{"id":91,"date":"2019-06-16T15:12:55","date_gmt":"2019-06-16T14:12:55","guid":{"rendered":"https:\/\/www.cybsec.fr\/?p=91"},"modified":"2019-09-16T15:19:16","modified_gmt":"2019-09-16T14:19:16","slug":"renseignement-sur-les-menaces-lindispensable-pluralite-des-equipes","status":"publish","type":"post","link":"https:\/\/www.cybsec.fr\/index.php\/2019\/06\/16\/renseignement-sur-les-menaces-lindispensable-pluralite-des-equipes\/","title":{"rendered":"Renseignement sur les menaces : l\u2019indispensable pluralit\u00e9 des \u00e9quipes"},"content":{"rendered":"\n<p>Pas question de ne miser que sur des profils techniques, il faut aujourd\u2019hui bien plus pour pouvoir produire du renseignement contextualis\u00e9 et pertinent. Mais constituer les \u00e9quipes et les faire travailler ensemble efficacement, peut s\u2019av\u00e9rer difficile.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.lemagit.fr\/conseil\/Renseignement-sur-les-menaces-lindispensable-pluralite-des-equipes\">https:\/\/www.lemagit.fr\/conseil\/Renseignement-sur-les-menaces-lindispensable-pluralite-des-equipes<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Pas question de ne miser que sur des profils techniques, il faut aujourd\u2019hui bien plus pour pouvoir produire du renseignement contextualis\u00e9 et pertinent. Mais constituer les \u00e9quipes et les faire travailler ensemble efficacement, peut s\u2019av\u00e9rer difficile. https:\/\/www.lemagit.fr\/conseil\/Renseignement-sur-les-menaces-lindispensable-pluralite-des-equipes<\/p>\n","protected":false},"author":1,"featured_media":95,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[8],"tags":[3,9],"class_list":["post-91","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-threat-intelligence","tag-infosec","tag-threat-intel"],"_links":{"self":[{"href":"https:\/\/www.cybsec.fr\/index.php\/wp-json\/wp\/v2\/posts\/91","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybsec.fr\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybsec.fr\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybsec.fr\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybsec.fr\/index.php\/wp-json\/wp\/v2\/comments?post=91"}],"version-history":[{"count":1,"href":"https:\/\/www.cybsec.fr\/index.php\/wp-json\/wp\/v2\/posts\/91\/revisions"}],"predecessor-version":[{"id":92,"href":"https:\/\/www.cybsec.fr\/index.php\/wp-json\/wp\/v2\/posts\/91\/revisions\/92"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cybsec.fr\/index.php\/wp-json\/wp\/v2\/media\/95"}],"wp:attachment":[{"href":"https:\/\/www.cybsec.fr\/index.php\/wp-json\/wp\/v2\/media?parent=91"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybsec.fr\/index.php\/wp-json\/wp\/v2\/categories?post=91"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybsec.fr\/index.php\/wp-json\/wp\/v2\/tags?post=91"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}