{"id":518,"date":"2023-11-30T13:51:32","date_gmt":"2023-11-30T12:51:32","guid":{"rendered":"https:\/\/www.cybi.fr\/?p=518"},"modified":"2023-11-30T13:51:33","modified_gmt":"2023-11-30T12:51:33","slug":"la-souverainete-numerique-en-cybersecurite","status":"publish","type":"post","link":"https:\/\/www.cybi.fr\/index.php\/2023\/11\/30\/la-souverainete-numerique-en-cybersecurite\/","title":{"rendered":"La souverainet\u00e9 num\u00e9rique en cybers\u00e9curit\u00e9"},"content":{"rendered":"\n<p>La souverainet\u00e9 num\u00e9rique est devenue un enjeu strat\u00e9gique majeur en 2023. Face \u00e0 la multiplication des <strong>cyberattaques<\/strong> \u00e9manant d\u2019acteurs \u00e9tatiques ou non-\u00e9tatiques, la capacit\u00e9 des \u00c9tats \u00e0 contr\u00f4ler et s\u00e9curiser leurs <strong>infrastructures critiques<\/strong> dans le cyberespace conditionne leur <strong>souverainet\u00e9<\/strong>.<\/p>\n\n\n\n<p>Selon le Clusif, le nombre d\u2019incidents de cybers\u00e9curit\u00e9 a augment\u00e9 de 25% en 2023 par rapport \u00e0 20221. La sophistication croissante des attaques rend les organisations vuln\u00e9rables : <strong>ran\u00e7ongiciels<\/strong>, d\u00e9nis de service distribu\u00e9s <strong>DDOS<\/strong>, <strong>vols massifs de donn\u00e9es personnelles<\/strong>, etc. M\u00eame des secteurs sensibles comme la sant\u00e9 ou l\u2019\u00e9nergie sont frapp\u00e9s.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">L&rsquo;ins\u00e9curit\u00e9 num\u00e9rique<\/h2>\n\n\n\n<p>Cette ins\u00e9curit\u00e9 num\u00e9rique met \u00e0 mal la souverainet\u00e9 des \u00c9tats. D\u2019une part, elle facilite l\u2019<strong>espionnage industriel<\/strong> ou politique au profit de puissances \u00e9trang\u00e8res. D\u2019autre part, elle peut paralyser des <strong>infrastructures critiques<\/strong> et mettre en danger la vie de citoyens. Par exemple, la faille Log4Shell de fin 2021 a montr\u00e9 la vuln\u00e9rabilit\u00e9 des syst\u00e8mes d&rsquo;information de sant\u00e9 dans de nombreux pays.<\/p>\n\n\n\n<p>Pour regagner leur souverainet\u00e9 num\u00e9rique, les \u00c9tats doivent \u00e0 la fois durcir la s\u00e9curit\u00e9 de leurs infrastructures critiques et soutenir leur <strong>\u00e9cosyst\u00e8me national de cybers\u00e9curit\u00e9<\/strong>.<\/p>\n\n\n\n<p>C\u00f4t\u00e9 infrastructures, la France a adopt\u00e9 fin 2022 une nouvelle doctrine cyber : la r\u00e9silience. Plut\u00f4t que de miser sur une protection absolue, il s\u2019agit de d\u00e9velopper des m\u00e9canismes de <strong>d\u00e9fense en profondeur<\/strong> pour d\u00e9tecter rapidement les intrusions et r\u00e9tablir rapidement des capacit\u00e9s op\u00e9rationnelles.<\/p>\n\n\n\n<p>C\u00f4t\u00e9 \u00e9cosyst\u00e8me, de plus en plus d\u2019\u00c9tats misent sur le concept de \u201csouverainet\u00e9 digitale\u201d : ils favorisent le d\u00e9veloppement d\u2019acteurs nationaux pour \u00e9quiper leurs infrastructures (cloud, 5G, quantique&#8230;) et assurer leur s\u00e9curit\u00e9 (\u00e9diteurs de cyber). La France a lanc\u00e9 en 2023 un plan d\u20191 milliard d\u2019euros pour soutenir ses <strong>p\u00e9pites cybers<\/strong>.<\/p>\n\n\n\n<p>Face aux menaces grandissantes dans le cyberespace, la capacit\u00e9 \u00e0 contr\u00f4ler et s\u00e9curiser le num\u00e9rique est devenue un enjeu de souverainet\u00e9 majeur pour les \u00c9tats. Ceux qui sauront allier r\u00e9silience des infrastructures et <strong>\u00e9cosyst\u00e8me national robuste en cybers\u00e9curit\u00e9<\/strong> seront les plus \u00e0 m\u00eame d\u2019assurer leur souverainet\u00e9 \u00e0 l\u2019\u00e8re du num\u00e9rique.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>La souverainet\u00e9 num\u00e9rique est devenue un enjeu strat\u00e9gique majeur en 2023. Face \u00e0 la multiplication des cyberattaques \u00e9manant d\u2019acteurs \u00e9tatiques ou non-\u00e9tatiques, la capacit\u00e9 des \u00c9tats \u00e0 contr\u00f4ler et s\u00e9curiser leurs infrastructures critiques dans le cyberespace conditionne leur souverainet\u00e9. Selon le Clusif, le nombre d\u2019incidents de cybers\u00e9curit\u00e9 a augment\u00e9 de 25% en 2023 par rapport [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_uag_custom_page_level_css":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[35],"tags":[],"class_list":["post-518","post","type-post","status-publish","format-standard","hentry","category-technologies-et-cybersecurite"],"blocksy_meta":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>La souverainet\u00e9 num\u00e9rique en cybers\u00e9curit\u00e9 - Cybi - Solutions innovantes de Cybers\u00e9curit\u00e9 bas\u00e9es sur de l&#039;intelligence artificielle et de l&#039;apprentissage automatique<\/title>\n<meta name=\"description\" content=\"Cybi - Solutions innovantes de Cybers\u00e9curit\u00e9 bas\u00e9es sur de l&#039;intelligence artificielle et de l&#039;apprentissage automatique Technologies et Cybers\u00e9curit\u00e9 - cybersecurite cybersecurity scuba chemin attaque Attack Path Management intrusion\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cybi.fr\/index.php\/2023\/11\/30\/la-souverainete-numerique-en-cybersecurite\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"La souverainet\u00e9 num\u00e9rique en cybers\u00e9curit\u00e9 - Cybi - Solutions innovantes de Cybers\u00e9curit\u00e9 bas\u00e9es sur de l&#039;intelligence artificielle et de l&#039;apprentissage automatique\" \/>\n<meta property=\"og:description\" content=\"Cybi - Solutions innovantes de Cybers\u00e9curit\u00e9 bas\u00e9es sur de l&#039;intelligence artificielle et de l&#039;apprentissage automatique Technologies et Cybers\u00e9curit\u00e9 - cybersecurite cybersecurity scuba chemin attaque Attack Path Management intrusion\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cybi.fr\/index.php\/2023\/11\/30\/la-souverainete-numerique-en-cybersecurite\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybi - Solutions innovantes de Cybers\u00e9curit\u00e9 bas\u00e9es sur de l&#039;intelligence artificielle et de l&#039;apprentissage automatique\" \/>\n<meta property=\"article:published_time\" content=\"2023-11-30T12:51:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-30T12:51:33+00:00\" \/>\n<meta name=\"author\" content=\"Fabian OSMOND\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@CYBI_CYBER\" \/>\n<meta name=\"twitter:site\" content=\"@CYBI_CYBER\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Fabian OSMOND\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cybi.fr\\\/index.php\\\/2023\\\/11\\\/30\\\/la-souverainete-numerique-en-cybersecurite\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cybi.fr\\\/index.php\\\/2023\\\/11\\\/30\\\/la-souverainete-numerique-en-cybersecurite\\\/\"},\"author\":{\"name\":\"Fabian OSMOND\",\"@id\":\"https:\\\/\\\/www.cybi.fr\\\/#\\\/schema\\\/person\\\/3060713e028a83bbb248dba4763b3947\"},\"headline\":\"La souverainet\u00e9 num\u00e9rique en cybers\u00e9curit\u00e9\",\"datePublished\":\"2023-11-30T12:51:32+00:00\",\"dateModified\":\"2023-11-30T12:51:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cybi.fr\\\/index.php\\\/2023\\\/11\\\/30\\\/la-souverainete-numerique-en-cybersecurite\\\/\"},\"wordCount\":371,\"publisher\":{\"@id\":\"https:\\\/\\\/www.cybi.fr\\\/#organization\"},\"articleSection\":[\"Technologies et Cybers\u00e9curit\u00e9\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cybi.fr\\\/index.php\\\/2023\\\/11\\\/30\\\/la-souverainete-numerique-en-cybersecurite\\\/\",\"url\":\"https:\\\/\\\/www.cybi.fr\\\/index.php\\\/2023\\\/11\\\/30\\\/la-souverainete-numerique-en-cybersecurite\\\/\",\"name\":\"La souverainet\u00e9 num\u00e9rique en cybers\u00e9curit\u00e9 - Cybi - Solutions innovantes de Cybers\u00e9curit\u00e9 bas\u00e9es sur de l&#039;intelligence artificielle et de l&#039;apprentissage automatique\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cybi.fr\\\/#website\"},\"datePublished\":\"2023-11-30T12:51:32+00:00\",\"dateModified\":\"2023-11-30T12:51:33+00:00\",\"description\":\"Cybi - Solutions innovantes de Cybers\u00e9curit\u00e9 bas\u00e9es sur de l&#039;intelligence artificielle et de l&#039;apprentissage automatique Technologies et Cybers\u00e9curit\u00e9 - cybersecurite cybersecurity scuba chemin attaque Attack Path Management intrusion\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cybi.fr\\\/index.php\\\/2023\\\/11\\\/30\\\/la-souverainete-numerique-en-cybersecurite\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cybi.fr\\\/index.php\\\/2023\\\/11\\\/30\\\/la-souverainete-numerique-en-cybersecurite\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cybi.fr\\\/index.php\\\/2023\\\/11\\\/30\\\/la-souverainete-numerique-en-cybersecurite\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/www.cybi.fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"La souverainet\u00e9 num\u00e9rique en cybers\u00e9curit\u00e9\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cybi.fr\\\/#website\",\"url\":\"https:\\\/\\\/www.cybi.fr\\\/\",\"name\":\"Cybi - Solutions innovantes de Cybers\u00e9curit\u00e9 bas\u00e9es sur de l&#039;intelligence artificielle et de l&#039;apprentissage automatique\",\"description\":\"Cybi - Cybersecurity Intelligence\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.cybi.fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cybi.fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.cybi.fr\\\/#organization\",\"name\":\"Cybi\",\"url\":\"https:\\\/\\\/www.cybi.fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.cybi.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.cybi.fr\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/Standard-2.png\",\"contentUrl\":\"https:\\\/\\\/www.cybi.fr\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/Standard-2.png\",\"width\":2852,\"height\":1075,\"caption\":\"Cybi\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cybi.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/CYBI_CYBER\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/cybi\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cybi.fr\\\/#\\\/schema\\\/person\\\/3060713e028a83bbb248dba4763b3947\",\"name\":\"Fabian OSMOND\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/baa57700c10599330d27935edd14942cc7b498f6b563987f42915bb50101cad7?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/baa57700c10599330d27935edd14942cc7b498f6b563987f42915bb50101cad7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/baa57700c10599330d27935edd14942cc7b498f6b563987f42915bb50101cad7?s=96&d=mm&r=g\",\"caption\":\"Fabian OSMOND\"},\"url\":\"https:\\\/\\\/www.cybi.fr\\\/index.php\\\/author\\\/fosmond\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"La souverainet\u00e9 num\u00e9rique en cybers\u00e9curit\u00e9 - Cybi - Solutions innovantes de Cybers\u00e9curit\u00e9 bas\u00e9es sur de l&#039;intelligence artificielle et de l&#039;apprentissage automatique","description":"Cybi - Solutions innovantes de Cybers\u00e9curit\u00e9 bas\u00e9es sur de l&#039;intelligence artificielle et de l&#039;apprentissage automatique Technologies et Cybers\u00e9curit\u00e9 - cybersecurite cybersecurity scuba chemin attaque Attack Path Management intrusion","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cybi.fr\/index.php\/2023\/11\/30\/la-souverainete-numerique-en-cybersecurite\/","og_locale":"fr_FR","og_type":"article","og_title":"La souverainet\u00e9 num\u00e9rique en cybers\u00e9curit\u00e9 - Cybi - Solutions innovantes de Cybers\u00e9curit\u00e9 bas\u00e9es sur de l&#039;intelligence artificielle et de l&#039;apprentissage automatique","og_description":"Cybi - Solutions innovantes de Cybers\u00e9curit\u00e9 bas\u00e9es sur de l&#039;intelligence artificielle et de l&#039;apprentissage automatique Technologies et Cybers\u00e9curit\u00e9 - cybersecurite cybersecurity scuba chemin attaque Attack Path Management intrusion","og_url":"https:\/\/www.cybi.fr\/index.php\/2023\/11\/30\/la-souverainete-numerique-en-cybersecurite\/","og_site_name":"Cybi - Solutions innovantes de Cybers\u00e9curit\u00e9 bas\u00e9es sur de l&#039;intelligence artificielle et de l&#039;apprentissage automatique","article_published_time":"2023-11-30T12:51:32+00:00","article_modified_time":"2023-11-30T12:51:33+00:00","author":"Fabian OSMOND","twitter_card":"summary_large_image","twitter_creator":"@CYBI_CYBER","twitter_site":"@CYBI_CYBER","twitter_misc":{"\u00c9crit par":"Fabian OSMOND","Dur\u00e9e de lecture estim\u00e9e":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cybi.fr\/index.php\/2023\/11\/30\/la-souverainete-numerique-en-cybersecurite\/#article","isPartOf":{"@id":"https:\/\/www.cybi.fr\/index.php\/2023\/11\/30\/la-souverainete-numerique-en-cybersecurite\/"},"author":{"name":"Fabian OSMOND","@id":"https:\/\/www.cybi.fr\/#\/schema\/person\/3060713e028a83bbb248dba4763b3947"},"headline":"La souverainet\u00e9 num\u00e9rique en cybers\u00e9curit\u00e9","datePublished":"2023-11-30T12:51:32+00:00","dateModified":"2023-11-30T12:51:33+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cybi.fr\/index.php\/2023\/11\/30\/la-souverainete-numerique-en-cybersecurite\/"},"wordCount":371,"publisher":{"@id":"https:\/\/www.cybi.fr\/#organization"},"articleSection":["Technologies et Cybers\u00e9curit\u00e9"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.cybi.fr\/index.php\/2023\/11\/30\/la-souverainete-numerique-en-cybersecurite\/","url":"https:\/\/www.cybi.fr\/index.php\/2023\/11\/30\/la-souverainete-numerique-en-cybersecurite\/","name":"La souverainet\u00e9 num\u00e9rique en cybers\u00e9curit\u00e9 - Cybi - Solutions innovantes de Cybers\u00e9curit\u00e9 bas\u00e9es sur de l&#039;intelligence artificielle et de l&#039;apprentissage automatique","isPartOf":{"@id":"https:\/\/www.cybi.fr\/#website"},"datePublished":"2023-11-30T12:51:32+00:00","dateModified":"2023-11-30T12:51:33+00:00","description":"Cybi - Solutions innovantes de Cybers\u00e9curit\u00e9 bas\u00e9es sur de l&#039;intelligence artificielle et de l&#039;apprentissage automatique Technologies et Cybers\u00e9curit\u00e9 - cybersecurite cybersecurity scuba chemin attaque Attack Path Management intrusion","breadcrumb":{"@id":"https:\/\/www.cybi.fr\/index.php\/2023\/11\/30\/la-souverainete-numerique-en-cybersecurite\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cybi.fr\/index.php\/2023\/11\/30\/la-souverainete-numerique-en-cybersecurite\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cybi.fr\/index.php\/2023\/11\/30\/la-souverainete-numerique-en-cybersecurite\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.cybi.fr\/"},{"@type":"ListItem","position":2,"name":"La souverainet\u00e9 num\u00e9rique en cybers\u00e9curit\u00e9"}]},{"@type":"WebSite","@id":"https:\/\/www.cybi.fr\/#website","url":"https:\/\/www.cybi.fr\/","name":"Cybi - Solutions innovantes de Cybers\u00e9curit\u00e9 bas\u00e9es sur de l&#039;intelligence artificielle et de l&#039;apprentissage automatique","description":"Cybi - Cybersecurity Intelligence","publisher":{"@id":"https:\/\/www.cybi.fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cybi.fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.cybi.fr\/#organization","name":"Cybi","url":"https:\/\/www.cybi.fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.cybi.fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.cybi.fr\/wp-content\/uploads\/2022\/05\/Standard-2.png","contentUrl":"https:\/\/www.cybi.fr\/wp-content\/uploads\/2022\/05\/Standard-2.png","width":2852,"height":1075,"caption":"Cybi"},"image":{"@id":"https:\/\/www.cybi.fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CYBI_CYBER","https:\/\/www.linkedin.com\/company\/cybi\/"]},{"@type":"Person","@id":"https:\/\/www.cybi.fr\/#\/schema\/person\/3060713e028a83bbb248dba4763b3947","name":"Fabian OSMOND","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/baa57700c10599330d27935edd14942cc7b498f6b563987f42915bb50101cad7?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/baa57700c10599330d27935edd14942cc7b498f6b563987f42915bb50101cad7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/baa57700c10599330d27935edd14942cc7b498f6b563987f42915bb50101cad7?s=96&d=mm&r=g","caption":"Fabian OSMOND"},"url":"https:\/\/www.cybi.fr\/index.php\/author\/fosmond\/"}]}},"jetpack_featured_media_url":"","uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false},"uagb_author_info":{"display_name":"Fabian OSMOND","author_link":"https:\/\/www.cybi.fr\/index.php\/author\/fosmond\/"},"uagb_comment_info":0,"uagb_excerpt":"La souverainet\u00e9 num\u00e9rique est devenue un enjeu strat\u00e9gique majeur en 2023. Face \u00e0 la multiplication des cyberattaques \u00e9manant d\u2019acteurs \u00e9tatiques ou non-\u00e9tatiques, la capacit\u00e9 des \u00c9tats \u00e0 contr\u00f4ler et s\u00e9curiser leurs infrastructures critiques dans le cyberespace conditionne leur souverainet\u00e9. Selon le Clusif, le nombre d\u2019incidents de cybers\u00e9curit\u00e9 a augment\u00e9 de 25% en 2023 par rapport\u2026","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.cybi.fr\/index.php\/wp-json\/wp\/v2\/posts\/518","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybi.fr\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybi.fr\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybi.fr\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybi.fr\/index.php\/wp-json\/wp\/v2\/comments?post=518"}],"version-history":[{"count":2,"href":"https:\/\/www.cybi.fr\/index.php\/wp-json\/wp\/v2\/posts\/518\/revisions"}],"predecessor-version":[{"id":520,"href":"https:\/\/www.cybi.fr\/index.php\/wp-json\/wp\/v2\/posts\/518\/revisions\/520"}],"wp:attachment":[{"href":"https:\/\/www.cybi.fr\/index.php\/wp-json\/wp\/v2\/media?parent=518"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybi.fr\/index.php\/wp-json\/wp\/v2\/categories?post=518"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybi.fr\/index.php\/wp-json\/wp\/v2\/tags?post=518"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}