{"id":1071,"date":"2017-07-03T09:29:40","date_gmt":"2017-07-03T08:29:40","guid":{"rendered":"http:\/\/werle.pro\/?p=1071"},"modified":"2017-07-03T09:29:40","modified_gmt":"2017-07-03T08:29:40","slug":"gestion-des-risques-open-source-ne-veut-pas-dire-conformite","status":"publish","type":"post","link":"https:\/\/werle.pro\/index.php\/2017\/07\/03\/gestion-des-risques-open-source-ne-veut-pas-dire-conformite\/","title":{"rendered":"Gestion des risques : \u00ab\u00a0Open source\u00a0\u00bb ne veut pas dire conformit\u00e9"},"content":{"rendered":"<h2><em>Les <a href=\"http:\/\/www.datasecuritybreach.fr\/?s=risques\" target=\"_blank\" rel=\"noopener\">risques concernant la s\u00e9curit\u00e9<\/a> et la conformit\u00e9 des composants tiers atteignent des proportions incontr\u00f4lables, et menacent l\u2019int\u00e9grit\u00e9 m\u00eame de la cha\u00eene d\u2019approvisionnement de logiciels.\u00a0 Il suffit de voir l\u2019impact de la faille <a href=\"https:\/\/en.wikipedia.org\/wiki\/Heartbleed\">Heartbleed<\/a> pour s\u2019en convaincre\u00a0!<\/em><\/h2>\n<div><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-1072 alignleft\" src=\"https:\/\/i0.wp.com\/werle.pro\/wp-content\/uploads\/2017\/07\/cloud-300x163.jpg?resize=300%2C163\" alt=\"\" width=\"300\" height=\"163\" srcset=\"https:\/\/i0.wp.com\/werle.pro\/wp-content\/uploads\/2017\/07\/cloud.jpg?resize=300%2C163&amp;ssl=1 300w, https:\/\/i0.wp.com\/werle.pro\/wp-content\/uploads\/2017\/07\/cloud.jpg?resize=768%2C417&amp;ssl=1 768w, https:\/\/i0.wp.com\/werle.pro\/wp-content\/uploads\/2017\/07\/cloud.jpg?resize=1024%2C556&amp;ssl=1 1024w, https:\/\/i0.wp.com\/werle.pro\/wp-content\/uploads\/2017\/07\/cloud.jpg?w=1120&amp;ssl=1 1120w\" sizes=\"(max-width: 300px) 100vw, 300px\" data-recalc-dims=\"1\" \/><\/div>\n<div><a href=\"http:\/\/www.datasecuritybreach.fr\/cinq-etapes-gerer-vulnerabilites-licences-logiciels-open-source\/#ixzz4lksIN2x2\">http:\/\/www.datasecuritybreach.fr\/cinq-etapes-gerer-vulnerabilites-licences-logiciels-open-source\/#ixzz4lksIN2x2<\/a><br \/>\nUnder Creative Commons License: <a href=\"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/3.0\">Attribution Non-Commercial No Derivatives<\/a><br \/>\nFollow us: <a href=\"http:\/\/ec.tynt.com\/b\/rw?id=dn9g8cBjmr46reacwqm_6l&amp;u=datasecub\" target=\"_blank\" rel=\"noopener\">@datasecub on Twitter<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Les risques concernant la s\u00e9curit\u00e9 et la conformit\u00e9 des composants tiers atteignent des proportions incontr\u00f4lables, et menacent l\u2019int\u00e9grit\u00e9 m\u00eame de la cha\u00eene d\u2019approvisionnement de logiciels.\u00a0 Il suffit de voir l\u2019impact de la faille Heartbleed pour s\u2019en convaincre\u00a0! http:\/\/www.datasecuritybreach.fr\/cinq-etapes-gerer-vulnerabilites-licences-logiciels-open-source\/#ixzz4lksIN2x2 Under Creative Commons License: Attribution Non-Commercial No Derivatives Follow us: @datasecub on Twitter<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false}}},"categories":[1],"tags":[],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p7ALXt-hh","jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/posts\/1071"}],"collection":[{"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/comments?post=1071"}],"version-history":[{"count":1,"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/posts\/1071\/revisions"}],"predecessor-version":[{"id":1073,"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/posts\/1071\/revisions\/1073"}],"wp:attachment":[{"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/media?parent=1071"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/categories?post=1071"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/tags?post=1071"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}