{"id":44,"date":"2024-06-14T14:27:15","date_gmt":"2024-06-14T12:27:15","guid":{"rendered":"http:\/\/axeloudet.ovh\/?page_id=44"},"modified":"2025-05-22T10:23:00","modified_gmt":"2025-05-22T08:23:00","slug":"veille-technologique","status":"publish","type":"page","link":"https:\/\/axeloudet.ovh\/index.php\/veille-technologique\/","title":{"rendered":"Veille technologique"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"44\" class=\"elementor elementor-44\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7fefee2 e-flex e-con-boxed e-con e-parent\" data-id=\"7fefee2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-db82b06 elementor-widget elementor-widget-text-editor\" data-id=\"db82b06\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\"\" data-start=\"56\" data-end=\"100\"><strong data-start=\"56\" data-end=\"100\">\u00c9l\u00e9ments cl\u00e9s de ma veille technologique<\/strong><\/p><p class=\"\" data-start=\"102\" data-end=\"681\">La veille technologique consiste \u00e0 organiser de mani\u00e8re syst\u00e9matique la collecte, l&#8217;analyse et la diffusion d&#8217;informations techniques indispensables \u00e0 la protection et au d\u00e9veloppement des entreprises. Elle permet d&#8217;anticiper les \u00e9volutions, d&#8217;identifier les innovations et de saisir les opportunit\u00e9s technologiques et strat\u00e9giques. Les acteurs de la veille peuvent provenir de diff\u00e9rents services tels que la R&amp;D, le marketing ou encore le support client. Cet outil est essentiel pour anticiper les mouvements de la concurrence et maintenir une position de pointe sur le march\u00e9.<\/p><p class=\"\" data-start=\"683\" data-end=\"1003\">Durant mes deux ann\u00e9es de BTS SIO, j&#8217;ai choisi d&#8217;orienter ma veille vers la s\u00e9curit\u00e9 du cloud. Pour rester inform\u00e9, j&#8217;ai utilis\u00e9 des flux RSS, effectu\u00e9 des recherches quotidiennes via Google Actualit\u00e9s et Bing Actualit\u00e9s, et mis en place des alertes Google sur des mots-cl\u00e9s sp\u00e9cifiques : Cloud, S\u00e9curit\u00e9, Cybers\u00e9curit\u00e9.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-be0c53e e-flex e-con-boxed e-con e-parent\" data-id=\"be0c53e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7c8d439 elementor-widget elementor-widget-heading\" data-id=\"7c8d439\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Le ransomware Qilin class\u00e9 au premier rang en avril 2025 avec 72 divulgations de fuites de donn\u00e9es<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-eb36bb3 e-flex e-con-boxed e-con e-parent\" data-id=\"eb36bb3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-e9aa3ef e-con-full e-flex e-con e-child\" data-id=\"e9aa3ef\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-61585d3 elementor-widget elementor-widget-text-editor\" data-id=\"61585d3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Le groupe Qilin a \u00e9t\u00e9 responsable de 72 fuites de donn\u00e9es en avril, utilisant des outils tels que SmokeLoader et un nouveau chargeur .NET nomm\u00e9 NETXLOADER.<\/p><p><a href=\"https:\/\/thehackernews.com\/2025\/05\/qilin-leads-april-2025-ransomware-spike.html\">Liens de l&#8217;article<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-607864b e-con-full e-flex e-con e-child\" data-id=\"607864b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8892331 elementor-widget elementor-widget-image\" data-id=\"8892331\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEihjhe2MNaSl0f9rCPDdH_wUxL-qOlbxGyIZPRZJOuF-Ihyphenhyphen7XjB90Mewqlsa4v77ryVyun6haf0_vYpaF6M3HW8RuRasCn9Siva0Rp_CloNr_BQHp0Z0uk8yX-mq2tyPET7q9jwanj-k8XPIGWfNJ5nphrE2FGFJqqn1MIbHnPgyuE6DZDsKh3XRXeFF_-z\/s728-rw-e365\/ransomware-malware-code.jpg\" title=\"\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7ea0b96 e-flex e-con-boxed e-con e-parent\" data-id=\"7ea0b96\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d76e4fb elementor-widget elementor-widget-heading\" data-id=\"d76e4fb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"> Patch d'avril 2025 121 vuln\u00e9rabilit\u00e9s corrig\u00e9es par Microsoft<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3c4ff3f e-flex e-con-boxed e-con e-parent\" data-id=\"3c4ff3f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-9207e7f e-con-full e-flex e-con e-child\" data-id=\"9207e7f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ba9fd64 elementor-widget elementor-widget-text-editor\" data-id=\"ba9fd64\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Lors de son cycle de mises \u00e0 jour mensuel, Microsoft a corrig\u00e9 <strong data-start=\"63\" data-end=\"85\">121 vuln\u00e9rabilit\u00e9s<\/strong>, dont <strong data-start=\"92\" data-end=\"108\">11 critiques<\/strong> et une faille zero-day activement exploit\u00e9e. Les produits concern\u00e9s incluent Windows, Office et Azure. Il est fortement recommand\u00e9 d&#8217;appliquer ces correctifs rapidement pour assurer la s\u00e9curit\u00e9 des syst\u00e8mes.<\/p><p><a href=\"https:\/\/www.crowdstrike.com\/en-us\/blog\/patch-tuesday-analysis-april-2025\/?utm_source=chatgpt.com\">Liens vers l&#8217;article<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-990a126 e-con-full e-flex e-con e-child\" data-id=\"990a126\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-43c283b elementor-widget elementor-widget-image\" data-id=\"43c283b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.crowdstrike.com\/content\/dam\/crowdstrike\/marketing\/en-us\/images\/blog\/main-images\/exposure-management\/Blog-PT-2025.png\" title=\"\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b892b9a e-flex e-con-boxed e-con e-parent\" data-id=\"b892b9a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0be26dc elementor-widget elementor-widget-heading\" data-id=\"0be26dc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Augmentation des attaques de phishing via QR codes<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0c453ba e-flex e-con-boxed e-con e-parent\" data-id=\"0c453ba\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-870a358 e-con-full e-flex e-con e-child\" data-id=\"870a358\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5f3a2ad elementor-widget elementor-widget-image\" data-id=\"5f3a2ad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/11\/Picture1.webp\" title=\"\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f946b6e e-con-full e-flex e-con e-child\" data-id=\"f946b6e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b5cfe80 elementor-widget elementor-widget-text-editor\" data-id=\"b5cfe80\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Les cybercriminels exploitent de plus en plus les <strong data-start=\"50\" data-end=\"62\">QR codes<\/strong> pour mener des campagnes de phishing, ciblant notamment les utilisateurs de Microsoft 365. Ces attaques, appel\u00e9es &#8220;quishing&#8221;, utilisent des QR codes int\u00e9gr\u00e9s dans des e-mails ou des documents PDF pour rediriger les victimes vers des sites malveillants. Microsoft a renforc\u00e9 ses outils de s\u00e9curit\u00e9 pour d\u00e9tecter et bloquer ces menaces<\/p><p><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/11\/04\/how-microsoft-defender-for-office-365-innovated-to-address-qr-code-phishing-attacks\/\">Lien vers l&#8217;article<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e3c95d1 e-flex e-con-boxed e-con e-parent\" data-id=\"e3c95d1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9c456b4 elementor-widget elementor-widget-heading\" data-id=\"9c456b4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Attaque de XZ le 29 Mars 2024\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d41cd48 e-flex e-con-boxed e-con e-parent\" data-id=\"d41cd48\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-80f66a0 e-con-full e-flex e-con e-child\" data-id=\"80f66a0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e347300 elementor-widget elementor-widget-text-editor\" data-id=\"e347300\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out\">Le 29 mars 2024, Andres Freund, ing\u00e9nieur chez Microsoft, a identifi\u00e9 une anomalie sur Debian Sid : des connexions SSH pr\u00e9sentaient une consommation CPU anormalement \u00e9lev\u00e9e et des retards inexpliqu\u00e9s.<\/span> <span class=\"relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out\">Son investigation a r\u00e9v\u00e9l\u00e9 l&#8217;existence d&#8217;une porte d\u00e9rob\u00e9e dans les versions 5.6.0 et 5.6.1 de XZ Utils, introduite par un contributeur nomm\u00e9 &#8220;Jia Tan&#8221;<\/span><\/p><p><strong><a href=\"https:\/\/fr.wikipedia.org\/wiki\/Attaque_de_XZ_Utils_par_porte_d%C3%A9rob%C3%A9e\">https:\/\/fr.wikipedia.org\/wiki\/Attaque_de_XZ_Utils_par_porte_d%C3%A9rob%C3%A9e<\/a><\/strong><\/p><p><strong><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/cve-2024-3094\">https:\/\/nvd.nist.gov\/vuln\/detail\/cve-2024-3094<\/a><\/strong><\/p><p><span class=\"relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out\">\u00a0<\/span><\/p><p><span class=\"relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-41f07c2 e-con-full e-flex e-con e-child\" data-id=\"41f07c2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-110a97b elementor-widget elementor-widget-video\" data-id=\"110a97b\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/www.youtube.com\\\/watch?v=Q5a92asc7hM&amp;ab_channel=cocadmin&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-655a1ee e-flex e-con-boxed e-con e-parent\" data-id=\"655a1ee\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-55d316d elementor-widget elementor-widget-heading\" data-id=\"55d316d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Mes Flux RSS<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-06a0713 e-con-full e-flex e-con e-parent\" data-id=\"06a0713\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ed03cad elementor-widget__width-initial elementor-widget elementor-widget-feedzy-rss-feeds\" data-id=\"ed03cad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"feedzy-rss-feeds.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"feedzy-b5f10c3de140fe877c711a14ca1aae6f feedzy-rss\"><ul><\/ul> <\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-321b12f elementor-widget elementor-widget-feedzy-rss-feeds\" data-id=\"321b12f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"feedzy-rss-feeds.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"feedzy-f0c83300cdcbaae0b2e1d1d56605c7f5 feedzy-rss\"><ul><li  style=\"padding: 15px 0 25px\" class=\"rss_item\"><span class=\"title\"><a href=\"https:\/\/www.cert.ssi.gouv.fr\/avis\/CERTFR-2026-AVI-0542\/\" target=\"\" rel=\" noopener\">Multiples vuln\u00e9rabilit\u00e9s dans Progress Telerik (06 mai 2026)<\/a><\/span><div class=\"rss_content\" style=\"\"><p>De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Progress Telerik. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance et un d\u00e9ni de service \u00e0 distance.<\/p><\/div><\/li><li  style=\"padding: 15px 0 25px\" class=\"rss_item\"><span class=\"title\"><a href=\"https:\/\/www.cert.ssi.gouv.fr\/avis\/CERTFR-2026-AVI-0536\/\" target=\"\" rel=\" noopener\">Multiples vuln\u00e9rabilit\u00e9s dans Redis (06 mai 2026)<\/a><\/span><div class=\"rss_content\" style=\"\"><p>De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Redis. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance.<\/p><\/div><\/li><li  style=\"padding: 15px 0 25px\" class=\"rss_item\"><span class=\"title\"><a href=\"https:\/\/www.cert.ssi.gouv.fr\/avis\/CERTFR-2026-AVI-0540\/\" target=\"\" rel=\" noopener\">Multiples vuln\u00e9rabilit\u00e9s dans VMware Tanzu Gemfire (06 mai 2026)<\/a><\/span><div class=\"rss_content\" style=\"\"><p>De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans VMware Tanzu Gemfire. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l'\u00e9diteur.<\/p><\/div><\/li><\/ul> <\/div><style type=\"text\/css\" media=\"all\">.feedzy-rss .rss_item .rss_image{float:left;position:relative;border:none;text-decoration:none;max-width:100%}.feedzy-rss .rss_item .rss_image span{display:inline-block;position:absolute;width:100%;height:100%;background-position:50%;background-size:cover}.feedzy-rss .rss_item .rss_image{margin:.3em 1em 0 0;content-visibility:auto}.feedzy-rss ul{list-style:none}.feedzy-rss ul li{display:inline-block}<\/style>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-dc462dd e-flex e-con-boxed e-con e-parent\" data-id=\"dc462dd\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>\u00c9l\u00e9ments cl\u00e9s de ma veille technologique La veille technologique consiste \u00e0 organiser de mani\u00e8re syst\u00e9matique la collecte, l&#8217;analyse et la diffusion d&#8217;informations techniques indispensables \u00e0 la protection et au d\u00e9veloppement des entreprises. Elle permet d&#8217;anticiper les \u00e9volutions, d&#8217;identifier les innovations et de saisir les opportunit\u00e9s technologiques et strat\u00e9giques. Les acteurs de la veille peuvent provenir [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_eb_attr":"","ocean_post_layout":"","ocean_both_sidebars_style":"","ocean_both_sidebars_content_width":0,"ocean_both_sidebars_sidebars_width":0,"ocean_sidebar":"","ocean_second_sidebar":"","ocean_disable_margins":"enable","ocean_add_body_class":"","ocean_shortcode_before_top_bar":"","ocean_shortcode_after_top_bar":"","ocean_shortcode_before_header":"","ocean_shortcode_after_header":"","ocean_has_shortcode":"","ocean_shortcode_after_title":"","ocean_shortcode_before_footer_widgets":"","ocean_shortcode_after_footer_widgets":"","ocean_shortcode_before_footer_bottom":"","ocean_shortcode_after_footer_bottom":"","ocean_display_top_bar":"default","ocean_display_header":"default","ocean_header_style":"","ocean_center_header_left_menu":"","ocean_custom_header_template":"","ocean_custom_logo":0,"ocean_custom_retina_logo":0,"ocean_custom_logo_max_width":0,"ocean_custom_logo_tablet_max_width":0,"ocean_custom_logo_mobile_max_width":0,"ocean_custom_logo_max_height":0,"ocean_custom_logo_tablet_max_height":0,"ocean_custom_logo_mobile_max_height":0,"ocean_header_custom_menu":"","ocean_menu_typo_font_family":"","ocean_menu_typo_font_subset":"","ocean_menu_typo_font_size":0,"ocean_menu_typo_font_size_tablet":0,"ocean_menu_typo_font_size_mobile":0,"ocean_menu_typo_font_size_unit":"px","ocean_menu_typo_font_weight":"","ocean_menu_typo_font_weight_tablet":"","ocean_menu_typo_font_weight_mobile":"","ocean_menu_typo_transform":"","ocean_menu_typo_transform_tablet":"","ocean_menu_typo_transform_mobile":"","ocean_menu_typo_line_height":0,"ocean_menu_typo_line_height_tablet":0,"ocean_menu_typo_line_height_mobile":0,"ocean_menu_typo_line_height_unit":"","ocean_menu_typo_spacing":0,"ocean_menu_typo_spacing_tablet":0,"ocean_menu_typo_spacing_mobile":0,"ocean_menu_typo_spacing_unit":"","ocean_menu_link_color":"","ocean_menu_link_color_hover":"","ocean_menu_link_color_active":"","ocean_menu_link_background":"","ocean_menu_link_hover_background":"","ocean_menu_link_active_background":"","ocean_menu_social_links_bg":"","ocean_menu_social_hover_links_bg":"","ocean_menu_social_links_color":"","ocean_menu_social_hover_links_color":"","ocean_disable_title":"default","ocean_disable_heading":"default","ocean_post_title":"","ocean_post_subheading":"","ocean_post_title_style":"","ocean_post_title_background_color":"","ocean_post_title_background":0,"ocean_post_title_bg_image_position":"","ocean_post_title_bg_image_attachment":"","ocean_post_title_bg_image_repeat":"","ocean_post_title_bg_image_size":"","ocean_post_title_height":0,"ocean_post_title_bg_overlay":0.5,"ocean_post_title_bg_overlay_color":"","ocean_disable_breadcrumbs":"default","ocean_breadcrumbs_color":"","ocean_breadcrumbs_separator_color":"","ocean_breadcrumbs_links_color":"","ocean_breadcrumbs_links_hover_color":"","ocean_display_footer_widgets":"default","ocean_display_footer_bottom":"default","ocean_custom_footer_template":"","footnotes":""},"class_list":["post-44","page","type-page","status-publish","hentry","entry"],"_links":{"self":[{"href":"https:\/\/axeloudet.ovh\/index.php\/wp-json\/wp\/v2\/pages\/44","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/axeloudet.ovh\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/axeloudet.ovh\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/axeloudet.ovh\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/axeloudet.ovh\/index.php\/wp-json\/wp\/v2\/comments?post=44"}],"version-history":[{"count":50,"href":"https:\/\/axeloudet.ovh\/index.php\/wp-json\/wp\/v2\/pages\/44\/revisions"}],"predecessor-version":[{"id":740,"href":"https:\/\/axeloudet.ovh\/index.php\/wp-json\/wp\/v2\/pages\/44\/revisions\/740"}],"wp:attachment":[{"href":"https:\/\/axeloudet.ovh\/index.php\/wp-json\/wp\/v2\/media?parent=44"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}