{"version":"1.0","provider_name":"Cohesity","provider_url":"https:\/\/www.cohesity.com\/fr\/","author_name":"Sara Hunter","author_url":"https:\/\/www.cohesity.com\/fr\/blogs\/author\/sara-hunter\/","title":"Rapport sur l\u2019\u00e9tat de la s\u00e9curit\u00e9 des donn\u00e9es - D\u00e9couvrez les tendances en mati\u00e8re de ransomware","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"lwBFgekFNe\"><a href=\"https:\/\/www.cohesity.com\/fr\/dm\/can-you-defy-these-global-ransomware-trends\/\">Pouvez-vous d\u00e9fier ces tendances mondiales en mati\u00e8re de ransomware\u00a0?<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.cohesity.com\/fr\/dm\/can-you-defy-these-global-ransomware-trends\/embed\/#?secret=lwBFgekFNe\" width=\"600\" height=\"338\" title=\"&#8220;Pouvez-vous d\u00e9fier ces tendances mondiales en mati\u00e8re de ransomware\u00a0?&#8221; &#8212; Cohesity\" data-secret=\"lwBFgekFNe\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","description":"Le deuxi\u00e8me rapport annuel sur l\u2019\u00e9tat de la s\u00e9curit\u00e9 et de la gestion des donn\u00e9es r\u00e9v\u00e8le les principaux r\u00e9sultats de l\u2019enqu\u00eate et donne des informations sur les tendances, les pr\u00e9occupations et les nouvelles solutions en mati\u00e8re de ransomware.","thumbnail_url":"https:\/\/www.cohesity.com\/wp-content\/new_media\/2020\/10\/cohesity-logo-new.jpg","thumbnail_width":800,"thumbnail_height":401}