{"id":2420,"date":"2025-01-18T14:02:04","date_gmt":"2025-01-18T14:02:04","guid":{"rendered":"https:\/\/steven-genolet.wh-web.fr\/?page_id=2420"},"modified":"2026-03-24T18:45:21","modified_gmt":"2026-03-24T18:45:21","slug":"veille-technologique-premiere-annee","status":"publish","type":"page","link":"https:\/\/steven-genolet.wh-web.fr\/index.php\/veille-technologique-premiere-annee\/","title":{"rendered":"Veille technologique Premi\u00e8re Ann\u00e9e"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"2420\" class=\"elementor elementor-2420\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b86e628 e-flex e-con-boxed e-con e-parent\" data-id=\"b86e628\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-daff56e elementor-widget elementor-widget-heading\" data-id=\"daff56e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Veille technologique<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e9a5f50 elementor-widget elementor-widget-heading\" data-id=\"e9a5f50\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">L'ia dans la cybers\u00e9curit\u00e9<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5d8fc9d e-flex e-con-boxed e-con e-parent\" data-id=\"5d8fc9d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8d3787d elementor-widget elementor-widget-heading\" data-id=\"8d3787d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Pr\u00e9sentation<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c20b731 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"c20b731\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-86acd0c elementor-widget elementor-widget-text-editor\" data-id=\"86acd0c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"210\" data-end=\"344\">Dans le cadre de ma veille technologique, je me suis int\u00e9ress\u00e9 \u00e0 l\u2019utilisation de l\u2019intelligence artificielle dans la cybers\u00e9curit\u00e9.<\/p><p data-start=\"346\" data-end=\"743\">Avec des menaces qui \u00e9voluent sans cesse, l\u2019IA devient un outil essentiel pour mieux prot\u00e9ger les syst\u00e8mes d\u2019information. Elle est utilis\u00e9e pour <strong data-start=\"491\" data-end=\"532\">s\u00e9curiser les syst\u00e8mes d\u2019IA eux-m\u00eames<\/strong>, <strong data-start=\"534\" data-end=\"612\">renforcer la cybers\u00e9curit\u00e9 gr\u00e2ce \u00e0 l\u2019automatisation et la d\u00e9tection rapide<\/strong>, mais aussi pour <strong data-start=\"630\" data-end=\"675\">anticiper les usages malveillants de l\u2019IA<\/strong>, qui rendent les attaques plus efficaces et difficiles \u00e0 contrer.<\/p><p data-start=\"745\" data-end=\"966\">Face \u00e0 ces enjeux, les investissements dans l\u2019IA de cybers\u00e9curit\u00e9 augmentent fortement. Les entreprises et les \u00c9tats misent sur ces technologies pour construire une d\u00e9fense plus proactive et pr\u00e9parer l\u2019avenir num\u00e9rique.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-12165c6 elementor-widget elementor-widget-heading\" data-id=\"12165c6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Outils utilis\u00e9es<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8bbbc69 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"8bbbc69\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2deb996 elementor-widget elementor-widget-text-editor\" data-id=\"2deb996\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li><p data-path-to-node=\"3,1,0,0\"><b data-path-to-node=\"3,1,0,0\" data-index-in-node=\"0\">FreshRSS pour la collecte automatis\u00e9e :<\/b> J&rsquo;ai choisi de d\u00e9ployer cet agr\u00e9gateur de flux RSS open source et auto-h\u00e9berg\u00e9 afin de centraliser mes diff\u00e9rentes sources (blogs sp\u00e9cialis\u00e9s, sites d&rsquo;actualit\u00e9s IT, alertes de s\u00e9curit\u00e9). En tant qu&rsquo;\u00e9tudiant en sp\u00e9cialit\u00e9 SISR, ce choix est strat\u00e9gique : l&rsquo;auto-h\u00e9bergement me permet de garder la ma\u00eetrise totale de mon infrastructure et de mes donn\u00e9es, tout en me donnant l&rsquo;opportunit\u00e9 d&rsquo;administrer un service (gestion des mises \u00e0 jour, s\u00e9curisation, sauvegardes).<\/p><\/li><\/ul><p><img fetchpriority=\"high\" decoding=\"async\" class=\"aligncenter wp-image-3038 size-large\" src=\"https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2026\/03\/cp-fresh-rss-1024x364.png\" alt=\"\" width=\"1024\" height=\"364\" srcset=\"https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2026\/03\/cp-fresh-rss-1024x364.png 1024w, https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2026\/03\/cp-fresh-rss-300x107.png 300w, https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2026\/03\/cp-fresh-rss-768x273.png 768w, https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2026\/03\/cp-fresh-rss-1536x546.png 1536w, https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2026\/03\/cp-fresh-rss-2048x728.png 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/p><p>\u00a0<\/p><p>\u00a0<\/p><ul><li><p data-path-to-node=\"3,1,1,0\"><b data-path-to-node=\"3,1,1,0\" data-index-in-node=\"0\">Zettlr pour la capitalisation des connaissances :<\/b> Pour traiter l&rsquo;information brute r\u00e9colt\u00e9e, j&rsquo;ai opt\u00e9 pour Zettlr, un puissant \u00e9diteur Markdown open source (qui constitue une excellente alternative \u00e0 Obsidian). Cet outil m&rsquo;accompagne au quotidien pour synth\u00e9tiser les articles pertinents, les classer \u00e0 l&rsquo;aide de mots-cl\u00e9s et structurer mes id\u00e9es. Cela me permet de transformer une simple lecture en une v\u00e9ritable base de connaissances p\u00e9renne, facilement consultable pour mes projets professionnels et mes examens.<\/p><\/li><\/ul><p><img decoding=\"async\" class=\"aligncenter wp-image-3042 size-large\" src=\"https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2026\/03\/capture-zettlr-1024x604.png\" alt=\"\" width=\"1024\" height=\"604\" srcset=\"https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2026\/03\/capture-zettlr-1024x604.png 1024w, https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2026\/03\/capture-zettlr-300x177.png 300w, https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2026\/03\/capture-zettlr-768x453.png 768w, https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2026\/03\/capture-zettlr-1536x906.png 1536w, https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2026\/03\/capture-zettlr.png 1918w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/p><p>\u00a0<\/p><p>\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-900e852 elementor-widget elementor-widget-heading\" data-id=\"900e852\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Articles<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5300ed8 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"5300ed8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ced129e e-flex e-con-boxed e-con e-parent\" data-id=\"ced129e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-c958a14 e-con-full e-flex e-con e-child\" data-id=\"c958a14\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-127fff7 e-con-full e-flex e-con e-child\" data-id=\"127fff7\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-99ca8d5 elementor-widget elementor-widget-image\" data-id=\"99ca8d5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1024\" height=\"667\" src=\"https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2025\/09\/Microfsoft-1024x667.jpg\" class=\"attachment-large size-large wp-image-2633\" alt=\"\" srcset=\"https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2025\/09\/Microfsoft-1024x667.jpg 1024w, https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2025\/09\/Microfsoft-300x195.jpg 300w, https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2025\/09\/Microfsoft-768x500.jpg 768w, https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2025\/09\/Microfsoft.jpg 1366w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-05d7138 elementor-widget elementor-widget-heading\" data-id=\"05d7138\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Project Ire (Microsoft)<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b499afb elementor-widget elementor-widget-text-editor\" data-id=\"b499afb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Microsoft a lanc\u00e9 Project Ire, un agent IA autonome qui d\u00e9tecte et analyse des malwares via LLMs et outils comme angr et Ghidra. Il a atteint 90 % de pr\u00e9cision avec peu de faux positifs ; capable d\u2019automatiser le blocage d\u2019APT complexes<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c25cda1 elementor-widget elementor-widget-button\" data-id=\"c25cda1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.itpro.com\/security\/malware\/microsoft-quietly-launched-an-ai-agent-that-can-reverse-engineer-and-detect-malware\" target=\"_blank\" rel=\"nofollow\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Liens de l'article<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-afcbc15 e-con-full e-flex e-con e-child\" data-id=\"afcbc15\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-3230331 e-con-full e-flex e-con e-child\" data-id=\"3230331\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3a56f2e elementor-widget elementor-widget-image\" data-id=\"3a56f2e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2025\/09\/hand-holding-an-ai-chip-1024x683.webp\" class=\"attachment-large size-large wp-image-2634\" alt=\"\" srcset=\"https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2025\/09\/hand-holding-an-ai-chip-1024x683.webp 1024w, https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2025\/09\/hand-holding-an-ai-chip-300x200.webp 300w, https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2025\/09\/hand-holding-an-ai-chip-768x512.webp 768w, https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2025\/09\/hand-holding-an-ai-chip.webp 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1681f83 elementor-widget elementor-widget-heading\" data-id=\"1681f83\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Investissements massifs dans l\u2019IA d\u00e9fensive<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9445017 elementor-widget elementor-widget-text-editor\" data-id=\"9445017\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Les investissements dans l\u2019IA en cybers\u00e9curit\u00e9 pourraient passer de 15 Md $ en 2021 \u00e0 135 Md $ en 2030. Palo Alto Networks a acquis Protect AI pour 500 M $ pour renforcer sa plateforme, illustrant la mont\u00e9e en puissance des d\u00e9fenses IA autonomes.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-faaabaf elementor-widget elementor-widget-button\" data-id=\"faaabaf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.investors.com\/news\/technology\/cybersecurity-stocks-outlook-ai-tariffs-global-threats\" target=\"_blank\" rel=\"nofollow\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Liens de l'article<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-014aacc e-con-full e-flex e-con e-child\" data-id=\"014aacc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-300a19c e-con-full e-flex e-con e-child\" data-id=\"300a19c\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6c366ce elementor-widget elementor-widget-image\" data-id=\"6c366ce\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2025\/09\/logo_anssi-1024x576.png\" class=\"attachment-large size-large wp-image-2635\" alt=\"\" srcset=\"https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2025\/09\/logo_anssi-1024x576.png 1024w, https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2025\/09\/logo_anssi-300x169.png 300w, https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2025\/09\/logo_anssi-768x432.png 768w, https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2025\/09\/logo_anssi.png 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a62a6ff elementor-widget elementor-widget-heading\" data-id=\"a62a6ff\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Intelligence Artificielle : les travaux de l\u2019ANSSI<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-efe69e4 elementor-widget elementor-widget-text-editor\" data-id=\"efe69e4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"40\" data-end=\"201\">L\u2019ANSSI soutient le d\u00e9veloppement d\u2019une IA de confiance et s\u00e9curis\u00e9e en France via une approche fond\u00e9e sur les risques.<br data-start=\"167\" data-end=\"170\" \/><br \/><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-07c3529 elementor-widget elementor-widget-button\" data-id=\"07c3529\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/cyber.gouv.fr\/intelligence-artificielle-les-travaux-de-lanssi\" target=\"_blank\" rel=\"nofollow\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Liens de l'article<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2cebed0 e-con-full e-flex e-con e-child\" data-id=\"2cebed0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-d9be164 e-con-full e-flex e-con e-child\" data-id=\"d9be164\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fc386db elementor-widget elementor-widget-image\" data-id=\"fc386db\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"512\" src=\"https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2025\/09\/logo_fortinet-1-1024x512.jpg\" class=\"attachment-large size-large wp-image-2636\" alt=\"\" srcset=\"https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2025\/09\/logo_fortinet-1-1024x512.jpg 1024w, https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2025\/09\/logo_fortinet-1-300x150.jpg 300w, https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2025\/09\/logo_fortinet-1-768x384.jpg 768w, https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2025\/09\/logo_fortinet-1-1536x768.jpg 1536w, https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2025\/09\/logo_fortinet-1.avif 2016w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0a19f65 elementor-widget elementor-widget-heading\" data-id=\"0a19f65\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">L\u2019intelligence artificielle (IA) dans la cybers\u00e9curit\u00e9 (Fortinet)<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-155c0bc elementor-widget elementor-widget-text-editor\" data-id=\"155c0bc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"506\" data-end=\"664\">l\u2019IA rend les syst\u00e8mes de s\u00e9curit\u00e9 plus intelligents, plus r\u00e9actifs et capables de pr\u00e9dire les attaques avant qu\u2019elles ne frappent.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-43dd48b elementor-widget elementor-widget-button\" data-id=\"43dd48b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.fortinet.com\/fr\/resources\/cyberglossary\/artificial-intelligence-in-cybersecurity\" target=\"_blank\" rel=\"nofollow\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Liens de l'article<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5e6c06e e-con-full e-flex e-con e-child\" data-id=\"5e6c06e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-895f445 e-con-full e-flex e-con e-child\" data-id=\"895f445\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ecea8f0 elementor-widget elementor-widget-image\" data-id=\"ecea8f0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"333\" height=\"151\" src=\"https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2025\/09\/logo-ibm-security.png\" class=\"attachment-full size-full wp-image-2637\" alt=\"\" srcset=\"https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2025\/09\/logo-ibm-security.png 333w, https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2025\/09\/logo-ibm-security-300x136.png 300w\" sizes=\"(max-width: 333px) 100vw, 333px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cbcee55 elementor-widget elementor-widget-heading\" data-id=\"cbcee55\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cybers\u00e9curit\u00e9 et intelligence artificielle (Solution IBM S\u00e9curity ) <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4dfc60d elementor-widget elementor-widget-text-editor\" data-id=\"4dfc60d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>IBM propose des solutions aliment\u00e9es par l\u2019IA pour acc\u00e9l\u00e9rer la d\u00e9tection des menaces, automatiser les r\u00e9ponses, prot\u00e9ger les donn\u00e9es et les identit\u00e9s, tout en maintenant un bon \u00e9quilibre entre s\u00e9curit\u00e9 et exp\u00e9rience utilisateur.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-41f2af8 elementor-widget elementor-widget-button\" data-id=\"41f2af8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.ibm.com\/fr-fr\/solutions\/ai-cybersecurity\" target=\"_blank\" rel=\"nofollow\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Liens de l'article<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b6ea798 e-con-full e-flex e-con e-child\" data-id=\"b6ea798\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-1e9cdd7 e-con-full e-flex e-con e-child\" data-id=\"1e9cdd7\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-996b8ec elementor-widget elementor-widget-image\" data-id=\"996b8ec\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"673\" src=\"https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2025\/09\/kaspersky-rebranding-in-details-featured-1024x673.jpg\" class=\"attachment-large size-large wp-image-2638\" alt=\"\" srcset=\"https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2025\/09\/kaspersky-rebranding-in-details-featured-1024x673.jpg 1024w, https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2025\/09\/kaspersky-rebranding-in-details-featured-300x197.jpg 300w, https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2025\/09\/kaspersky-rebranding-in-details-featured-768x505.jpg 768w, https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2025\/09\/kaspersky-rebranding-in-details-featured.jpg 1460w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a5d2f44 elementor-widget elementor-widget-heading\" data-id=\"a5d2f44\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Comment l'IA et l'apprentissage automatique dans la cybers\u00e9curit\u00e9 fa\u00e7onnent l'avenir (Kapersky)<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4f9f72e elementor-widget elementor-widget-text-editor\" data-id=\"4f9f72e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\"sr-only\"><span class=\"relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out\" style=\"font-size: 16px;\">La cybers\u00e9curit\u00e9 bas\u00e9e sur l&rsquo;intelligence artificielle (IA) et l&rsquo;apprentissage automatique (Machine Learning, ML) est en pleine \u00e9volution.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f4184a3 elementor-widget elementor-widget-button\" data-id=\"f4184a3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.kaspersky.fr\/resource-center\/definitions\/ai-cybersecurity\" target=\"_blank\" rel=\"nofollow\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Liens de l'article<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f09f8bb e-flex e-con-boxed e-con e-parent\" data-id=\"f09f8bb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-e99ff78 e-con-full e-flex e-con e-child\" data-id=\"e99ff78\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-f13651d e-con-full e-flex e-con e-child\" data-id=\"f13651d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a93cad6 elementor-widget elementor-widget-image\" data-id=\"a93cad6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"630\" src=\"https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2025\/09\/nouveau-logo-bouygues-telecom--1024x630.jpg\" class=\"attachment-large size-large wp-image-2639\" alt=\"\" srcset=\"https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2025\/09\/nouveau-logo-bouygues-telecom--1024x630.jpg 1024w, https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2025\/09\/nouveau-logo-bouygues-telecom--300x185.jpg 300w, https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2025\/09\/nouveau-logo-bouygues-telecom--768x473.jpg 768w, https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2025\/09\/nouveau-logo-bouygues-telecom--1536x945.jpg 1536w, https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2025\/09\/nouveau-logo-bouygues-telecom-.jpg 1950w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-494c442 elementor-widget elementor-widget-heading\" data-id=\"494c442\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Comment l\u2019IA peut renforcer votre cybers\u00e9curit\u00e9 ! ( Bouygues Telecom Entreprises)<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-921d98e elementor-widget elementor-widget-text-editor\" data-id=\"921d98e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>L&rsquo;article de Bouygues Telecom Entreprises explore comment l&rsquo;intelligence artificielle (IA) peut renforcer la cybers\u00e9curit\u00e9 des entreprises face \u00e0 des menaces de plus en plus complexes.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-29c205e elementor-widget elementor-widget-button\" data-id=\"29c205e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.bouyguestelecom-pro.fr\/mag-business\/comment-lia-peut-renforcer-votre-cybersecurite\/?srsltid=AfmBOopmCXMvS27GjQ_uLQivjBodowbEiD4oH_dNC6GojTtI9rCQrVcH\" target=\"_blank\" rel=\"nofollow\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Liens de l'article<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8a2ecc6 e-con-full e-flex e-con e-child\" data-id=\"8a2ecc6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-18dead7 e-con-full e-flex e-con e-child\" data-id=\"18dead7\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-46be1e5 elementor-widget elementor-widget-image\" data-id=\"46be1e5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"316\" src=\"https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2025\/09\/digital-brain-circuit-ai-cocept-600nw-2498421665.webp\" class=\"attachment-large size-large wp-image-2640\" alt=\"\" srcset=\"https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2025\/09\/digital-brain-circuit-ai-cocept-600nw-2498421665.webp 600w, https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2025\/09\/digital-brain-circuit-ai-cocept-600nw-2498421665-300x158.webp 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dee067c elementor-widget elementor-widget-heading\" data-id=\"dee067c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Pr\u00e9sentation<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-19df2af elementor-widget elementor-widget-heading\" data-id=\"19df2af\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cybers\u00e9curit\u00e9 : comment l\u2019IA renforce la protection des donn\u00e9es ? (Le Monde)<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-30ad8cd elementor-widget elementor-widget-text-editor\" data-id=\"30ad8cd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>L\u2019article de Le Monde explique que l\u2019IA renforce la cybers\u00e9curit\u00e9 en d\u00e9tectant rapidement les menaces et en automatisant les r\u00e9ponses, tout en n\u00e9cessitant une utilisation \u00e9thique et bien encadr\u00e9e.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5493b6f elementor-widget elementor-widget-button\" data-id=\"5493b6f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.lemonde.fr\/creativite-et-transformation\/article\/2024\/02\/29\/cybersecurite-comment-l-ia-renforce-la-protection-des-donnees_6219261_433.html\" target=\"_blank\" rel=\"nofollow\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Liens de l'article<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-057326c e-con-full e-flex e-con e-child\" data-id=\"057326c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-17cc048 e-con-full e-flex e-con e-child\" data-id=\"17cc048\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-10edbc0 elementor-widget elementor-widget-image\" data-id=\"10edbc0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"476\" src=\"https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2025\/09\/f035e5eb1ff6bbc7bef5a5dce4f8b051-1024x476.webp\" class=\"attachment-large size-large wp-image-2641\" alt=\"\" srcset=\"https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2025\/09\/f035e5eb1ff6bbc7bef5a5dce4f8b051-1024x476.webp 1024w, https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2025\/09\/f035e5eb1ff6bbc7bef5a5dce4f8b051-300x139.webp 300w, https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2025\/09\/f035e5eb1ff6bbc7bef5a5dce4f8b051-768x357.webp 768w, https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2025\/09\/f035e5eb1ff6bbc7bef5a5dce4f8b051-1536x713.webp 1536w, https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2025\/09\/f035e5eb1ff6bbc7bef5a5dce4f8b051-2048x951.webp 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6030e0c elementor-widget elementor-widget-heading\" data-id=\"6030e0c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">IA et cybers\u00e9curit\u00e9 : enjeux et opportunit\u00e9s pour les entreprises (BPI France)<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c4001b6 elementor-widget elementor-widget-text-editor\" data-id=\"c4001b6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>L\u2019article de Bpifrance explique que l\u2019IA aide les entreprises \u00e0 mieux se prot\u00e9ger contre les cyberattaques. Elle permet de rep\u00e9rer les menaces rapidement, de r\u00e9agir plus vite et de g\u00e9rer les risques plus facilement. Mais il faut l\u2019utiliser de fa\u00e7on responsable pour \u00e9viter des probl\u00e8mes \u00e9thiques ou l\u00e9gaux.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0f81ed5 elementor-widget elementor-widget-button\" data-id=\"0f81ed5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/bigmedia.bpifrance.fr\/nos-dossiers\/ia-et-cybersecurite-enjeux-et-opportunites-pour-les-entreprises\" target=\"_blank\" rel=\"nofollow\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Liens de l'article<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d827aa2 e-con-full e-flex e-con e-child\" data-id=\"d827aa2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-18e8c19 e-con-full e-flex e-con e-child\" data-id=\"18e8c19\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5057f12 elementor-widget elementor-widget-image\" data-id=\"5057f12\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"368\" src=\"https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2025\/09\/ai-agent-generative-artificial-intelligence-600nw-2547021065.webp\" class=\"attachment-large size-large wp-image-2642\" alt=\"\" srcset=\"https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2025\/09\/ai-agent-generative-artificial-intelligence-600nw-2547021065.webp 600w, https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2025\/09\/ai-agent-generative-artificial-intelligence-600nw-2547021065-300x184.webp 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5fb9402 elementor-widget elementor-widget-heading\" data-id=\"5fb9402\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">IA : un bouclier strat\u00e9gique contre les attaques informatiques (Les Echos)<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9a754b2 elementor-widget elementor-widget-text-editor\" data-id=\"9a754b2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out\">L&rsquo;article de les Echos pr\u00e9sente l&rsquo;intelligence artificielle (IA) comme un outil puissant pour renforcer la cybers\u00e9curit\u00e9 des entreprises.<\/span> <span class=\"relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out\">Elle permet de d\u00e9tecter rapidement les menaces, d&rsquo;automatiser les r\u00e9ponses aux attaques et de mieux g\u00e9rer les risques.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a8aa58d elementor-widget elementor-widget-button\" data-id=\"a8aa58d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.lesechos.fr\/thema\/articles\/ia-un-bouclier-strategique-contre-les-attaques-informatiques-2146795\" target=\"_blank\" rel=\"nofollow\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Liens de l'article<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9e6b048 e-con-full e-flex e-con e-child\" data-id=\"9e6b048\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-d7d68ed e-con-full e-flex e-con e-child\" data-id=\"d7d68ed\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fc552f8 elementor-widget elementor-widget-image\" data-id=\"fc552f8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"525\" height=\"360\" src=\"https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2025\/09\/Asset-Red_Hat-Logo_page-Not_this-2-RGB.png\" class=\"attachment-large size-large wp-image-2644\" alt=\"\" srcset=\"https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2025\/09\/Asset-Red_Hat-Logo_page-Not_this-2-RGB.png 525w, https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2025\/09\/Asset-Red_Hat-Logo_page-Not_this-2-RGB-300x206.png 300w\" sizes=\"(max-width: 525px) 100vw, 525px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bca08d7 elementor-widget elementor-widget-heading\" data-id=\"bca08d7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">4 cas d'utilisation de l'IA pour la cybers\u00e9curit\u00e9 (Red Hat)<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7e62f8b elementor-widget elementor-widget-text-editor\" data-id=\"7e62f8b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>L\u2019article de Red Hat explique que l\u2019IA aide la cybers\u00e9curit\u00e9 en : d\u00e9tectant les comportements suspects, anticipant les menaces, v\u00e9rifiant le code pour trouver des failles et automatisant la recherche de vuln\u00e9rabilit\u00e9s.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-09fce35 elementor-widget elementor-widget-button\" data-id=\"09fce35\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.redhat.com\/fr\/blog\/4-use-cases-ai-cyber-security\" target=\"_blank\" rel=\"nofollow\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Liens de l'article<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-48b2eee e-con-full e-flex e-con e-child\" data-id=\"48b2eee\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-fad1e37 e-con-full e-flex e-con e-child\" data-id=\"fad1e37\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4830767 elementor-widget elementor-widget-image\" data-id=\"4830767\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"431\" height=\"253\" src=\"https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2026\/03\/Capture-decran-2026-03-24-182427.png\" class=\"attachment-large size-large wp-image-3071\" alt=\"\" srcset=\"https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2026\/03\/Capture-decran-2026-03-24-182427.png 431w, https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2026\/03\/Capture-decran-2026-03-24-182427-300x176.png 300w\" sizes=\"(max-width: 431px) 100vw, 431px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-03b3e44 elementor-widget elementor-widget-heading\" data-id=\"03b3e44\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">La cybers\u00e9curit\u00e9 \u00e0 l\u2019\u00e8re de l\u2019IA en 2026 : enfin des chiffres int\u00e9ressants<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7770913 elementor-widget elementor-widget-text-editor\" data-id=\"7770913\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>77 % des RSSI utilisent d\u00e9sormais l&rsquo;IA g\u00e9n\u00e9rative pour la d\u00e9fense. Un article cl\u00e9 pour montrer les chiffres du march\u00e9.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5dc7895 elementor-widget elementor-widget-button\" data-id=\"5dc7895\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.itforbusiness.fr\/la-cybersecurite-a-ere-de-ia-en-2026-enfin-des-chiffres-interessants-rapport-darktrace-100081\" target=\"_blank\" rel=\"nofollow\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Liens de l'article<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c024946 e-flex e-con-boxed e-con e-parent\" data-id=\"c024946\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-34552b7 e-con-full e-flex e-con e-child\" data-id=\"34552b7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-e4f6ff5 e-con-full e-flex e-con e-child\" data-id=\"e4f6ff5\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3d6d21d elementor-widget elementor-widget-image\" data-id=\"3d6d21d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"583\" height=\"285\" src=\"https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2026\/03\/Capture-decran-2026-03-24-182755.png\" class=\"attachment-large size-large wp-image-3075\" alt=\"\" srcset=\"https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2026\/03\/Capture-decran-2026-03-24-182755.png 583w, https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2026\/03\/Capture-decran-2026-03-24-182755-300x147.png 300w\" sizes=\"(max-width: 583px) 100vw, 583px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-40d4566 elementor-widget elementor-widget-heading\" data-id=\"40d4566\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Best AI Cybersecurity Providers: Top 6 Options in 2026<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1c51abe elementor-widget elementor-widget-text-editor\" data-id=\"1c51abe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Comment l&rsquo;IA s\u00e9curise le code et la \u00ab\u00a0Supply Chain\u00a0\u00bb logicielle.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6b58f90 elementor-widget elementor-widget-button\" data-id=\"6b58f90\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/checkmarx.com\/learn\/best-ai-cybersecurity-providers-top-6-options-in-2026\/\" target=\"_blank\" rel=\"nofollow\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Liens de l'article<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-801e094 e-con-full e-flex e-con e-child\" data-id=\"801e094\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-8ee376d e-con-full e-flex e-con e-child\" data-id=\"8ee376d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-75632c6 elementor-widget elementor-widget-image\" data-id=\"75632c6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"694\" height=\"460\" src=\"https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2026\/03\/Capture-decran-2026-03-24-182949.png\" class=\"attachment-large size-large wp-image-3079\" alt=\"\" srcset=\"https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2026\/03\/Capture-decran-2026-03-24-182949.png 694w, https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2026\/03\/Capture-decran-2026-03-24-182949-300x199.png 300w\" sizes=\"(max-width: 694px) 100vw, 694px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a562102 elementor-widget elementor-widget-heading\" data-id=\"a562102\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Agents IA, vol d\u2019identifiants et prolif\u00e9ration des outils, le triptyque de la cybers\u00e9curit\u00e9 en 2026<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1128a0f elementor-widget elementor-widget-text-editor\" data-id=\"1128a0f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><b data-path-to-node=\"3,2,0\" data-index-in-node=\"0\">Cet article pr\u00e9sente :<\/b> L&rsquo;\u00e9volution des menaces o\u00f9 l&rsquo;IA n&rsquo;est plus seulement un outil d&rsquo;aide, mais devient un \u00ab\u00a0agent\u00a0\u00bb autonome capable de voler des identifiants et de contourner les MFA (authentification multi-facteurs). Il explique comment le triptyque \u00ab\u00a0Agents IA \/ Vol d&rsquo;identifiants \/ Prolif\u00e9ration\u00a0\u00bb devient le d\u00e9fi majeur des administrateurs r\u00e9seau cette ann\u00e9e.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-372ca83 elementor-widget elementor-widget-button\" data-id=\"372ca83\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/itsocial.fr\/cybersecurite\/cybersecurite-articles\/agents-ia-vol-didentifiants-et-proliferation-des-outils-le-triptyque-de-la-cybersecurite-en-2026\/\" target=\"_blank\" rel=\"nofollow\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Liens de l'article<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a88e2ce e-con-full e-flex e-con e-child\" data-id=\"a88e2ce\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-51565eb e-con-full e-flex e-con e-child\" data-id=\"51565eb\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-141d910 elementor-widget elementor-widget-image\" data-id=\"141d910\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"573\" height=\"380\" src=\"https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2026\/03\/Capture-decran-2026-03-24-183147.png\" class=\"attachment-large size-large wp-image-3083\" alt=\"\" srcset=\"https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2026\/03\/Capture-decran-2026-03-24-183147.png 573w, https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2026\/03\/Capture-decran-2026-03-24-183147-300x199.png 300w\" sizes=\"(max-width: 573px) 100vw, 573px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0c3b313 elementor-widget elementor-widget-heading\" data-id=\"0c3b313\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Rapport ANSSI 2026 : IA g\u00e9n\u00e9rative et cyberattaques<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7b7b691 elementor-widget elementor-widget-text-editor\" data-id=\"7b7b691\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><b data-path-to-node=\"5,2,0\" data-index-in-node=\"0\">Cet article pr\u00e9sente :<\/b> Une synth\u00e8se du rapport officiel de l&rsquo;ANSSI de f\u00e9vrier 2026. Il explique que l&rsquo;IA ne cr\u00e9e pas encore d&rsquo;attaques de \u00ab\u00a0bout en bout\u00a0\u00bb, mais qu&rsquo;elle booste l&rsquo;ing\u00e9nierie sociale (phishing parfait) et permet de cr\u00e9er des malwares comme <b data-path-to-node=\"5,2,0\" data-index-in-node=\"252\">Promptflux<\/b>, capable de modifier son propre code via l&rsquo;API de Gemini pour \u00e9chapper aux antivirus.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cb19b40 elementor-widget elementor-widget-button\" data-id=\"cb19b40\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.lexing.law\/avocats\/rapport-de-lanssi-ia-generative-et-cyberattaques\/2026\/03\/11\/\" target=\"_blank\" rel=\"nofollow\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Liens de l'article<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9c84371 e-con-full e-flex e-con e-child\" data-id=\"9c84371\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-f704293 e-con-full e-flex e-con e-child\" data-id=\"f704293\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ce40154 elementor-widget elementor-widget-image\" data-id=\"ce40154\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"278\" height=\"81\" src=\"https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2026\/03\/Capture-decran-2026-03-24-183254.png\" class=\"attachment-large size-large wp-image-3087\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3b36f8c elementor-widget elementor-widget-heading\" data-id=\"3b36f8c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cybers\u00e9curit\u00e9 2026 : IA, identit\u00e9s machines et confiance <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-159ced6 elementor-widget elementor-widget-text-editor\" data-id=\"159ced6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><b data-path-to-node=\"9,2,0\" data-index-in-node=\"0\">Cet article pr\u00e9sente :<\/b> Une analyse bas\u00e9e sur le rapport IBM. Il r\u00e9v\u00e8le que 97 % des entreprises ayant subi une violation de donn\u00e9es li\u00e9e \u00e0 l&rsquo;IA n&rsquo;avaient pas mis en place de contr\u00f4les d&rsquo;acc\u00e8s appropri\u00e9s. Il souligne que l&rsquo;IA, si elle est mal configur\u00e9e, devient une faille de s\u00e9curit\u00e9 majeure (fuite de donn\u00e9es sensibles via les prompts).<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7c73a14 elementor-widget elementor-widget-button\" data-id=\"7c73a14\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.ellisphere.com\/actualites\/article\/cybersecurite-2026-ia-identites-machines-et-confiance\" target=\"_blank\" rel=\"nofollow\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Liens de l'article<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-bc28815 e-con-full e-flex e-con e-child\" data-id=\"bc28815\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-08599c3 e-con-full e-flex e-con e-child\" data-id=\"08599c3\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-72c67c1 elementor-widget elementor-widget-image\" data-id=\"72c67c1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"305\" height=\"105\" src=\"https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2026\/03\/Capture-decran-2026-03-24-183407.png\" class=\"attachment-large size-large wp-image-3091\" alt=\"\" srcset=\"https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2026\/03\/Capture-decran-2026-03-24-183407.png 305w, https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2026\/03\/Capture-decran-2026-03-24-183407-300x103.png 300w\" sizes=\"(max-width: 305px) 100vw, 305px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-43825b6 elementor-widget elementor-widget-heading\" data-id=\"43825b6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">4 cas d'utilisation de l'IA pour la cybers\u00e9curit\u00e9 (Red Hat)<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-db9abf2 elementor-widget elementor-widget-text-editor\" data-id=\"db9abf2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><b data-path-to-node=\"11,2,0\" data-index-in-node=\"0\">Cet article pr\u00e9sente :<\/b> Un focus sur les outils fran\u00e7ais comme <b data-path-to-node=\"11,2,0\" data-index-in-node=\"62\">Patrowl<\/b>, qui utilisent l&rsquo;IA pour automatiser les tests d&rsquo;intrusion (pentests). L&rsquo;article montre comment l&rsquo;automatisation permet de surveiller la \u00ab\u00a0surface d&rsquo;attaque\u00a0\u00bb d&rsquo;une entreprise en continu, et non plus une fois par an.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2760926 elementor-widget elementor-widget-button\" data-id=\"2760926\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.lesassisesdelacybersecurite.com\/fr-FR\/presse-media-asso\/actualites-et-communique-de-presse\/SDmagazine-Cyber-Innovations2026\" target=\"_blank\" rel=\"nofollow\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Liens de l'article<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b87275f e-con-full e-flex e-con e-child\" data-id=\"b87275f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-098fdd9 e-con-full e-flex e-con e-child\" data-id=\"098fdd9\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-557afce elementor-widget elementor-widget-image\" data-id=\"557afce\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"379\" height=\"114\" src=\"https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2026\/03\/Capture-decran-2026-03-24-183544.png\" class=\"attachment-large size-large wp-image-3095\" alt=\"\" srcset=\"https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2026\/03\/Capture-decran-2026-03-24-183544.png 379w, https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2026\/03\/Capture-decran-2026-03-24-183544-300x90.png 300w\" sizes=\"(max-width: 379px) 100vw, 379px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e66a8cd elementor-widget elementor-widget-heading\" data-id=\"e66a8cd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"> L\u2019intelligence artificielle g\u00e9n\u00e9rative face aux attaques informatiques <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-227e12e elementor-widget elementor-widget-text-editor\" data-id=\"227e12e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><b data-path-to-node=\"3,2,0\" data-index-in-node=\"0\">Cet article pr\u00e9sente :<\/b> Le bilan officiel de l&rsquo;ann\u00e9e 2025 et les projections pour 2026. L&rsquo;ANSSI y d\u00e9taille l&rsquo;explosion des attaques par \u00ab\u00a0IA g\u00e9n\u00e9rative\u00a0\u00bb qui industrialisent le phishing et la cr\u00e9ation de scripts malveillants. Il mentionne \u00e9galement que l&rsquo;IA devient une cible (attaques par empoisonnement de donn\u00e9es).<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-936f603 elementor-widget elementor-widget-button\" data-id=\"936f603\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.cert.ssi.gouv.fr\/cti\/CERTFR-2026-CTI-001\/\" target=\"_blank\" rel=\"nofollow\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Liens de l'article<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cafd6be e-flex e-con-boxed e-con e-parent\" data-id=\"cafd6be\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-deb91bc e-con-full e-flex e-con e-child\" data-id=\"deb91bc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-08a3bb8 e-con-full e-flex e-con e-child\" data-id=\"08a3bb8\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-166ca9f elementor-widget elementor-widget-image\" data-id=\"166ca9f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"642\" height=\"256\" src=\"https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2026\/03\/Capture-decran-2026-03-24-183712.png\" class=\"attachment-large size-large wp-image-3099\" alt=\"\" srcset=\"https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2026\/03\/Capture-decran-2026-03-24-183712.png 642w, https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2026\/03\/Capture-decran-2026-03-24-183712-300x120.png 300w\" sizes=\"(max-width: 642px) 100vw, 642px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fb9c838 elementor-widget elementor-widget-heading\" data-id=\"fb9c838\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Panorama des cybermenaces 2026 : l\u2019attaque passe en mode industriel !<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dfda2df elementor-widget elementor-widget-text-editor\" data-id=\"dfda2df\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><b data-path-to-node=\"9,2,0\" data-index-in-node=\"0\">Cet article pr\u00e9sente :<\/b> Une analyse des experts sur le concept de \u00ab\u00a0SOC agentifi\u00e9\u00a0\u00bb. Il avertit sur le fait que l&rsquo;automatisation par IA dans les centres de s\u00e9curit\u00e9 doit \u00eatre strictement encadr\u00e9e pour ne pas devenir elle-m\u00eame un vecteur de manipulation par les hackers.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1db976c elementor-widget elementor-widget-button\" data-id=\"1db976c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.itforbusiness.fr\/panorama-des-cybermenaces-2026-lattaque-passe-en-mode-industriel-99458\" target=\"_blank\" rel=\"nofollow\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Liens de l'article<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3e1aea0 e-con-full e-flex e-con e-child\" data-id=\"3e1aea0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-3a7e22b e-con-full e-flex e-con e-child\" data-id=\"3a7e22b\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f1a310c elementor-widget elementor-widget-image\" data-id=\"f1a310c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"743\" height=\"381\" src=\"https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2026\/03\/Capture-decran-2026-03-24-183855.png\" class=\"attachment-large size-large wp-image-3112\" alt=\"\" srcset=\"https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2026\/03\/Capture-decran-2026-03-24-183855.png 743w, https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2026\/03\/Capture-decran-2026-03-24-183855-300x154.png 300w\" sizes=\"(max-width: 743px) 100vw, 743px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c34f76c elementor-widget elementor-widget-heading\" data-id=\"c34f76c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Tech&amp;Fest 2026 : cybers\u00e9curit\u00e9 et IA, l'Europe en qu\u00eate de souverainet\u00e9<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-54d8de5 elementor-widget elementor-widget-text-editor\" data-id=\"54d8de5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><b data-path-to-node=\"11,2,0\" data-index-in-node=\"0\">Cet article pr\u00e9sente :<\/b> Le d\u00e9fi de la souverainet\u00e9 num\u00e9rique europ\u00e9enne face aux IA am\u00e9ricaines. Il pr\u00e9sente des solutions de cybers\u00e9curit\u00e9 fran\u00e7aises (comme Hackuity) qui utilisent des IA sp\u00e9cialis\u00e9es pour lutter contre le \u00ab\u00a0phishing agentique\u00a0\u00bb.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-68fb33e elementor-widget elementor-widget-button\" data-id=\"68fb33e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/bigmedia.bpifrance.fr\/nos-actualites\/techfest-2026-cybersecurite-et-ia-leurope-en-quete-de-souverainete\" target=\"_blank\" rel=\"nofollow\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Liens de l'article<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-003f43a e-con-full e-flex e-con e-child\" data-id=\"003f43a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-a938fc2 e-con-full e-flex e-con e-child\" data-id=\"a938fc2\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5cf16d7 elementor-widget elementor-widget-image\" data-id=\"5cf16d7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"629\" height=\"250\" src=\"https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2026\/03\/Capture-decran-2026-03-24-185722.png\" class=\"attachment-large size-large wp-image-3119\" alt=\"\" srcset=\"https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2026\/03\/Capture-decran-2026-03-24-185722.png 629w, https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2026\/03\/Capture-decran-2026-03-24-185722-300x119.png 300w\" sizes=\"(max-width: 629px) 100vw, 629px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-caffeab elementor-widget elementor-widget-heading\" data-id=\"caffeab\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cyber-r\u00e9silience en 2026 : les tendances \u00e0 ne pas manquer<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-302a9ee elementor-widget elementor-widget-text-editor\" data-id=\"302a9ee\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><b data-path-to-node=\"3,2,0\" data-index-in-node=\"0\">Cet article pr\u00e9sente :<\/b> Une analyse sur la nouvelle faille des entreprises : leurs propres chatbots client. L&rsquo;article explique comment les attaquants utilisent des techniques d&rsquo;injection pour d\u00e9tourner les IA des entreprises afin d&rsquo;aspirer des donn\u00e9es internes ou de diffuser des malwares aux clients.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cbca7e6 elementor-widget elementor-widget-button\" data-id=\"cbca7e6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.itforbusiness.fr\/cyber-resilience-en-2026-les-tendances-a-ne-pas-manquer-98892\" target=\"_blank\" rel=\"nofollow\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Liens de l'article<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-51bda09 e-con-full e-flex e-con e-child\" data-id=\"51bda09\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-f33952b e-con-full e-flex e-con e-child\" data-id=\"f33952b\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ecde0e5 elementor-widget elementor-widget-image\" data-id=\"ecde0e5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"698\" height=\"463\" src=\"https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2026\/03\/Capture-decran-2026-03-24-185830.png\" class=\"attachment-large size-large wp-image-3123\" alt=\"\" srcset=\"https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2026\/03\/Capture-decran-2026-03-24-185830.png 698w, https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2026\/03\/Capture-decran-2026-03-24-185830-300x199.png 300w\" sizes=\"(max-width: 698px) 100vw, 698px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5e29503 elementor-widget elementor-widget-heading\" data-id=\"5e29503\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Au-del\u00e0 de 2026 : comment l\u2019IA et l\u2019identit\u00e9 vont remodeler la cybers\u00e9curit\u00e9 selon BeyondTrust<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c5f30ac elementor-widget elementor-widget-text-editor\" data-id=\"c5f30ac\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><b data-path-to-node=\"7,2,0\" data-index-in-node=\"0\">Cet article pr\u00e9sente :<\/b> La pr\u00e9diction d&rsquo;une rupture technologique : les VPN traditionnels deviennent obsol\u00e8tes face aux acc\u00e8s bas\u00e9s sur l&rsquo;identit\u00e9 g\u00e9r\u00e9s par IA. L&rsquo;article introduit le concept d'\u00a0\u00bbIA Vegan\u00a0\u00bb, o\u00f9 des entreprises refusent l&rsquo;IA par souci de confidentialit\u00e9, cr\u00e9ant un nouveau d\u00e9fi pour l&rsquo;administrateur.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c969fd0 elementor-widget elementor-widget-button\" data-id=\"c969fd0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.solutions-numeriques.com\/au-dela-de-2026-comment-lia-et-lidentite-vont-remodeler-la-cybersecurite-selon-beyondtrust\/\" target=\"_blank\" rel=\"nofollow\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Liens de l'article<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a7df5a7 e-con-full e-flex e-con e-child\" data-id=\"a7df5a7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-67c7c69 e-con-full e-flex e-con e-child\" data-id=\"67c7c69\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-038ffbb elementor-widget elementor-widget-image\" data-id=\"038ffbb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"337\" height=\"132\" src=\"https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2026\/03\/Capture-decran-2026-03-24-190000.png\" class=\"attachment-large size-large wp-image-3130\" alt=\"\" srcset=\"https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2026\/03\/Capture-decran-2026-03-24-190000.png 337w, https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2026\/03\/Capture-decran-2026-03-24-190000-300x118.png 300w\" sizes=\"(max-width: 337px) 100vw, 337px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-49e35ad elementor-widget elementor-widget-heading\" data-id=\"49e35ad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">6 pr\u00e9dictions pour s\u00e9curiser la nouvelle \u00e9conomie de l\u2019IA en 2026 <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5c46cfa elementor-widget elementor-widget-text-editor\" data-id=\"5c46cfa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><b data-path-to-node=\"9,2,0\" data-index-in-node=\"0\">Cet article pr\u00e9sente :<\/b> Le concept de \u00ab\u00a0CEO doppelg\u00e4ngers\u00a0\u00bb : des deepfakes en temps r\u00e9el capables d&rsquo;imiter parfaitement la voix et le visage d&rsquo;un dirigeant lors de visioconf\u00e9rences pour valider des virements frauduleux. Il souligne le ratio de 82 identit\u00e9s machines pour 1 humaine, rendant la gestion des acc\u00e8s impossible sans IA.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6cc0a52 elementor-widget elementor-widget-button\" data-id=\"6cc0a52\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/itrnews.com\/articles\/208097\/6-predictions-pour-securiser-la-nouvelle-economie-de-lia-en-2026.html\" target=\"_blank\" rel=\"nofollow\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Liens de l'article<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6023ca1 e-con-full e-flex e-con e-child\" data-id=\"6023ca1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-61ae614 e-con-full e-flex e-con e-child\" data-id=\"61ae614\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-edb6f1c elementor-widget elementor-widget-image\" data-id=\"edb6f1c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"289\" height=\"289\" src=\"https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2026\/03\/Capture-decran-2026-03-24-194417.png\" class=\"attachment-large size-large wp-image-3134\" alt=\"\" srcset=\"https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2026\/03\/Capture-decran-2026-03-24-194417.png 289w, https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2026\/03\/Capture-decran-2026-03-24-194417-150x150.png 150w\" sizes=\"(max-width: 289px) 100vw, 289px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ec7f26a elementor-widget elementor-widget-heading\" data-id=\"ec7f26a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Interview - Fuites de donn\u00e9es, IA et cybercriminalit\u00e9 : \u00e0 quoi s\u2019attendre en 2026 ? (Beno\u00eet Gr\u00fcnemwald, ESET)<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2338e84 elementor-widget elementor-widget-text-editor\" data-id=\"2338e84\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><b data-path-to-node=\"11,2,0\" data-index-in-node=\"0\">Cet article pr\u00e9sente :<\/b> Une interview d&rsquo;expert expliquant que les malwares modernes utilisent d\u00e9sormais des API pour \u00ab\u00a0discuter\u00a0\u00bb avec une IA distante afin de d\u00e9cider de la meilleure strat\u00e9gie d&rsquo;exfiltration de donn\u00e9es en fonction de ce qu&rsquo;ils trouvent sur le disque dur.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6301bc7 elementor-widget elementor-widget-button\" data-id=\"6301bc7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/mondenumerique.info\/podcast\/monde-numerique\/episode\/interview-fuites-de-donnees-ia-et-cybercriminalite-a-quoi-sattendre-en-2026-benoit-grunemwald-eset\" target=\"_blank\" rel=\"nofollow\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Liens de l'article<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-46215a4 e-flex e-con-boxed e-con e-parent\" data-id=\"46215a4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-96b9663 elementor-widget elementor-widget-heading\" data-id=\"96b9663\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Carte mentale<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3d06a42 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"3d06a42\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-17be72b e-flex e-con-boxed e-con e-parent\" data-id=\"17be72b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-801860b elementor-widget elementor-widget-image\" data-id=\"801860b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2025\/09\/Carte-Mentale-Moderne-Bleu-Creative-1024x576.png\" class=\"attachment-large size-large wp-image-2735\" alt=\"\" srcset=\"https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2025\/09\/Carte-Mentale-Moderne-Bleu-Creative-1024x576.png 1024w, https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2025\/09\/Carte-Mentale-Moderne-Bleu-Creative-300x169.png 300w, https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2025\/09\/Carte-Mentale-Moderne-Bleu-Creative-768x432.png 768w, https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2025\/09\/Carte-Mentale-Moderne-Bleu-Creative-1536x864.png 1536w, https:\/\/steven-genolet.wh-web.fr\/wp-content\/uploads\/2025\/09\/Carte-Mentale-Moderne-Bleu-Creative.png 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8b566ca e-flex e-con-boxed e-con e-parent\" data-id=\"8b566ca\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6ea384b elementor-widget elementor-widget-heading\" data-id=\"6ea384b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Conclusion<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3617ec8 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"3617ec8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-01760d1 e-con-full e-flex e-con e-child\" data-id=\"01760d1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-46cb701 elementor-widget elementor-widget-text-editor\" data-id=\"46cb701\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>L\u2019intelligence artificielle s\u2019impose comme un levier incontournable pour relever les d\u00e9fis de la cybers\u00e9curit\u00e9. Elle offre des moyens puissants pour automatiser la d\u00e9tection, renforcer la r\u00e9silience des syst\u00e8mes et anticiper les nouvelles formes de menaces. Toutefois, son utilisation comporte \u00e9galement des risques, notamment face aux usages malveillants de l\u2019IA elle-m\u00eame. Dans ce contexte, l\u2019augmentation des investissements publics et priv\u00e9s traduit une prise de conscience collective : seule une approche proactive et innovante permettra de b\u00e2tir une cybers\u00e9curit\u00e9 capable de prot\u00e9ger durablement l\u2019avenir num\u00e9rique.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e1fcb10 elementor-widget elementor-widget-heading\" data-id=\"e1fcb10\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Bilan des comp\u00e9tences E5 mobilis\u00e9es<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0bdf340 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"0bdf340\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ce5ffd8 elementor-widget elementor-widget-text-editor\" data-id=\"ce5ffd8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2 data-path-to-node=\"2\">Organiser son d\u00e9veloppement professionnel<\/h2><ul data-path-to-node=\"3\"><li><p data-path-to-node=\"3,0,0\"><b data-path-to-node=\"3,0,0\" data-index-in-node=\"0\">Mettre en \u0153uvre des outils et strat\u00e9gies de veille informationnelle<\/b><\/p><\/li><li><p data-path-to-node=\"3,1,0\"><b data-path-to-node=\"3,1,0\" data-index-in-node=\"0\">Mettre en place son environnement d\u2019apprentissage personnel<\/b><\/p><\/li><\/ul><h2 data-path-to-node=\"4\">G\u00e9rer le patrimoine informatique<\/h2><ul data-path-to-node=\"5\"><li><p data-path-to-node=\"5,0,0\"><b data-path-to-node=\"5,0,0\" data-index-in-node=\"0\">Administrer des services r\u00e9seau \/ serveurs : mise en place de freshrss<\/b><\/p><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Veille technologique L&rsquo;ia dans la cybers\u00e9curit\u00e9 Pr\u00e9sentation Dans le cadre de ma veille technologique, je me suis int\u00e9ress\u00e9 \u00e0 l\u2019utilisation de l\u2019intelligence artificielle dans la cybers\u00e9curit\u00e9. Avec des menaces qui \u00e9voluent sans cesse, l\u2019IA devient un outil essentiel pour mieux prot\u00e9ger les syst\u00e8mes d\u2019information. Elle est utilis\u00e9e pour s\u00e9curiser les syst\u00e8mes d\u2019IA eux-m\u00eames, renforcer la [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-2420","page","type-page","status-publish","hentry"],"blocksy_meta":{"has_hero_section":"disabled","styles_descriptor":{"styles":{"desktop":"","tablet":"","mobile":""},"google_fonts":[],"version":6}},"_links":{"self":[{"href":"https:\/\/steven-genolet.wh-web.fr\/index.php\/wp-json\/wp\/v2\/pages\/2420","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/steven-genolet.wh-web.fr\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/steven-genolet.wh-web.fr\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/steven-genolet.wh-web.fr\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/steven-genolet.wh-web.fr\/index.php\/wp-json\/wp\/v2\/comments?post=2420"}],"version-history":[{"count":179,"href":"https:\/\/steven-genolet.wh-web.fr\/index.php\/wp-json\/wp\/v2\/pages\/2420\/revisions"}],"predecessor-version":[{"id":3137,"href":"https:\/\/steven-genolet.wh-web.fr\/index.php\/wp-json\/wp\/v2\/pages\/2420\/revisions\/3137"}],"wp:attachment":[{"href":"https:\/\/steven-genolet.wh-web.fr\/index.php\/wp-json\/wp\/v2\/media?parent=2420"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}