{"id":22420,"date":"2023-11-20T14:33:52","date_gmt":"2023-11-20T13:33:52","guid":{"rendered":"https:\/\/news.save.ch\/?p=22420"},"modified":"2023-11-20T14:33:52","modified_gmt":"2023-11-20T13:33:52","slug":"defense-in-depth-klingt-gut-aber-ist-es-das-auch","status":null,"type":"post","link":"https:\/\/news.save.ch\/fr\/defense-in-depth-klingt-gut-aber-ist-es-das-auch\/","title":{"rendered":"Defense in depth : \u00e7a sonne bien, mais est-ce vraiment le cas ?"},"content":{"rendered":"<figure id=\"attachment_22421\" aria-describedby=\"caption-attachment-22421\" style=\"width: 680px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-22421\" src=\"https:\/\/news.save.ch\/wp-content\/uploads\/2023\/11\/Depositphotos_486161436_S-680x454.jpg\" alt=\"\" width=\"680\" height=\"454\" srcset=\"https:\/\/news.save.ch\/wp-content\/uploads\/2023\/11\/Depositphotos_486161436_S-680x454.jpg 680w, https:\/\/news.save.ch\/wp-content\/uploads\/2023\/11\/Depositphotos_486161436_S-768x513.jpg 768w, https:\/\/news.save.ch\/wp-content\/uploads\/2023\/11\/Depositphotos_486161436_S-18x12.jpg 18w, https:\/\/news.save.ch\/wp-content\/uploads\/2023\/11\/Depositphotos_486161436_S-375x251.jpg 375w, https:\/\/news.save.ch\/wp-content\/uploads\/2023\/11\/Depositphotos_486161436_S-524x350.jpg 524w, https:\/\/news.save.ch\/wp-content\/uploads\/2023\/11\/Depositphotos_486161436_S.jpg 1000w\" sizes=\"auto, (max-width: 680px) 100vw, 680px\" \/><figcaption id=\"caption-attachment-22421\" class=\"wp-caption-text\">Depositphotos, tataks<\/figcaption><\/figure>\n<p>Sur le papier, la strat\u00e9gie de cybers\u00e9curit\u00e9 Defense in depth semble \u00eatre le meilleur concept de s\u00e9curit\u00e9 : \u00e0 partir de diff\u00e9rents outils et proc\u00e9dures, une protection \u00e9troite est mise en place couche par couche autour de l'infrastructure informatique des entreprises. Cette approche n'est pas nouvelle, mais selon <a href=\"https:\/\/www.ontinue.com\/\" target=\"_blank\" rel=\"noopener\">Ontinue<\/a> en pratique, il est de plus en plus \u00e9vident qu'il n'a pas de sens, car m\u00eame le meilleur pare-feu, le filtre DNS le plus fin, un outil holistique EDR (Endpoint Detection and Response), le Cloud Access Security Broker (CASB) le plus \u00e9labor\u00e9 et d'autres solutions de s\u00e9curit\u00e9 \"Best of Breed\" ne suffisent pas. Le facteur humain joue un r\u00f4le essentiel en mati\u00e8re de cybers\u00e9curit\u00e9, comme l'illustrent les trois exemples suivants d'Ontinue.<\/p>\n<h3>1. le chaos de la configuration est difficilement ma\u00eetrisable<\/h3>\n<p>Dans le contexte de la cybers\u00e9curit\u00e9, \"beaucoup aide beaucoup\" est une \u00e9p\u00e9e \u00e0 double tranchant : de nombreux outils ne sont utiles que s'il existe un personnel qualifi\u00e9 pour les mettre en \u0153uvre, les configurer, les g\u00e9rer et les entretenir. Or, c'est rarement le cas dans les entreprises et m\u00eame si elles disposent d'une \u00e9quipe informatique importante, le nombre d'outils qu'elles utilisent est beaucoup trop \u00e9lev\u00e9. Diff\u00e9rentes \u00e9tudes confirment que les organisations utilisent en moyenne plus de 40 solutions de s\u00e9curit\u00e9. Cette avalanche de logiciels est rarement ma\u00eetrisable par les PME et m\u00eame par les grands groupes.<\/p>\n<p><strong>2. il y a un risque de \"fatigue d'alerte\".<\/strong><\/p>\n<p>Un autre probl\u00e8me d'un tr\u00e8s grand nombre d'outils de s\u00e9curit\u00e9 sont les messages d'alerte et les avertissements permanents : Quiconque surfe sur Internet et utilise un bloqueur de fen\u00eatres pop-up conna\u00eet les nombreux messages d'avertissement, le scanner de virus typique pour le syst\u00e8me d'exploitation clignote lui aussi quasiment en permanence - et ce sont des outils pour un seul utilisateur. Si l'on prend en compte le nombre de collaborateurs d'une entreprise et la multitude d'outils suppl\u00e9mentaires utilis\u00e9s par les utilisateurs finaux et les \u00e9quipes de s\u00e9curit\u00e9, le nombre de messages d'avertissement atteint rapidement un niveau ing\u00e9rable. Ce qui s'ensuit est ce que l'on appelle la \"fatigue des alertes\". Elle fait en sorte que les \u00e9quipes informatiques n'arrivent plus gu\u00e8re \u00e0 distinguer les alertes critiques des alertes non critiques et que des lacunes apparaissent dans la d\u00e9fense contre les pirates.<\/p>\n<h3>3. m\u00eame dans les meilleures conditions, les \u00e9quipes de s\u00e9curit\u00e9 sont surcharg\u00e9es<\/h3>\n<p>M\u00eame si l'\u00e9quipe informatique a parfaitement configur\u00e9 le vaste ensemble d'outils et les param\u00e8tres de notification, elle n'est pas encore au bout de ses peines. La situation des menaces s'aggrave d'ann\u00e9e en ann\u00e9e : la simple masse des cyberattaques augmente et l'IA g\u00e9n\u00e9rative \u00e9largit encore les possibilit\u00e9s technologiques pour les pirates. Par cons\u00e9quent, les \u00e9quipes de s\u00e9curit\u00e9 doivent lutter de mani\u00e8re beaucoup plus approfondie et intensive contre le flot d'attaques - l'adoption de mesures pr\u00e9ventives et la mise en \u0153uvre de la Threat Intelligence, si importantes, sont alors souvent n\u00e9glig\u00e9es.<\/p>\n<h3>Conclusion<\/h3>\n<p>\"Les entreprises doivent comprendre que plus d'outils ne signifie pas n\u00e9cessairement plus de s\u00e9curit\u00e9\", pr\u00e9vient Jochen Koehler, VP EMEA Sales chez Ontinue. \"Aussi s\u00fbre que puisse para\u00eetre la Defense in depth en th\u00e9orie, sans un investissement massif en personnel, tr\u00e8s peu d'entreprises peuvent mettre en pratique cette approche et surtout la r\u00e9ussir. Elles devraient donc bien r\u00e9fl\u00e9chir s'il n'est pas plus judicieux d'investir leur budget d\u00e9j\u00e0 souvent serr\u00e9 dans une externalisation qui leur offre la plus haute protection ainsi que la plus grande r\u00e9silience possible avec un minimum de frais de personnel et d'acquisition de logiciels\".<\/p>","protected":false},"excerpt":{"rendered":"<p>Auf dem Papier sieht die Cybersecurity-Strategie Defense in depth so gut aus wie kaum ein anderes Sicherheitskonzept: Aus unterschiedlichen Tools und Verfahren setzt sich Schicht um Schicht ein engmaschiger Schutz rund um die IT-Infrastruktur von Unternehmen zusammen. Neu ist dieser Ansatz nicht, allerdings zeigt sich laut Ontinue in der Praxis immer mehr, dass er nicht [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":22421,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pgc_sgb_lightbox_settings":"","footnotes":""},"categories":[3313],"tags":[1134],"class_list":["post-22420","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-digitalisierung","tag-cybersecurity"],"acf":[],"hkrextid":null,"publication":null,"issue":null,"workflow":null,"startPage":null,"spitzmarke":null,"_posts_by_tag_page_fields":null,"_at_widget":null,"_yoast_wpseo_primary_category":"3313","_yoast_wpseo_focuskw_text_input":null,"_yoast_wpseo_opengraph-image":null,"_yoast_wpseo_opengraph-description":null,"_yoast_wpseo_opengraph-title":null,"enclosure":null,"_yoast_wpseo_twitter-title":null,"_yoast_wpseo_twitter-description":null,"_yoast_wpseo_twitter-image":null,"_wp_old_slug":null,"_yoast_wpseo_title":null,"_yoast_wpseo_canonical":null,"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Defense in depth: Klingt gut, aber ist es das auch? - Save<\/title>\n<meta name=\"description\" content=\"Wie viele Cybersecurity-Tools Unternehmen im Einsatz haben, ist f\u00fcr hohe Sicherheit nicht entscheidend \u2013 klingt komisch, ist aber so.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/news.save.ch\/fr\/defense-in-depth-klingt-gut-aber-ist-es-das-auch\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Defense in depth: Klingt gut, aber ist es das auch? - Save\" \/>\n<meta property=\"og:description\" content=\"Wie viele Cybersecurity-Tools Unternehmen im Einsatz haben, ist f\u00fcr hohe Sicherheit nicht entscheidend \u2013 klingt komisch, ist aber so.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/news.save.ch\/fr\/defense-in-depth-klingt-gut-aber-ist-es-das-auch\/\" \/>\n<meta property=\"og:site_name\" content=\"Save\" \/>\n<meta property=\"article:published_time\" content=\"2023-11-20T13:33:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/news.save.ch\/wp-content\/uploads\/2023\/11\/Depositphotos_486161436_S.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"668\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Roger Str\u00e4ssle\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Roger Str\u00e4ssle\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/defense-in-depth-klingt-gut-aber-ist-es-das-auch\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/defense-in-depth-klingt-gut-aber-ist-es-das-auch\\\/\"},\"author\":{\"name\":\"Roger Str\u00e4ssle\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/person\\\/d5022db048e0e2b9785c50e5b24da5aa\"},\"headline\":\"Defense in depth: Klingt gut, aber ist es das auch?\",\"datePublished\":\"2023-11-20T13:33:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/defense-in-depth-klingt-gut-aber-ist-es-das-auch\\\/\"},\"wordCount\":518,\"publisher\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/defense-in-depth-klingt-gut-aber-ist-es-das-auch\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/Depositphotos_486161436_S.jpg\",\"keywords\":[\"Cybersecurity\"],\"articleSection\":[\"DIGITALISIERUNG\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/defense-in-depth-klingt-gut-aber-ist-es-das-auch\\\/\",\"url\":\"https:\\\/\\\/news.save.ch\\\/defense-in-depth-klingt-gut-aber-ist-es-das-auch\\\/\",\"name\":\"Defense in depth: Klingt gut, aber ist es das auch? - Save\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/defense-in-depth-klingt-gut-aber-ist-es-das-auch\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/defense-in-depth-klingt-gut-aber-ist-es-das-auch\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/Depositphotos_486161436_S.jpg\",\"datePublished\":\"2023-11-20T13:33:52+00:00\",\"description\":\"Wie viele Cybersecurity-Tools Unternehmen im Einsatz haben, ist f\u00fcr hohe Sicherheit nicht entscheidend \u2013 klingt komisch, ist aber so.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/defense-in-depth-klingt-gut-aber-ist-es-das-auch\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/news.save.ch\\\/defense-in-depth-klingt-gut-aber-ist-es-das-auch\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/defense-in-depth-klingt-gut-aber-ist-es-das-auch\\\/#primaryimage\",\"url\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/Depositphotos_486161436_S.jpg\",\"contentUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/Depositphotos_486161436_S.jpg\",\"width\":1000,\"height\":668,\"caption\":\"Depositphotos, tataks\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/defense-in-depth-klingt-gut-aber-ist-es-das-auch\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Defense in depth: Klingt gut, aber ist es das auch?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\",\"name\":\"Save\",\"description\":\"Schweizer Fachzeitschrift f\u00fcr Sicherheit\",\"publisher\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/news.save.ch\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\",\"name\":\"Sicherheitsforum\",\"url\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Logo_SF_2012.png\",\"contentUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Logo_SF_2012.png\",\"width\":1100,\"height\":91,\"caption\":\"Sicherheitsforum\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/person\\\/d5022db048e0e2b9785c50e5b24da5aa\",\"name\":\"Roger Str\u00e4ssle\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g\",\"caption\":\"Roger Str\u00e4ssle\"},\"url\":\"https:\\\/\\\/news.save.ch\\\/fr\\\/author\\\/roger-straessle\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Defense in depth : \u00e7a sonne bien, mais est-ce vraiment le cas ? - Sauvegarder","description":"Le nombre d'outils de cybers\u00e9curit\u00e9 utilis\u00e9s par les entreprises n'est pas d\u00e9terminant pour un niveau de s\u00e9curit\u00e9 \u00e9lev\u00e9 - cela peut para\u00eetre \u00e9trange, mais c'est pourtant le cas.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/news.save.ch\/fr\/defense-in-depth-klingt-gut-aber-ist-es-das-auch\/","og_locale":"fr_FR","og_type":"article","og_title":"Defense in depth: Klingt gut, aber ist es das auch? - Save","og_description":"Wie viele Cybersecurity-Tools Unternehmen im Einsatz haben, ist f\u00fcr hohe Sicherheit nicht entscheidend \u2013 klingt komisch, ist aber so.","og_url":"https:\/\/news.save.ch\/fr\/defense-in-depth-klingt-gut-aber-ist-es-das-auch\/","og_site_name":"Save","article_published_time":"2023-11-20T13:33:52+00:00","og_image":[{"width":1000,"height":668,"url":"https:\/\/news.save.ch\/wp-content\/uploads\/2023\/11\/Depositphotos_486161436_S.jpg","type":"image\/jpeg"}],"author":"Roger Str\u00e4ssle","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Roger Str\u00e4ssle","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/news.save.ch\/defense-in-depth-klingt-gut-aber-ist-es-das-auch\/#article","isPartOf":{"@id":"https:\/\/news.save.ch\/defense-in-depth-klingt-gut-aber-ist-es-das-auch\/"},"author":{"name":"Roger Str\u00e4ssle","@id":"https:\/\/news.save.ch\/de\/#\/schema\/person\/d5022db048e0e2b9785c50e5b24da5aa"},"headline":"Defense in depth: Klingt gut, aber ist es das auch?","datePublished":"2023-11-20T13:33:52+00:00","mainEntityOfPage":{"@id":"https:\/\/news.save.ch\/defense-in-depth-klingt-gut-aber-ist-es-das-auch\/"},"wordCount":518,"publisher":{"@id":"https:\/\/news.save.ch\/de\/#organization"},"image":{"@id":"https:\/\/news.save.ch\/defense-in-depth-klingt-gut-aber-ist-es-das-auch\/#primaryimage"},"thumbnailUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2023\/11\/Depositphotos_486161436_S.jpg","keywords":["Cybersecurity"],"articleSection":["DIGITALISIERUNG"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/news.save.ch\/defense-in-depth-klingt-gut-aber-ist-es-das-auch\/","url":"https:\/\/news.save.ch\/defense-in-depth-klingt-gut-aber-ist-es-das-auch\/","name":"Defense in depth : \u00e7a sonne bien, mais est-ce vraiment le cas ? - Sauvegarder","isPartOf":{"@id":"https:\/\/news.save.ch\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/news.save.ch\/defense-in-depth-klingt-gut-aber-ist-es-das-auch\/#primaryimage"},"image":{"@id":"https:\/\/news.save.ch\/defense-in-depth-klingt-gut-aber-ist-es-das-auch\/#primaryimage"},"thumbnailUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2023\/11\/Depositphotos_486161436_S.jpg","datePublished":"2023-11-20T13:33:52+00:00","description":"Le nombre d'outils de cybers\u00e9curit\u00e9 utilis\u00e9s par les entreprises n'est pas d\u00e9terminant pour un niveau de s\u00e9curit\u00e9 \u00e9lev\u00e9 - cela peut para\u00eetre \u00e9trange, mais c'est pourtant le cas.","breadcrumb":{"@id":"https:\/\/news.save.ch\/defense-in-depth-klingt-gut-aber-ist-es-das-auch\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/news.save.ch\/defense-in-depth-klingt-gut-aber-ist-es-das-auch\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/news.save.ch\/defense-in-depth-klingt-gut-aber-ist-es-das-auch\/#primaryimage","url":"https:\/\/news.save.ch\/wp-content\/uploads\/2023\/11\/Depositphotos_486161436_S.jpg","contentUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2023\/11\/Depositphotos_486161436_S.jpg","width":1000,"height":668,"caption":"Depositphotos, tataks"},{"@type":"BreadcrumbList","@id":"https:\/\/news.save.ch\/defense-in-depth-klingt-gut-aber-ist-es-das-auch\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/news.save.ch\/de\/"},{"@type":"ListItem","position":2,"name":"Defense in depth: Klingt gut, aber ist es das auch?"}]},{"@type":"WebSite","@id":"https:\/\/news.save.ch\/de\/#website","url":"https:\/\/news.save.ch\/de\/","name":"Save","description":"Revue suisse sp\u00e9cialis\u00e9e dans la s\u00e9curit\u00e9","publisher":{"@id":"https:\/\/news.save.ch\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/news.save.ch\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/news.save.ch\/de\/#organization","name":"Forum sur la s\u00e9curit\u00e9","url":"https:\/\/news.save.ch\/de\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/news.save.ch\/de\/#\/schema\/logo\/image\/","url":"https:\/\/news.save.ch\/wp-content\/uploads\/2022\/06\/Logo_SF_2012.png","contentUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2022\/06\/Logo_SF_2012.png","width":1100,"height":91,"caption":"Sicherheitsforum"},"image":{"@id":"https:\/\/news.save.ch\/de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/news.save.ch\/de\/#\/schema\/person\/d5022db048e0e2b9785c50e5b24da5aa","name":"Roger Str\u00e4ssle","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g","caption":"Roger Str\u00e4ssle"},"url":"https:\/\/news.save.ch\/fr\/author\/roger-straessle\/"}]}},"_links":{"self":[{"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/posts\/22420","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/comments?post=22420"}],"version-history":[{"count":1,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/posts\/22420\/revisions"}],"predecessor-version":[{"id":22422,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/posts\/22420\/revisions\/22422"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/media\/22421"}],"wp:attachment":[{"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/media?parent=22420"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/categories?post=22420"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/tags?post=22420"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}