{"id":334,"date":"2019-05-17T20:30:32","date_gmt":"2019-05-17T20:30:32","guid":{"rendered":"http:\/\/mobile2011.org\/40-des-entreprises-ne-securisent-pas-les-applications-mobiles-quelles-developpent\/"},"modified":"2023-05-30T17:39:37","modified_gmt":"2023-05-30T17:39:37","slug":"40-des-entreprises-ne-securisent-pas-les-applications-mobiles-quelles-developpent","status":"publish","type":"post","link":"https:\/\/mobile2011.org\/fr\/40-des-entreprises-ne-securisent-pas-les-applications-mobiles-quelles-developpent\/","title":{"rendered":"40% des entreprises ne s\u00e9curisent pas les applications mobiles qu&rsquo;elles d\u00e9veloppent ;"},"content":{"rendered":"<div class=\"pbs-main-wrapper\"><p><\/p>\n<figure class=\"wp-block-image alignwide size-full has-custom-border\"><img loading=\"lazy\" decoding=\"async\" width=\"638\" height=\"300\" src=\"http:\/\/mobile2011.org\/wp-content\/uploads\/2019\/05\/infographic-the-state-of-mobile-insecurity-1-638-638x300-1.jpg\" alt=\"\" class=\"has-border-color has-cyan-bluish-gray-border-color wp-image-211\" style=\"border-width:3px;border-radius:4px\" srcset=\"https:\/\/mobile2011.org\/wp-content\/uploads\/2019\/05\/infographic-the-state-of-mobile-insecurity-1-638-638x300-1.jpg 638w, https:\/\/mobile2011.org\/wp-content\/uploads\/2019\/05\/infographic-the-state-of-mobile-insecurity-1-638-638x300-1-300x141.jpg 300w\" sizes=\"auto, (max-width: 638px) 100vw, 638px\" \/><\/figure>\n<p><\/p>\n<p>Une \u00e9tude <a xlink=\"href\" href=\"https:\/\/securityintelligence.com\/media\/ponemon-institute-study-mobile-application-insecurity\/\">par IBM et le Ponemon Institute<\/a> remet en question la s\u00e9curit\u00e9 des applications mobiles et qualifie l&rsquo;\u00e9tat actuel de \u00ab\u00a0tr\u00e8s inqui\u00e9tant\u00a0\u00bb. L&rsquo;\u00e9tude r\u00e9v\u00e8le que pr\u00e8s de 40 % des grandes entreprises ne prennent pas les pr\u00e9cautions n\u00e9cessaires pour s\u00e9curiser les applications mobiles qu&rsquo;elles con\u00e7oivent pour leurs clients et ne prot\u00e8gent pas suffisamment leurs appareils mobiles BYOD contre les cyberattaques, permettant ainsi aux pirates d&rsquo;acc\u00e9der aux donn\u00e9es des utilisateurs, de l&rsquo;entreprise et des clients.<br \/>Une \u00e9tude du Ponemon Institute sponsoris\u00e9e par IBM en mars 2015 r\u00e9v\u00e8le l&rsquo;\u00e9tat alarmant de la s\u00e9curit\u00e9 mobile pour les applications. Chaque ann\u00e9e, une entreprise d\u00e9pense en moyenne 34 millions de dollars pour d\u00e9velopper de nouvelles applications mobiles.<br \/>Dans la course \u00e0 la cr\u00e9ation d&rsquo;applications toujours plus nombreuses, les soci\u00e9t\u00e9s de d\u00e9veloppement d&rsquo;applications misent trop souvent sur l&rsquo;exp\u00e9rience de l&rsquo;utilisateur final et oublient deux points cruciaux : sa s\u00e9curit\u00e9 et la protection de sa vie priv\u00e9e.<\/p>\n<p><\/p>\n<p>Les r\u00e9sultats de l&rsquo;\u00e9tude montrent que pr\u00e8s de 40 % des grandes entreprises ne prennent pas les pr\u00e9cautions n\u00e9cessaires pour s\u00e9curiser les applications mobiles qu&rsquo;elles con\u00e7oivent pour leurs clients. Un grand nombre de ces entreprises font partie du classement Fortune 500 et op\u00e8rent dans des secteurs qui utilisent des donn\u00e9es tr\u00e8s sensibles, tels que les services financiers, les soins de sant\u00e9 et l&rsquo;industrie pharmaceutique, le secteur public, le divertissement et la distribution.<\/p>\n<p><\/p>\n<p>Sur le budget de 34 millions de dollars consacr\u00e9 \u00e0 la cr\u00e9ation d&rsquo;applications, seuls 5,5 % sont utilis\u00e9s pour s\u00e9curiser les applications contre les cyberattaques avant qu&rsquo;elles ne soient diffus\u00e9es. 33% de ces entreprises ne testent jamais leurs applications, et seulement 15% d&rsquo;entre elles testent leurs applications aussi souvent que n\u00e9cessaire. Et 50 % de ces entreprises ne consacrent aucun budget \u00e0 la s\u00e9curit\u00e9 mobile.<br \/>Parmi les raisons invoqu\u00e9es, 77 % ont cit\u00e9 l&rsquo;urgence de la livraison de la demande comme la principale raison de l&rsquo;ins\u00e9curit\u00e9 :<\/p>\n<p><\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p><\/p>\n<p>\u00ab\u00a0La s\u00e9curit\u00e9 des applications mobiles n&rsquo;est pas une priorit\u00e9 pour les entreprises, ce qui permet aux pirates de comprendre comment les applications sont d\u00e9velopp\u00e9es, de d\u00e9verrouiller les appareils mobiles et d&rsquo;acc\u00e9der \u00e0 des donn\u00e9es confidentielles\u00a0\u00bb, d\u00e9clare Caleb Barlow, vice-pr\u00e9sident de la gestion et de la s\u00e9curit\u00e9 des applications mobiles chez IBM.<\/p>\n<p><\/p><\/blockquote>\n<p><\/p>\n<p>Cependant, le nombre de cyber-attaques mobiles ne cesse d&rsquo;augmenter et cette ins\u00e9curit\u00e9 mobile offre de nombreux points d&rsquo;entr\u00e9e pour acc\u00e9der aux donn\u00e9es de l&rsquo;entreprise par le biais d&rsquo;appareils non s\u00e9curis\u00e9s. Un code malveillant peut infecter plus de 11,6 millions d&rsquo;appareils mobiles.<\/p>\n<p><\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p><\/p>\n<p>\u00ab\u00a0Les entreprises doivent envisager la s\u00e9curit\u00e9 de la m\u00eame mani\u00e8re que les cybercriminels tr\u00e8s efficaces qui travaillent en collaboration pour concevoir des attaques. Caleb Barlow, IBM.<\/p>\n<p><\/p><\/blockquote>\n<p><\/p>\n<p>Enfin, l&rsquo;\u00e9tude r\u00e9v\u00e8le que les entreprises ne prot\u00e8gent pas leurs appareils mobiles BYOD (Bring Your Own Device) contre les cyberattaques. Les pirates profitent d\u00e9sormais des applications mobiles non s\u00e9curis\u00e9es les plus connues, des r\u00e9seaux WiFi publics et autres pour s&#8217;emparer de donn\u00e9es cruciales souvent h\u00e9berg\u00e9es sur des appareils mobiles BYOD ou des appareils d&rsquo;entreprise. Ils peuvent \u00e9galement utiliser les appareils mobiles comme une passerelle vers l&rsquo;entreprise et son r\u00e9seau interne hautement confidentiel.<\/p>\n<p><\/p>\n<p>Selon le rapport IBM X-Force, rien qu&rsquo;en 2017, plus d&rsquo;un milliard de donn\u00e9es personnelles identifiables (PII) ont \u00e9t\u00e9 compromises \u00e0 la suite de cyberattaques.<\/p>\n<p><\/p>\n<figure class=\"wp-block-image alignwide size-large has-custom-border\"><img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"1024\" src=\"http:\/\/mobile2011.org\/wp-content\/uploads\/2019\/05\/infographic-the-state-of-mobile-insecurity-1-638-512x1024.jpg\" alt=\"\" class=\"has-border-color has-cyan-bluish-gray-border-color wp-image-215\" style=\"border-width:3px;border-radius:4px\" srcset=\"https:\/\/mobile2011.org\/wp-content\/uploads\/2019\/05\/infographic-the-state-of-mobile-insecurity-1-638-512x1024.jpg 512w, https:\/\/mobile2011.org\/wp-content\/uploads\/2019\/05\/infographic-the-state-of-mobile-insecurity-1-638-150x300.jpg 150w, https:\/\/mobile2011.org\/wp-content\/uploads\/2019\/05\/infographic-the-state-of-mobile-insecurity-1-638.jpg 638w\" sizes=\"auto, (max-width: 512px) 100vw, 512px\" \/><\/figure>\n<p><\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Une \u00e9tude par IBM et le Ponemon Institute remet en question la s\u00e9curit\u00e9 des applications mobiles et qualifie l&rsquo;\u00e9tat actuel de \u00ab\u00a0tr\u00e8s inqui\u00e9tant\u00a0\u00bb. L&rsquo;\u00e9tude r\u00e9v\u00e8le que pr\u00e8s de 40 % des grandes entreprises ne prennent pas les pr\u00e9cautions n\u00e9cessaires pour s\u00e9curiser les applications mobiles qu&rsquo;elles con\u00e7oivent pour leurs clients et ne prot\u00e8gent pas suffisamment leurs [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":335,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[36],"tags":[],"class_list":["post-334","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-securite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>40% des entreprises ne s\u00e9curisent pas les applications mobiles qu&#039;elles d\u00e9veloppent ; -<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/mobile2011.org\/fr\/40-des-entreprises-ne-securisent-pas-les-applications-mobiles-quelles-developpent\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"40% des entreprises ne s\u00e9curisent pas les applications mobiles qu&#039;elles d\u00e9veloppent ; -\" \/>\n<meta property=\"og:description\" content=\"Une \u00e9tude par IBM et le Ponemon Institute remet en question la s\u00e9curit\u00e9 des applications mobiles et qualifie l&rsquo;\u00e9tat actuel de \u00ab\u00a0tr\u00e8s inqui\u00e9tant\u00a0\u00bb. L&rsquo;\u00e9tude r\u00e9v\u00e8le que pr\u00e8s de 40 % des grandes entreprises ne prennent pas les pr\u00e9cautions n\u00e9cessaires pour s\u00e9curiser les applications mobiles qu&rsquo;elles con\u00e7oivent pour leurs clients et ne prot\u00e8gent pas suffisamment leurs [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/mobile2011.org\/fr\/40-des-entreprises-ne-securisent-pas-les-applications-mobiles-quelles-developpent\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-05-17T20:30:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-30T17:39:37+00:00\" \/>\n<meta name=\"author\" content=\"Aaron Griffin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Aaron Griffin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/mobile2011.org\\\/fr\\\/40-des-entreprises-ne-securisent-pas-les-applications-mobiles-quelles-developpent\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/mobile2011.org\\\/fr\\\/40-des-entreprises-ne-securisent-pas-les-applications-mobiles-quelles-developpent\\\/\"},\"author\":{\"name\":\"Aaron Griffin\",\"@id\":\"https:\\\/\\\/mobile2011.org\\\/fr\\\/#\\\/schema\\\/person\\\/63543c148a95a42b9c5816991d270bb0\"},\"headline\":\"40% des entreprises ne s\u00e9curisent pas les applications mobiles qu&rsquo;elles d\u00e9veloppent ;\",\"datePublished\":\"2019-05-17T20:30:32+00:00\",\"dateModified\":\"2023-05-30T17:39:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/mobile2011.org\\\/fr\\\/40-des-entreprises-ne-securisent-pas-les-applications-mobiles-quelles-developpent\\\/\"},\"wordCount\":618,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/mobile2011.org\\\/fr\\\/40-des-entreprises-ne-securisent-pas-les-applications-mobiles-quelles-developpent\\\/#primaryimage\"},\"thumbnailUrl\":\"\",\"articleSection\":[\"s\u00e9curit\u00e9\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/mobile2011.org\\\/fr\\\/40-des-entreprises-ne-securisent-pas-les-applications-mobiles-quelles-developpent\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/mobile2011.org\\\/fr\\\/40-des-entreprises-ne-securisent-pas-les-applications-mobiles-quelles-developpent\\\/\",\"url\":\"https:\\\/\\\/mobile2011.org\\\/fr\\\/40-des-entreprises-ne-securisent-pas-les-applications-mobiles-quelles-developpent\\\/\",\"name\":\"40% des entreprises ne s\u00e9curisent pas les applications mobiles qu'elles d\u00e9veloppent ; -\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/mobile2011.org\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/mobile2011.org\\\/fr\\\/40-des-entreprises-ne-securisent-pas-les-applications-mobiles-quelles-developpent\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/mobile2011.org\\\/fr\\\/40-des-entreprises-ne-securisent-pas-les-applications-mobiles-quelles-developpent\\\/#primaryimage\"},\"thumbnailUrl\":\"\",\"datePublished\":\"2019-05-17T20:30:32+00:00\",\"dateModified\":\"2023-05-30T17:39:37+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/mobile2011.org\\\/fr\\\/#\\\/schema\\\/person\\\/63543c148a95a42b9c5816991d270bb0\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/mobile2011.org\\\/fr\\\/40-des-entreprises-ne-securisent-pas-les-applications-mobiles-quelles-developpent\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/mobile2011.org\\\/fr\\\/40-des-entreprises-ne-securisent-pas-les-applications-mobiles-quelles-developpent\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/mobile2011.org\\\/fr\\\/40-des-entreprises-ne-securisent-pas-les-applications-mobiles-quelles-developpent\\\/#primaryimage\",\"url\":\"\",\"contentUrl\":\"\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/mobile2011.org\\\/fr\\\/40-des-entreprises-ne-securisent-pas-les-applications-mobiles-quelles-developpent\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/mobile2011.org\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"40% des entreprises ne s\u00e9curisent pas les applications mobiles qu&rsquo;elles d\u00e9veloppent ;\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/mobile2011.org\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/mobile2011.org\\\/fr\\\/\",\"name\":\"\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/mobile2011.org\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/mobile2011.org\\\/fr\\\/#\\\/schema\\\/person\\\/63543c148a95a42b9c5816991d270bb0\",\"name\":\"Aaron Griffin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/aaa459ace34ad5fd34d8a0a6de67d7cafbab5d55f575dc9cb0cbdbd623ec855b?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/aaa459ace34ad5fd34d8a0a6de67d7cafbab5d55f575dc9cb0cbdbd623ec855b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/aaa459ace34ad5fd34d8a0a6de67d7cafbab5d55f575dc9cb0cbdbd623ec855b?s=96&d=mm&r=g\",\"caption\":\"Aaron Griffin\"},\"url\":\"https:\\\/\\\/mobile2011.org\\\/fr\\\/author\\\/aarongriffin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"40% des entreprises ne s\u00e9curisent pas les applications mobiles qu'elles d\u00e9veloppent ; -","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/mobile2011.org\/fr\/40-des-entreprises-ne-securisent-pas-les-applications-mobiles-quelles-developpent\/","og_locale":"fr_FR","og_type":"article","og_title":"40% des entreprises ne s\u00e9curisent pas les applications mobiles qu'elles d\u00e9veloppent ; -","og_description":"Une \u00e9tude par IBM et le Ponemon Institute remet en question la s\u00e9curit\u00e9 des applications mobiles et qualifie l&rsquo;\u00e9tat actuel de \u00ab\u00a0tr\u00e8s inqui\u00e9tant\u00a0\u00bb. L&rsquo;\u00e9tude r\u00e9v\u00e8le que pr\u00e8s de 40 % des grandes entreprises ne prennent pas les pr\u00e9cautions n\u00e9cessaires pour s\u00e9curiser les applications mobiles qu&rsquo;elles con\u00e7oivent pour leurs clients et ne prot\u00e8gent pas suffisamment leurs [&hellip;]","og_url":"https:\/\/mobile2011.org\/fr\/40-des-entreprises-ne-securisent-pas-les-applications-mobiles-quelles-developpent\/","article_published_time":"2019-05-17T20:30:32+00:00","article_modified_time":"2023-05-30T17:39:37+00:00","author":"Aaron Griffin","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Aaron Griffin","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/mobile2011.org\/fr\/40-des-entreprises-ne-securisent-pas-les-applications-mobiles-quelles-developpent\/#article","isPartOf":{"@id":"https:\/\/mobile2011.org\/fr\/40-des-entreprises-ne-securisent-pas-les-applications-mobiles-quelles-developpent\/"},"author":{"name":"Aaron Griffin","@id":"https:\/\/mobile2011.org\/fr\/#\/schema\/person\/63543c148a95a42b9c5816991d270bb0"},"headline":"40% des entreprises ne s\u00e9curisent pas les applications mobiles qu&rsquo;elles d\u00e9veloppent ;","datePublished":"2019-05-17T20:30:32+00:00","dateModified":"2023-05-30T17:39:37+00:00","mainEntityOfPage":{"@id":"https:\/\/mobile2011.org\/fr\/40-des-entreprises-ne-securisent-pas-les-applications-mobiles-quelles-developpent\/"},"wordCount":618,"commentCount":0,"image":{"@id":"https:\/\/mobile2011.org\/fr\/40-des-entreprises-ne-securisent-pas-les-applications-mobiles-quelles-developpent\/#primaryimage"},"thumbnailUrl":"","articleSection":["s\u00e9curit\u00e9"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/mobile2011.org\/fr\/40-des-entreprises-ne-securisent-pas-les-applications-mobiles-quelles-developpent\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/mobile2011.org\/fr\/40-des-entreprises-ne-securisent-pas-les-applications-mobiles-quelles-developpent\/","url":"https:\/\/mobile2011.org\/fr\/40-des-entreprises-ne-securisent-pas-les-applications-mobiles-quelles-developpent\/","name":"40% des entreprises ne s\u00e9curisent pas les applications mobiles qu'elles d\u00e9veloppent ; -","isPartOf":{"@id":"https:\/\/mobile2011.org\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/mobile2011.org\/fr\/40-des-entreprises-ne-securisent-pas-les-applications-mobiles-quelles-developpent\/#primaryimage"},"image":{"@id":"https:\/\/mobile2011.org\/fr\/40-des-entreprises-ne-securisent-pas-les-applications-mobiles-quelles-developpent\/#primaryimage"},"thumbnailUrl":"","datePublished":"2019-05-17T20:30:32+00:00","dateModified":"2023-05-30T17:39:37+00:00","author":{"@id":"https:\/\/mobile2011.org\/fr\/#\/schema\/person\/63543c148a95a42b9c5816991d270bb0"},"breadcrumb":{"@id":"https:\/\/mobile2011.org\/fr\/40-des-entreprises-ne-securisent-pas-les-applications-mobiles-quelles-developpent\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/mobile2011.org\/fr\/40-des-entreprises-ne-securisent-pas-les-applications-mobiles-quelles-developpent\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/mobile2011.org\/fr\/40-des-entreprises-ne-securisent-pas-les-applications-mobiles-quelles-developpent\/#primaryimage","url":"","contentUrl":""},{"@type":"BreadcrumbList","@id":"https:\/\/mobile2011.org\/fr\/40-des-entreprises-ne-securisent-pas-les-applications-mobiles-quelles-developpent\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/mobile2011.org\/fr\/"},{"@type":"ListItem","position":2,"name":"40% des entreprises ne s\u00e9curisent pas les applications mobiles qu&rsquo;elles d\u00e9veloppent ;"}]},{"@type":"WebSite","@id":"https:\/\/mobile2011.org\/fr\/#website","url":"https:\/\/mobile2011.org\/fr\/","name":"","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/mobile2011.org\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/mobile2011.org\/fr\/#\/schema\/person\/63543c148a95a42b9c5816991d270bb0","name":"Aaron Griffin","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/aaa459ace34ad5fd34d8a0a6de67d7cafbab5d55f575dc9cb0cbdbd623ec855b?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/aaa459ace34ad5fd34d8a0a6de67d7cafbab5d55f575dc9cb0cbdbd623ec855b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/aaa459ace34ad5fd34d8a0a6de67d7cafbab5d55f575dc9cb0cbdbd623ec855b?s=96&d=mm&r=g","caption":"Aaron Griffin"},"url":"https:\/\/mobile2011.org\/fr\/author\/aarongriffin\/"}]}},"_links":{"self":[{"href":"https:\/\/mobile2011.org\/fr\/wp-json\/wp\/v2\/posts\/334","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mobile2011.org\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mobile2011.org\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mobile2011.org\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mobile2011.org\/fr\/wp-json\/wp\/v2\/comments?post=334"}],"version-history":[{"count":1,"href":"https:\/\/mobile2011.org\/fr\/wp-json\/wp\/v2\/posts\/334\/revisions"}],"predecessor-version":[{"id":336,"href":"https:\/\/mobile2011.org\/fr\/wp-json\/wp\/v2\/posts\/334\/revisions\/336"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mobile2011.org\/fr\/wp-json\/wp\/v2\/global-styles\/335"}],"wp:attachment":[{"href":"https:\/\/mobile2011.org\/fr\/wp-json\/wp\/v2\/media?parent=334"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mobile2011.org\/fr\/wp-json\/wp\/v2\/categories?post=334"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mobile2011.org\/fr\/wp-json\/wp\/v2\/tags?post=334"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}