{"id":222,"date":"2026-01-09T13:03:35","date_gmt":"2026-01-09T12:03:35","guid":{"rendered":"https:\/\/titouan.manach.formation-esiac.fr\/?page_id=222"},"modified":"2026-01-09T13:12:02","modified_gmt":"2026-01-09T12:12:02","slug":"veille","status":"publish","type":"page","link":"https:\/\/titouan.manach.formation-esiac.fr\/index.php\/veille\/","title":{"rendered":"Veille technologique"},"content":{"rendered":"\n<section class=\"veille-techno\" style=\"max-width:900px;margin:auto;font-family:Arial, sans-serif;line-height:1.6;\">\n\n  <p>\n    Afin de rester inform\u00e9 des \u00e9volutions technologiques, des menaces de cybers\u00e9curit\u00e9\n    et des bonnes pratiques IT, je r\u00e9alise une veille r\u00e9guli\u00e8re \u00e0 partir de sources\n    fiables et reconnues dans le domaine.\n  <\/p>\n\n  <hr>\n\n  <h2>\ud83d\udd10 Cybers\u00e9curit\u00e9 &#038; institutions officielles<\/h2>\n  <ul>\n    <li>\n      <strong>ANSSI \u2013 Agence nationale de la s\u00e9curit\u00e9 des syst\u00e8mes d\u2019information<\/strong><br>\n      <a href=\"https:\/\/www.ssi.gouv.fr\" target=\"_blank\" rel=\"noopener\">\n        https:\/\/www.ssi.gouv.fr\n      <\/a><br>\n      <em>Recommandations officielles, alertes de s\u00e9curit\u00e9, guides de bonnes pratiques.<\/em>\n    <\/li>\n\n    <li>\n      <strong>CERT-FR<\/strong><br>\n      <a href=\"https:\/\/www.cert.ssi.gouv.fr\" target=\"_blank\" rel=\"noopener\">\n        https:\/\/www.cert.ssi.gouv.fr\n      <\/a><br>\n      <em>Alertes de vuln\u00e9rabilit\u00e9s et incidents de s\u00e9curit\u00e9 en France.<\/em>\n    <\/li>\n  <\/ul>\n\n  <hr>\n\n  <h2>\ud83d\udcbb Actualit\u00e9s IT &#038; tutoriels techniques<\/h2>\n  <ul>\n    <li>\n      <strong>IT-Connect<\/strong><br>\n      <a href=\"https:\/\/www.it-connect.fr\" target=\"_blank\" rel=\"noopener\">\n        https:\/\/www.it-connect.fr\n      <\/a><br>\n      <em>Actualit\u00e9s IT, cybers\u00e9curit\u00e9, syst\u00e8mes, r\u00e9seaux et tutoriels pratiques.<\/em>\n    <\/li>\n\n    <li>\n      <strong>LeMagIT (Groupe TechTarget)<\/strong><br>\n      <a href=\"https:\/\/www.lemagit.fr\" target=\"_blank\" rel=\"noopener\">\n        https:\/\/www.lemagit.fr\n      <\/a><br>\n      <em>Analyses, tendances IT, cloud, s\u00e9curit\u00e9 et infrastructures.<\/em>\n    <\/li>\n\n    <li>\n      <strong>Developpez.com<\/strong><br>\n      <a href=\"https:\/\/www.developpez.com\" target=\"_blank\" rel=\"noopener\">\n        https:\/\/www.developpez.com\n      <\/a><br>\n      <em>Programmation, syst\u00e8mes, s\u00e9curit\u00e9 et veille technologique.<\/em>\n    <\/li>\n  <\/ul>\n\n  <hr>\n\n  <h2>\ud83c\udf10 Cybers\u00e9curit\u00e9 &#038; veille internationale<\/h2>\n  <ul>\n    <li>\n      <strong>Krebs on Security<\/strong><br>\n      <a href=\"https:\/\/krebsonsecurity.com\" target=\"_blank\" rel=\"noopener\">\n        https:\/\/krebsonsecurity.com\n      <\/a><br>\n      <em>Enqu\u00eates approfondies sur les cybermenaces et le cybercrime.<\/em>\n    <\/li>\n\n    <li>\n      <strong>The Hacker News<\/strong><br>\n      <a href=\"https:\/\/thehackernews.com\" target=\"_blank\" rel=\"noopener\">\n        https:\/\/thehackernews.com\n      <\/a><br>\n      <em>Actualit\u00e9s quotidiennes sur les vuln\u00e9rabilit\u00e9s et attaques.<\/em>\n    <\/li>\n  <\/ul>\n\n  <hr>\n\n  <h2>\ud83d\udce1 Objectifs de cette veille<\/h2>\n  <ul>\n    <li>Identifier les nouvelles vuln\u00e9rabilit\u00e9s et menaces<\/li>\n    <li>Suivre les \u00e9volutions des technologies et des outils IT<\/li>\n    <li>Appliquer les bonnes pratiques de s\u00e9curit\u00e9<\/li>\n    <li>Am\u00e9liorer continuellement mes comp\u00e9tences techniques<\/li>\n  <\/ul>\n\n  <p>\n    Cette veille technologique est mise \u00e0 jour r\u00e9guli\u00e8rement afin de rester en phase\n    avec les \u00e9volutions rapides du monde informatique.\n  <\/p>\n\n<\/section>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Afin de rester inform\u00e9 des \u00e9volutions technologiques, des menaces de cybers\u00e9curit\u00e9 et des bonnes pratiques IT, je r\u00e9alise une veille r\u00e9guli\u00e8re \u00e0 partir de sources fiables et reconnues dans le domaine. \ud83d\udd10 Cybers\u00e9curit\u00e9 &#038; institutions officielles ANSSI \u2013 Agence nationale de la s\u00e9curit\u00e9 des syst\u00e8mes d\u2019information https:\/\/www.ssi.gouv.fr Recommandations officielles, alertes de s\u00e9curit\u00e9, guides de bonnes [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-222","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/titouan.manach.formation-esiac.fr\/index.php\/wp-json\/wp\/v2\/pages\/222","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/titouan.manach.formation-esiac.fr\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/titouan.manach.formation-esiac.fr\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/titouan.manach.formation-esiac.fr\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/titouan.manach.formation-esiac.fr\/index.php\/wp-json\/wp\/v2\/comments?post=222"}],"version-history":[{"count":6,"href":"https:\/\/titouan.manach.formation-esiac.fr\/index.php\/wp-json\/wp\/v2\/pages\/222\/revisions"}],"predecessor-version":[{"id":229,"href":"https:\/\/titouan.manach.formation-esiac.fr\/index.php\/wp-json\/wp\/v2\/pages\/222\/revisions\/229"}],"wp:attachment":[{"href":"https:\/\/titouan.manach.formation-esiac.fr\/index.php\/wp-json\/wp\/v2\/media?parent=222"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}