{"version":"1.0","provider_name":"Tessi International","provider_url":"https:\/\/www.tessi.eu\/fr\/","title":"La cybers\u00e9curit\u00e9 c\u00f4t\u00e9 documents et \u00e9changes \u00e9lectroniques","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"aBp0Mr4Stt\"><a href=\"https:\/\/www.tessi.eu\/fr\/la-cybersecurite-cote-documents-et-echanges-electroniques\/\">La cybers\u00e9curit\u00e9 c\u00f4t\u00e9 documents et \u00e9changes \u00e9lectroniques<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.tessi.eu\/fr\/la-cybersecurite-cote-documents-et-echanges-electroniques\/embed\/#?secret=aBp0Mr4Stt\" width=\"600\" height=\"338\" title=\"\u00ab\u00a0La cybers\u00e9curit\u00e9 c\u00f4t\u00e9 documents et \u00e9changes \u00e9lectroniques\u00a0\u00bb &#8212; Tessi International\" data-secret=\"aBp0Mr4Stt\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.tessi.eu\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/tessi.on-web.fr\/wp-content\/uploads\/2023\/04\/bg-cybersecurite.png","thumbnail_width":1440,"thumbnail_height":565,"description":"Tribune d&rsquo;Arnauld Dubois, CEO de CERTIGNA &nbsp; La cybers\u00e9curit\u00e9 est un sujet strat\u00e9gique pour l\u2019ensemble des entreprises et des administrations qui d\u00e9ploient une \u00e9nergie consid\u00e9rable pour mettre en \u0153uvre des dispositifs afin de se prot\u00e9ger efficacement. Dans ce contexte, la cybers\u00e9curit\u00e9 rev\u00eat diff\u00e9rents visages en fonction du sujet qu\u2019elle aborde. Dans notre cas, nous allons [&hellip;]"}