{"id":45,"date":"2016-01-17T21:33:30","date_gmt":"2016-01-17T20:33:30","guid":{"rendered":"http:\/\/werle.pro\/?page_id=45"},"modified":"2017-01-02T17:02:41","modified_gmt":"2017-01-02T16:02:41","slug":"panorama-et-bilan","status":"publish","type":"page","link":"https:\/\/werle.pro\/index.php\/panorama-et-bilan\/","title":{"rendered":"Reports &#038; Blogs"},"content":{"rendered":"<h2><strong>Les bilans annuels, analyses et pronostics publi\u00e9s par les diff\u00e9rents acteurs de la s\u00e9curit\u00e9<\/strong><\/h2>\n<h4>Verizon<\/h4>\n<ul>\n<li>http:\/\/www.verizonenterprise.com\/verizon-insights-lab\/dbir\/<\/li>\n<\/ul>\n<h4>TrendMicro<\/h4>\n<ul>\n<li>http:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/<\/li>\n<\/ul>\n<h4>Sophos<\/h4>\n<ul>\n<li><a href=\"http:\/\/www.sophosfranceblog.fr\/\">Le blog de Sophos<\/a><\/li>\n<\/ul>\n<h4>IBM<\/h4>\n<ul>\n<li>http:\/\/www-03.ibm.com\/security\/ciso\/<\/li>\n<\/ul>\n<h4>Palo Alto<\/h4>\n<ul>\n<li>http:\/\/researchcenter.paloaltonetworks.com\/<\/li>\n<li>http:\/\/researchcenter.paloaltonetworks.com\/unit42\/<\/li>\n<\/ul>\n<h4>Dark Trace<\/h4>\n<ul>\n<li>https:\/\/www.darktrace.com\/blog\/<\/li>\n<\/ul>\n<h4>Qualys<\/h4>\n<ul>\n<li>https:\/\/blog.qualys.com\/<\/li>\n<\/ul>\n<h4>Malware Breakdown<\/h4>\n<ul>\n<li>https:\/\/malwarebreakdown.com\/<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h2>Quelques uns de l&rsquo;Etat<\/h2>\n<h4>Observatoire de la R\u00e9silience de l&rsquo;Internet Fran\u00e7ais<\/h4>\n<ul>\n<li>Tous les rapports dont les derniers au format pdf et epub<\/li>\n<li>http:\/\/www.ssi.gouv.fr\/agence\/rayonnement-scientifique\/lobservatoire-de-la-resilience-de-linternet-francais\/le-rapport-de-lobservatoire-de-la-resilience-de-linternet-francais\/<\/li>\n<\/ul>\n<h4>Etatique<\/h4>\n<ul>\n<li>Le <a href=\"http:\/\/werle.pro\/wp-content\/Documents\/SupCIL\/cnil-36e_rapport_annuel_2015.pdf\" target=\"_blank\">rapport d&rsquo;activit\u00e9 2015<\/a> de la CNIL \u00e9voque \u00ab\u00a0la protection des donn\u00e9es personnelles au c\u0153ur de la cybers\u00e9curit\u00e9\u00a0\u00bb<\/li>\n<li><a href=\"https:\/\/www.enisa.europa.eu\/activities\/risk-management\/evolving-threat-environment\/\" target=\"_blank\">European union Agency for Network and Information Security &#8211; <em>ENISA<\/em><\/a>\n<ul>\n<li><a href=\"http:\/\/werle.pro\/wp-content\/Documents\/ENISA\/\" target=\"_blank\">Rapports annuels sur le paysage des menaces<\/a> &#8211; <em>ENISA Threat Lanscape &#8211; ETL<\/em><\/li>\n<li><a href=\"http:\/\/werle.pro\/wp-content\/Documents\/ENISA\/\" target=\"_blank\">Rapports sur des menaces sp\u00e9cifiques<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h2>Publications des Editeurs<\/h2>\n<h4>Editeurs<\/h4>\n<ul>\n<li><a href=\"http:\/\/www.kaspersky.com\/news\" target=\"_blank\">Kaspersky<\/a> &#8211; toutes les publications<\/li>\n<li><a href=\"http:\/\/www.symantec.com\/fr\/fr\/security_response\/publications\/threatreport.jsp\" target=\"_blank\">Symantec<\/a> &#8211; toutes les publications traitant de la menace\n<ul>\n<li><a href=\"http:\/\/www.symantec.com\/fr\/fr\/about\/news\/release\/\" target=\"_blank\">Actualit\u00e9s<\/a><\/li>\n<li>R\u00e9ponses de s\u00e9curit\u00e9 &#8211; <a href=\"http:\/\/www.symantec.com\/fr\/fr\/about\/news\/release\/\" target=\"_blank\">liste des risques, menaces, vuln\u00e9rabilit\u00e9s<\/a><\/li>\n<li><a href=\"http:\/\/www.symantec.com\/connect\/blogs\" target=\"_blank\">Les blogs th\u00e9matiques<\/a><\/li>\n<li><a href=\"https:\/\/www.symantec.com\/services\/cyber-security-services\" target=\"_blank\">Les services de cybers\u00e9curit\u00e9<\/a><\/li>\n<li><a href=\"https:\/\/www.symantec.com\/security_response\/removaltools.jsp\" target=\"_blank\">Outils de suppression et nettoyage<\/a><\/li>\n<\/ul>\n<\/li>\n<li><a href=\"http:\/\/www.mcafee.com\/fr\/apps\/view-all\/publications.aspx?eFilter=true\" target=\"_blank\">McAfee<\/a> &#8211; toutes les publications et rapports annuels en fran\u00e7ais<\/li>\n<li><a href=\"https:\/\/www.fireeye.com\/current-threats\/annual-threat-report.html\" target=\"_blank\">FireEye<\/a> &#8211; toutes les publications de Mandiant<\/li>\n<li><a href=\"https:\/\/technet.microsoft.com\/fr-fr\/library\/security\/dn631938.aspx\" target=\"_blank\">Microsoft<\/a> &#8211; Synth\u00e8ses des bulletins de s\u00e9curit\u00e9 &amp; archives<\/li>\n<\/ul>\n<h4>Articles<\/h4>\n<ul>\n<li>Information is Beautiful &#8211; <a href=\"http:\/\/www.informationisbeautiful.net\/visualizations\/worlds-biggest-data-breaches-hacks\" target=\"_blank\">World&rsquo;s biggest data breaches<\/a><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Les bilans annuels, analyses et pronostics publi\u00e9s par les diff\u00e9rents acteurs de la s\u00e9curit\u00e9 Verizon http:\/\/www.verizonenterprise.com\/verizon-insights-lab\/dbir\/ TrendMicro http:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/ Sophos Le blog de Sophos IBM http:\/\/www-03.ibm.com\/security\/ciso\/ Palo Alto http:\/\/researchcenter.paloaltonetworks.com\/ http:\/\/researchcenter.paloaltonetworks.com\/unit42\/ Dark Trace https:\/\/www.darktrace.com\/blog\/ Qualys https:\/\/blog.qualys.com\/ Malware Breakdown https:\/\/malwarebreakdown.com\/ &nbsp; Quelques uns de l&rsquo;Etat Observatoire de la R\u00e9silience de l&rsquo;Internet Fran\u00e7ais Tous les rapports dont les derniers &#8230; <a title=\"Reports &#038; Blogs\" class=\"read-more\" href=\"https:\/\/werle.pro\/index.php\/panorama-et-bilan\/\" aria-label=\"Read more about Reports &#038; Blogs\">Lire la suite<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"jetpack_post_was_ever_published":false,"footnotes":""},"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/P7ALXt-J","jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/pages\/45"}],"collection":[{"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/comments?post=45"}],"version-history":[{"count":24,"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/pages\/45\/revisions"}],"predecessor-version":[{"id":971,"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/pages\/45\/revisions\/971"}],"wp:attachment":[{"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/media?parent=45"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}