{"id":9355,"date":"2017-01-13T10:19:14","date_gmt":"2017-01-13T09:19:14","guid":{"rendered":"https:\/\/www.riskinsight-wavestone.com\/?p=9355"},"modified":"2019-12-31T14:18:43","modified_gmt":"2019-12-31T13:18:43","slug":"machines-assuraient-propre-cyberdefense","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2017\/01\/machines-assuraient-propre-cyberdefense\/","title":{"rendered":"Et si les machines assuraient leur propre cyberd\u00e9fense ?"},"content":{"rendered":"<p>C\u2019est du moins l\u2019avenir qu\u2019envisage la <strong>DARPA<\/strong><a href=\"http:\/\/www.darpa.mil\/\" name=\"_ednref1\"><\/a>, l\u2019agence pour les projets de recherche avanc\u00e9e de d\u00e9fense am\u00e9ricaine. Elle a organis\u00e9 l\u2019\u00e9t\u00e9 dernier le <em>Cyber Grand Challenge<\/em><a href=\"#_edn2\" name=\"_ednref2\"><\/a>(CGC), un <strong>tournoi de d\u2019attaque\/d\u00e9fense cybers\u00e9curit\u00e9<\/strong> (<em>Capture The Flag<\/em><a href=\"#_edn3\" name=\"_ednref3\"><\/a><em>)<\/em> r\u00e9serv\u00e9 aux <strong>machines<\/strong>. Sans intervention humaine, elles ont tent\u00e9 de trouver des <strong>vuln\u00e9rabilit\u00e9s<\/strong> dans les syst\u00e8mes adverses tout en se d\u00e9fendant de leurs concurrents. Avec<strong> 2 millions de dollars \u00e0 la cl<\/strong>\u00e9, ce concours \u00e9tait l\u2019occasion de faire avancer la recherche dans un terrain encore peu explor\u00e9.<\/p>\n<h1>Un concours digne d\u2019une comp\u00e9tition sportive<\/h1>\n<p>Au Paris Hotel de Las Vegas, Nevada, s\u2019est d\u00e9roul\u00e9 en ao\u00fbt 2016 cet \u00e9trange concours digne d\u2019une comp\u00e9tition sportive. Pendant pr\u00e8s de 12 heures, d\u2019imposantes machines, appel\u00e9es <em>Cyber Reasoning Systems<\/em> se sont affront\u00e9es dans l\u2019ar\u00e8ne devant un public de 3000 personnes, auquel les pr\u00e9sentateurs expliquaient les tentatives d\u2019attaques et les corrections de vuln\u00e9rabilit\u00e9s gr\u00e2ce \u00e0 des repr\u00e9sentations en 3D tr\u00e8s parlantes. Organis\u00e9 par la DARPA, ce concours avait un double but\u00a0: valider le concept de <strong>cyberd\u00e9fense automatis\u00e9e<\/strong> et stimuler la recherche en offrant 4 millions de dollars de prix, dont 2 \u00e0 l\u2019\u00e9quipe vainqueur.<\/p>\n<p>Selon Mike Walker<a href=\"#_edn4\" name=\"_ednref4\"><\/a>, responsable du programme du <em>Cyber Grand Challenge<\/em>, les failles de s\u00e9curit\u00e9 exploit\u00e9es dans la nature le seraient pendant 312 jours en moyenne avant leur d\u00e9tection et le temps m\u00e9dian de correction apr\u00e8s d\u00e9tection serait de 24 jours. Un d\u00e9lai tr\u00e8s long pendant lequel les syst\u00e8mes restent vuln\u00e9rables et que la DARPA souhaiterait voir r\u00e9duit \u00e0 quelques minutes ou secondes<strong>, en confiant aux machines la t\u00e2che de d\u00e9tecter et de corriger elles-m\u00eames ces failles de s\u00e9curit\u00e9<\/strong>.<\/p>\n<p>Depuis l\u2019annonce du concours en 2013, la DARPA qui prend le sujet tr\u00e8s au s\u00e9rieux, y a <strong>investi 55 millions de dollars<\/strong>. 7 \u00e9quipes aux propositions int\u00e9ressantes ont \u00e9t\u00e9 invit\u00e9es \u00e0 participer au concours en recevant une aide financi\u00e8re mais l\u2019entr\u00e9e restait ouverte \u00e0 toute \u00e9quipe auto-financ\u00e9e souhaitant relever le d\u00e9fi. En juin 2015, les qualifications ont eu lieu sur Internet pendant <strong>24 heures<\/strong> au cours desquelles les \u00e9quipes devaient trouver le <strong>maximum de vuln\u00e9rabilit\u00e9s affectant 131 programmes<\/strong><a href=\"#_edn5\" name=\"_ednref5\"><\/a>. Sur plus de 100 \u00e9quipes les 7 meilleures se sont qualifi\u00e9es pour l\u2019\u00e9v\u00e9nement final, touchant 750.000$ au passage afin de s\u2019y pr\u00e9parer. Parmi elles, 3 \u00e9quipes financ\u00e9es par la DARPA et 4 \u00e9quipes auto-financ\u00e9es<a href=\"#_edn6\" name=\"_ednref6\"><\/a>.<\/p>\n<p>Au bout de 12 heures de comp\u00e9tition acharn\u00e9e, c\u2019est <strong>Mayhem, le CRS de l\u2019\u00e9quipe ForAllSecure<a href=\"#_edn7\" name=\"_ednref7\"><\/a> <\/strong>qui a remport\u00e9 la victoire malgr\u00e9 une difficult\u00e9 technique qui l\u2019a emp\u00each\u00e9 de soumettre des correctifs pendant une partie de l\u2019\u00e9preuve. Mayhem a eu le privil\u00e8ge de pouvoir concourir au concours \u00ab\u00a0normal\u00a0\u00bb de la conf\u00e9rence DEFCON o\u00f9 s\u2019affrontaient les meilleures \u00e9quipes de hackers du monde entier. Mayhem est arriv\u00e9 bon dernier de ce concours, mais \u00e0 quelques points seulement de la derni\u00e8re \u00e9quipe humaine<a href=\"#_edn8\" name=\"_ednref8\"><\/a>. Ce r\u00e9sultat peut \u00eatre compar\u00e9 \u00e0 la progression des machines contre les humains\u00a0aux \u00e9checs en conditions de tournoi : entre les premi\u00e8res victoires des machines contre des ma\u00eetres au d\u00e9but des ann\u00e9es 80<a href=\"#_edn9\" name=\"_ednref9\"><\/a> et le moment o\u00f9 les machines parvenaient \u00e0 battre des grands ma\u00eetres de fa\u00e7on r\u00e9guli\u00e8re au milieu des ann\u00e9es 2000, 25 ans se sont \u00e9coul\u00e9s.<\/p>\n<p>Si les machines talonnent aujourd\u2019hui les meilleures \u00e9quipes de hackers, <strong>de quoi seront-elles capables dans 10 ou 20 ans\u00a0<\/strong>?<\/p>\n<h1>Vers un monde plus s\u00fbr\u00a0?<\/h1>\n<p>David Brumley, CEO de ForAllSecure spinoff de l\u2019universit\u00e9 Carnegie Mellon, souhaite que dans le monde ultra connect\u00e9 qui est le n\u00f4tre, <strong>chacun puisse avoir la garantie que les objets et les applications que nous utilisons soient s\u00fbrs<\/strong>, sans s\u2019en remettre uniquement \u00e0 leurs d\u00e9veloppeurs<a href=\"#_edn10\" name=\"_ednref10\"><\/a>. Mais si le d\u00e9veloppement d\u2019une cyberd\u00e9fense automatis\u00e9e est une aubaine pour la soci\u00e9t\u00e9 civile, <strong>on peut bien imaginer quelles implications offensives ces recherches pourraient avoir<\/strong>. D\u00e9couvrir rapidement et en grande quantit\u00e9 des bugs dans des programmes fournirait autant de munitions \u00e0 un \u00e9tat d\u00e9cid\u00e9 \u00e0 attaquer des syst\u00e8mes d\u2019organisations ou d\u2019autres nations n\u2019\u00e9tant pas align\u00e9es avec ses int\u00e9r\u00eats. Et l\u2019on peut \u00eatre s\u00fbr que la DARPA, dont la vocation premi\u00e8re est militaire, en a parfaitement conscience.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>C\u2019est du moins l\u2019avenir qu\u2019envisage la DARPA, l\u2019agence pour les projets de recherche avanc\u00e9e de d\u00e9fense am\u00e9ricaine. Elle a organis\u00e9 l\u2019\u00e9t\u00e9 dernier le Cyber Grand Challenge(CGC), un tournoi de d\u2019attaque\/d\u00e9fense cybers\u00e9curit\u00e9 (Capture The Flag) r\u00e9serv\u00e9 aux machines. Sans intervention humaine,&#8230;<\/p>\n","protected":false},"author":1264,"featured_media":9356,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[3223,36],"tags":[402,2740,1157,2739,3302,1203],"coauthors":[2741],"class_list":["post-9355","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud-next-gen-it-security","category-cybersecurity-digital-trust","tag-automatisation","tag-capture-the-flag","tag-cyberdefense","tag-def-con","tag-security-architecture","tag-vulnerabilites"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Et si les machines assuraient leur propre cyberd\u00e9fense ? - RiskInsight<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/2017\/01\/machines-assuraient-propre-cyberdefense\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Et si les machines assuraient leur propre cyberd\u00e9fense ? - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"C\u2019est du moins l\u2019avenir qu\u2019envisage la DARPA, l\u2019agence pour les projets de recherche avanc\u00e9e de d\u00e9fense am\u00e9ricaine. Elle a organis\u00e9 l\u2019\u00e9t\u00e9 dernier le Cyber Grand Challenge(CGC), un tournoi de d\u2019attaque\/d\u00e9fense cybers\u00e9curit\u00e9 (Capture The Flag) r\u00e9serv\u00e9 aux machines. Sans intervention humaine,...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/2017\/01\/machines-assuraient-propre-cyberdefense\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2017-01-13T09:19:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-12-31T13:18:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/01\/Fotolia_78059294_Subscription_Monthly_M.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1378\" \/>\n\t<meta property=\"og:image:height\" content=\"1378\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"David Renty\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"David Renty\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2017\/01\/machines-assuraient-propre-cyberdefense\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2017\/01\/machines-assuraient-propre-cyberdefense\/\"},\"author\":{\"name\":\"David Renty\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/0534e7c3aa71f805ffd5bc0f82fb26bd\"},\"headline\":\"Et si les machines assuraient leur propre cyberd\u00e9fense ?\",\"datePublished\":\"2017-01-13T09:19:14+00:00\",\"dateModified\":\"2019-12-31T13:18:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2017\/01\/machines-assuraient-propre-cyberdefense\/\"},\"wordCount\":747,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2017\/01\/machines-assuraient-propre-cyberdefense\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/01\/Fotolia_78059294_Subscription_Monthly_M.jpg\",\"keywords\":[\"automatisation\",\"Capture The Flag\",\"cyberd\u00e9fense\",\"DEF CON\",\"security architecture\",\"vuln\u00e9rabilit\u00e9s\"],\"articleSection\":[\"Cloud &amp; Next-Gen IT Security\",\"Cybersecurity &amp; Digital Trust\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2017\/01\/machines-assuraient-propre-cyberdefense\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/2017\/01\/machines-assuraient-propre-cyberdefense\/\",\"name\":\"Et si les machines assuraient leur propre cyberd\u00e9fense ? - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2017\/01\/machines-assuraient-propre-cyberdefense\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2017\/01\/machines-assuraient-propre-cyberdefense\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/01\/Fotolia_78059294_Subscription_Monthly_M.jpg\",\"datePublished\":\"2017-01-13T09:19:14+00:00\",\"dateModified\":\"2019-12-31T13:18:43+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2017\/01\/machines-assuraient-propre-cyberdefense\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/2017\/01\/machines-assuraient-propre-cyberdefense\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2017\/01\/machines-assuraient-propre-cyberdefense\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/01\/Fotolia_78059294_Subscription_Monthly_M.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/01\/Fotolia_78059294_Subscription_Monthly_M.jpg\",\"width\":1378,\"height\":1378},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2017\/01\/machines-assuraient-propre-cyberdefense\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Et si les machines assuraient leur propre cyberd\u00e9fense ?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/0534e7c3aa71f805ffd5bc0f82fb26bd\",\"name\":\"David Renty\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/david-renty\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Et si les machines assuraient leur propre cyberd\u00e9fense ? - RiskInsight","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/2017\/01\/machines-assuraient-propre-cyberdefense\/","og_locale":"en_US","og_type":"article","og_title":"Et si les machines assuraient leur propre cyberd\u00e9fense ? - RiskInsight","og_description":"C\u2019est du moins l\u2019avenir qu\u2019envisage la DARPA, l\u2019agence pour les projets de recherche avanc\u00e9e de d\u00e9fense am\u00e9ricaine. Elle a organis\u00e9 l\u2019\u00e9t\u00e9 dernier le Cyber Grand Challenge(CGC), un tournoi de d\u2019attaque\/d\u00e9fense cybers\u00e9curit\u00e9 (Capture The Flag) r\u00e9serv\u00e9 aux machines. Sans intervention humaine,...","og_url":"https:\/\/www.riskinsight-wavestone.com\/2017\/01\/machines-assuraient-propre-cyberdefense\/","og_site_name":"RiskInsight","article_published_time":"2017-01-13T09:19:14+00:00","article_modified_time":"2019-12-31T13:18:43+00:00","og_image":[{"width":1378,"height":1378,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/01\/Fotolia_78059294_Subscription_Monthly_M.jpg","type":"image\/jpeg"}],"author":"David Renty","twitter_misc":{"Written by":"David Renty","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/2017\/01\/machines-assuraient-propre-cyberdefense\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2017\/01\/machines-assuraient-propre-cyberdefense\/"},"author":{"name":"David Renty","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/0534e7c3aa71f805ffd5bc0f82fb26bd"},"headline":"Et si les machines assuraient leur propre cyberd\u00e9fense ?","datePublished":"2017-01-13T09:19:14+00:00","dateModified":"2019-12-31T13:18:43+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2017\/01\/machines-assuraient-propre-cyberdefense\/"},"wordCount":747,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2017\/01\/machines-assuraient-propre-cyberdefense\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/01\/Fotolia_78059294_Subscription_Monthly_M.jpg","keywords":["automatisation","Capture The Flag","cyberd\u00e9fense","DEF CON","security architecture","vuln\u00e9rabilit\u00e9s"],"articleSection":["Cloud &amp; Next-Gen IT Security","Cybersecurity &amp; Digital Trust"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/2017\/01\/machines-assuraient-propre-cyberdefense\/","url":"https:\/\/www.riskinsight-wavestone.com\/2017\/01\/machines-assuraient-propre-cyberdefense\/","name":"Et si les machines assuraient leur propre cyberd\u00e9fense ? - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2017\/01\/machines-assuraient-propre-cyberdefense\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2017\/01\/machines-assuraient-propre-cyberdefense\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/01\/Fotolia_78059294_Subscription_Monthly_M.jpg","datePublished":"2017-01-13T09:19:14+00:00","dateModified":"2019-12-31T13:18:43+00:00","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2017\/01\/machines-assuraient-propre-cyberdefense\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/2017\/01\/machines-assuraient-propre-cyberdefense\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/2017\/01\/machines-assuraient-propre-cyberdefense\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/01\/Fotolia_78059294_Subscription_Monthly_M.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/01\/Fotolia_78059294_Subscription_Monthly_M.jpg","width":1378,"height":1378},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/2017\/01\/machines-assuraient-propre-cyberdefense\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"Et si les machines assuraient leur propre cyberd\u00e9fense ?"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/0534e7c3aa71f805ffd5bc0f82fb26bd","name":"David Renty","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/david-renty\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/9355","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/1264"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=9355"}],"version-history":[{"count":1,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/9355\/revisions"}],"predecessor-version":[{"id":9357,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/9355\/revisions\/9357"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/9356"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=9355"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=9355"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=9355"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=9355"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}