"2011-11-22T14:43:05","guid":{"rendered":"http:\/\/www.solucominsight.fr\/?p=903"},"modified":"2019-12-31T12:22:39","modified_gmt":"2019-12-31T11:22:39","slug":"faille-revelee-dans-le-systeme-de-validation-pour-les-applications-pour-ios-que-faut-il-en-penser","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2011\/11\/faille-revelee-dans-le-systeme-de-validation-pour-les-applications-pour-ios-que-faut-il-en-penser\/","title":{"rendered":"Faille r\u00e9v\u00e9l\u00e9e dans le syst\u00e8me de validation pour les applications pour iOS : que faut-il en penser ?"},"content":{"rendered":"<p>Le chercheur en s\u00e9curit\u00e9 Charlie Miller a annonc\u00e9 la semaine derni\u00e8re avoir d\u00e9velopp\u00e9 et fait valider une application qui, derri\u00e8re un masque anodin d\u2019outil de suivi de la bourse, cachait la possibilit\u00e9 pour son cr\u00e9ateur de prendre le contr\u00f4le du terminal \u00e0 distance (en ex\u00e9cutant du code non sign\u00e9).<\/p>\n<p>Cette r\u00e9v\u00e9lation pose la question de la validation par Apple des applications pour son \u00e9cosyst\u00e8me iOS, r\u00e9put\u00e9e pointilleuse. Mais que doit-on r\u00e9ellement tirer de la nouvelle ? Faut-il s\u2019alarmer quant au manque de fiabilit\u00e9 du syst\u00e8me\u00a0?<\/p>\n<p>En r\u00e9alit\u00e9, il a toujours \u00e9t\u00e9 illusoire de penser qu\u2019Apple pouvait proc\u00e9der \u00e0 une revue syst\u00e9matique et en bonne et due forme du code de chaque application. Peu d\u2019informations filtrent sur le d\u00e9tail des v\u00e9rifications qui sont faites, mais les rejets sont g\u00e9n\u00e9ralement plut\u00f4t justifi\u00e9s par des d\u00e9fauts d\u2019ergonomie de l\u2019application, ou le fait que des API non autoris\u00e9es par Apple sont utilis\u00e9es.<\/p>\n<p>La grande nouveaut\u00e9 tient dans le fait que Miller ait r\u00e9ussi \u00e0 publier son application, qu\u2019elle soit rest\u00e9e disponible pendant plusieurs semaines, et qu\u2019elle le serait sans doute rest\u00e9e s\u2019il n\u2019avait lui-m\u00eame r\u00e9v\u00e9l\u00e9 le subterfuge. Il s\u2019agit plut\u00f4t d\u2019une confirmation qu\u2019un tel contournement des protections est possible, plut\u00f4t qu\u2019une d\u00e9couverte tout \u00e0 fait inattendue.<\/p>\n<p>Il faut donc temp\u00e9rer cette r\u00e9v\u00e9lation : la faille est loin d\u2019\u00eatre la premi\u00e8re sur le syst\u00e8me iOS et ne sera certainement pas la derni\u00e8re. Elle n\u2019est par ailleurs sans doute pas \u00e0 la port\u00e9e du premier d\u00e9veloppeur venu.<\/p>\n<p>L\u2019\u00e9cosyst\u00e8me d\u2019applications d\u2019Apple reste tout de m\u00eame relativement robuste d\u2019un point de vue de la s\u00e9curit\u00e9, m\u00eame si les applications ne font pas l\u2019objet de tests de s\u00e9curit\u00e9 pouss\u00e9s au cas par cas. Rappelons enfin que c\u2019est le m\u00eame Charlie Miller qui vantait r\u00e9cemment cette robustesse de l\u2019App Store, qu\u2019il comparait \u00e0 l\u2019Android Market, moins s\u00fbr selon lui (car plus ouvert).<\/p>\n<p>Beaucoup d\u2019observateurs s\u2019\u00e9tonnent que la r\u00e9action premi\u00e8re d\u2019Apple ait \u00e9t\u00e9 de bannir l\u2019application de son App Store et Miller de son programme pour d\u00e9veloppeurs. Il s\u2019agit pourtant l\u00e0 d\u2019une violation des r\u00e8gles d\u2019utilisation, et ce dernier savait certainement \u00e0 quelle sanction il s\u2019exposait.<\/p>\n<p>En tout \u00e9tat de cause, les attaquants souhaitant tirer parti d\u2019applications malveillantes n\u2019auront pas attendu la r\u00e9v\u00e9lation de cette faille pour tenter de les faire valider. Apple ne pourra dor\u00e9navant que redoubler d\u2019effort pour conserver un App Store sain\u2026<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Le chercheur en s\u00e9curit\u00e9 Charlie Miller a annonc\u00e9 la semaine derni\u00e8re avoir d\u00e9velopp\u00e9 et fait valider une application qui, derri\u00e8re un masque anodin d\u2019outil de suivi de la bourse, cachait la possibilit\u00e9 pour son cr\u00e9ateur de prendre le contr\u00f4le du&#8230;<\/p>\n","protected":false},"author":13,"featured_media":6343,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[36,3225],"tags":[3319,204],"coauthors":[801],"class_list":["post-903","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-digital-trust","category-ethical-hacking-indicent-response","tag-audit-pentesting","tag-faille"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Faille r\u00e9v\u00e9l\u00e9e dans le syst\u00e8me de validation pour les applications pour iOS : que faut-il en penser ? - RiskInsight<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/2011\/11\/faille-revelee-dans-le-systeme-de-validation-pour-les-applications-pour-ios-que-faut-il-en-penser\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Faille r\u00e9v\u00e9l\u00e9e dans le syst\u00e8me de validation pour les applications pour iOS : que faut-il en penser ? - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"Le chercheur en s\u00e9curit\u00e9 Charlie Miller a annonc\u00e9 la semaine derni\u00e8re avoir d\u00e9velopp\u00e9 et fait valider une application qui, derri\u00e8re un masque anodin d\u2019outil de suivi de la bourse, cachait la possibilit\u00e9 pour son cr\u00e9ateur de prendre le contr\u00f4le du...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/2011\/11\/faille-revelee-dans-le-systeme-de-validation-pour-les-applications-pour-ios-que-faut-il-en-penser\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2011-11-22T14:43:05+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-12-31T11:22:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"573\" \/>\n\t<meta property=\"og:image:height\" content=\"214\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Chadi Hantouche\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chadi Hantouche\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/11\/faille-revelee-dans-le-systeme-de-validation-pour-les-applications-pour-ios-que-faut-il-en-penser\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/11\/faille-revelee-dans-le-systeme-de-validation-pour-les-applications-pour-ios-que-faut-il-en-penser\/\"},\"author\":{\"name\":\"Chadi Hantouche\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/f79d84b363b7e5b8090ca3839d396efc\"},\"headline\":\"Faille r\u00e9v\u00e9l\u00e9e dans le syst\u00e8me de validation pour les applications pour iOS : que faut-il en penser ?\",\"datePublished\":\"2011-11-22T14:43:05+00:00\",\"dateModified\":\"2019-12-31T11:22:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/11\/faille-revelee-dans-le-systeme-de-validation-pour-les-applications-pour-ios-que-faut-il-en-penser\/\"},\"wordCount\":490,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/11\/faille-revelee-dans-le-systeme-de-validation-pour-les-applications-pour-ios-que-faut-il-en-penser\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg\",\"keywords\":[\"audit &amp; pentesting\",\"faille\"],\"articleSection\":[\"Cybersecurity &amp; Digital Trust\",\"Ethical Hacking &amp; Incident Response\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/11\/faille-revelee-dans-le-systeme-de-validation-pour-les-applications-pour-ios-que-faut-il-en-penser\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/11\/faille-revelee-dans-le-systeme-de-validation-pour-les-applications-pour-ios-que-faut-il-en-penser\/\",\"name\":\"Faille r\u00e9v\u00e9l\u00e9e dans le syst\u00e8me de validation pour les applications pour iOS : que faut-il en penser ? - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/11\/faille-revelee-dans-le-systeme-de-validation-pour-les-applications-pour-ios-que-faut-il-en-penser\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/11\/faille-revelee-dans-le-systeme-de-validation-pour-les-applications-pour-ios-que-faut-il-en-penser\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg\",\"datePublished\":\"2011-11-22T14:43:05+00:00\",\"dateModified\":\"2019-12-31T11:22:39+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/11\/faille-revelee-dans-le-systeme-de-validation-pour-les-applications-pour-ios-que-faut-il-en-penser\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/2011\/11\/faille-revelee-dans-le-systeme-de-validation-pour-les-applications-pour-ios-que-faut-il-en-penser\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/11\/faille-revelee-dans-le-systeme-de-validation-pour-les-applications-pour-ios-que-faut-il-en-penser\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg\",\"width\":573,\"height\":214},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/11\/faille-revelee-dans-le-systeme-de-validation-pour-les-applications-pour-ios-que-faut-il-en-penser\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Faille r\u00e9v\u00e9l\u00e9e dans le syst\u00e8me de validation pour les applications pour iOS : que faut-il en penser ?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/f79d84b363b7e5b8090ca3839d396efc\",\"name\":\"Chadi Hantouche\",\"description\":\"Chadi Hantouche is a Cybersecurity and Digital Trust Senior Manager at Wavestone. For more than a decade, he has helped companies assessing their risk and maturity level, and defining associated solutions. He has a focus on security to support innovative technologies (Big Data, Internet of Things, Cloud computing, Mobility) as well as prevention and reaction against cyberattacks. Chadi is a CISSP, ISO 27001 LI and ITIL certified professional. He is a regular speaker on French and international TV channels, newspapers and conferences, and lecturer in several computer science universities.\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/chadi-hantouche\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Faille r\u00e9v\u00e9l\u00e9e dans le syst\u00e8me de validation pour les applications pour iOS : que faut-il en penser ? - RiskInsight","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/2011\/11\/faille-revelee-dans-le-systeme-de-validation-pour-les-applications-pour-ios-que-faut-il-en-penser\/","og_locale":"en_US","og_type":"article","og_title":"Faille r\u00e9v\u00e9l\u00e9e dans le syst\u00e8me de validation pour les applications pour iOS : que faut-il en penser ? - RiskInsight","og_description":"Le chercheur en s\u00e9curit\u00e9 Charlie Miller a annonc\u00e9 la semaine derni\u00e8re avoir d\u00e9velopp\u00e9 et fait valider une application qui, derri\u00e8re un masque anodin d\u2019outil de suivi de la bourse, cachait la possibilit\u00e9 pour son cr\u00e9ateur de prendre le contr\u00f4le du...","og_url":"https:\/\/www.riskinsight-wavestone.com\/2011\/11\/faille-revelee-dans-le-systeme-de-validation-pour-les-applications-pour-ios-que-faut-il-en-penser\/","og_site_name":"RiskInsight","article_published_time":"2011-11-22T14:43:05+00:00","article_modified_time":"2019-12-31T11:22:39+00:00","og_image":[{"width":573,"height":214,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg","type":"image\/jpeg"}],"author":"Chadi Hantouche","twitter_misc":{"Written by":"Chadi Hantouche","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/2011\/11\/faille-revelee-dans-le-systeme-de-validation-pour-les-applications-pour-ios-que-faut-il-en-penser\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2011\/11\/faille-revelee-dans-le-systeme-de-validation-pour-les-applications-pour-ios-que-faut-il-en-penser\/"},"author":{"name":"Chadi Hantouche","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/f79d84b363b7e5b8090ca3839d396efc"},"headline":"Faille r\u00e9v\u00e9l\u00e9e dans le syst\u00e8me de validation pour les applications pour iOS : que faut-il en penser ?","datePublished":"2011-11-22T14:43:05+00:00","dateModified":"2019-12-31T11:22:39+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2011\/11\/faille-revelee-dans-le-systeme-de-validation-pour-les-applications-pour-ios-que-faut-il-en-penser\/"},"wordCount":490,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2011\/11\/faille-revelee-dans-le-systeme-de-validation-pour-les-applications-pour-ios-que-faut-il-en-penser\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg","keywords":["audit &amp; pentesting","faille"],"articleSection":["Cybersecurity &amp; Digital Trust","Ethical Hacking &amp; Incident Response"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/2011\/11\/faille-revelee-dans-le-systeme-de-validation-pour-les-applications-pour-ios-que-faut-il-en-penser\/","url":"https:\/\/www.riskinsight-wavestone.com\/2011\/11\/faille-revelee-dans-le-systeme-de-validation-pour-les-applications-pour-ios-que-faut-il-en-penser\/","name":"Faille r\u00e9v\u00e9l\u00e9e dans le syst\u00e8me de validation pour les applications pour iOS : que faut-il en penser ? - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2011\/11\/faille-revelee-dans-le-systeme-de-validation-pour-les-applications-pour-ios-que-faut-il-en-penser\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2011\/11\/faille-revelee-dans-le-systeme-de-validation-pour-les-applications-pour-ios-que-faut-il-en-penser\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg","datePublished":"2011-11-22T14:43:05+00:00","dateModified":"2019-12-31T11:22:39+00:00","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2011\/11\/faille-revelee-dans-le-systeme-de-validation-pour-les-applications-pour-ios-que-faut-il-en-penser\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/2011\/11\/faille-revelee-dans-le-systeme-de-validation-pour-les-applications-pour-ios-que-faut-il-en-penser\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/2011\/11\/faille-revelee-dans-le-systeme-de-validation-pour-les-applications-pour-ios-que-faut-il-en-penser\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg","width":573,"height":214},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/2011\/11\/faille-revelee-dans-le-systeme-de-validation-pour-les-applications-pour-ios-que-faut-il-en-penser\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"Faille r\u00e9v\u00e9l\u00e9e dans le syst\u00e8me de validation pour les applications pour iOS : que faut-il en penser ?"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/f79d84b363b7e5b8090ca3839d396efc","name":"Chadi Hantouche","description":"Chadi Hantouche is a Cybersecurity and Digital Trust Senior Manager at Wavestone. For more than a decade, he has helped companies assessing their risk and maturity level, and defining associated solutions. He has a focus on security to support innovative technologies (Big Data, Internet of Things, Cloud computing, Mobility) as well as prevention and reaction against cyberattacks. Chadi is a CISSP, ISO 27001 LI and ITIL certified professional. He is a regular speaker on French and international TV channels, newspapers and conferences, and lecturer in several computer science universities.","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/chadi-hantouche\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/903","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=903"}],"version-history":[{"count":8,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/903\/revisions"}],"predecessor-version":[{"id":6478,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/903\/revisions\/6478"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/6343"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=903"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=903"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=903"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=903"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}