{"id":43823,"date":"2014-11-25T00:00:00","date_gmt":"2014-11-25T00:00:00","guid":{"rendered":"https:\/\/www.colt.net\/resources\/en-entreprise-les-pirates-deviennent-ethiques\/"},"modified":"2014-11-25T00:00:00","modified_gmt":"2014-11-25T00:00:00","slug":"en-entreprise-les-pirates-deviennent-ethiques","status":"publish","type":"post","link":"https:\/\/legacy.colt.net\/fr\/resources\/en-entreprise-les-pirates-deviennent-ethiques\/","title":{"rendered":"En entreprise les pirates deviennent \u00e9thiques"},"content":{"rendered":"<p>\u00c0 l&#8217;heure o\u00f9 les alertes d&#8217;attaques informatiques continuent de se r\u00e9pandre dans toute l&#8217;Europe, les questions de s\u00e9curit\u00e9 redeviennent une priorit\u00e9 pour les entreprises. Certaines grandes entreprises ont pris des mesures drastiques pour se prot\u00e9ger des attaques.<a href=\"https:\/\/www.information-age.com\/technology\/security\/1275753\/virgin-media-enlists-white-hat-hackers-to-fight-botnets\" target=\"_blank\" rel=\"noopener noreferrer\"> Virgin Media<\/a>, par exemple, a recrut\u00e9 des <strong>\u00ab chapeaux blancs \u00bb, des pirates \u00e9thiques charg\u00e9s d&#8217;attaquer leur propre entreprise<\/strong>. L&#8217;entreprise identifie ainsi les failles potentielles de son propre syst\u00e8me avant que les vrais pirates, ou \u00ab chapeaux noirs \u00bb, ne les attaquent. Les conclusions du groupe ont permis de modifier la mani\u00e8re dont les comptes de messagerie ou les num\u00e9ros de cartes bancaires sont prot\u00e9g\u00e9s contre les attaques informatiques et ce jusqu&#8217;aux distributeurs automatiques et aux appareils m\u00e9dicaux.<\/p>\n<p>Alors que de plus en plus d\u2019entreprises, quel que soit leur effectif, s&#8217;appuient plus fortement sur les technologies telles que le Cloud, elles s&#8217;exposent plus massivement aux attaques. <strong>Quels enseignements les PME peuvent-elles tirer des grands groupes ?<\/strong> Peuvent-elles aussi recruter des \u00ab chapeaux blancs \u00bb pour se prot\u00e9ger ?<\/p>\n<p>Ces pirates \u00e9thiques cherchent \u00e0 identifier les faiblesses num\u00e9riques des entreprises et les aident \u00e0 comprendre la nature des attaques informatiques et les risques correspondant.<strong> Ils sont capables de rep\u00e9rer des failles que les \u00e9quipes de s\u00e9curit\u00e9 n&#8217;ont pas identifi\u00e9es<\/strong> et peuvent indiquer aux entreprises comment les pirates se fraient un chemin sur le r\u00e9seau.<\/p>\n<p>L&#8217;\u00e9mergence des technologies qui facilitent des conditions de travail plus souples et l&#8217;acc\u00e8s aux syst\u00e8mes en dehors du firewall des entreprises, telles que le Cloud, les smartphones, les tablettes et m\u00eame les accessoires interactifs, facilitent l&#8217;acc\u00e8s et l&#8217;exploitation ill\u00e9gaux des donn\u00e9es sensibles. On pourrait supposer que les petites entreprises dont le budget de s\u00e9curit\u00e9 IT est limit\u00e9 sont les plus expos\u00e9es au risque d&#8217;attaque. Pourtant, toutes les entreprises continuent de se battre pour s\u00e9curiser leurs donn\u00e9es et parer aux failles de leurs syst\u00e8mes. <a href=\"https:\/\/www.mcafee.com\/uk\/resources\/reports\/rp-economic-impact-cybercrime2.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Une r\u00e9cente \u00e9tude<\/a> indique que <strong>certaines entreprises europ\u00e9ennes, en particulier en Allemagne et aux Pays-Bas, sont largement cibl\u00e9es par les attaques informatiques, \u00e0 commencer par les secteurs de la revente et de la technologie.<\/strong><\/p>\n<p>Si toutes les PME ne peuvent pas employer des \u00ab chapeaux blancs \u00bb \u00e0 temps plein, il ne fait aucun doute que la fr\u00e9quence et la gravit\u00e9 des attaques informatiques s&#8217;intensifient. Pour cela, toutes les entreprises, petites et grandes, devraient r\u00e9aliser une analyse approfondie de leurs syst\u00e8mes au moins une fois par an, en particulier si elles ont modifi\u00e9 leur infrastructure IT. Le recours \u00e0 l&#8217;expertise de pirates \u00e9thiques peut aider les entreprises \u00e0 anticiper les attaques informatiques.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u00c0 l&#8217;heure o\u00f9 les alertes d&#8217;attaques informatiques continuent de se r\u00e9pandre dans toute l&#8217;Europe, les questions de s\u00e9curit\u00e9 redeviennent une priorit\u00e9 pour les entreprises. Certaines grandes entreprises ont pris des mesures drastiques pour se prot\u00e9ger des attaques. Virgin Media, par exemple, a recrut\u00e9 des \u00ab chapeaux blancs \u00bb, des pirates \u00e9thiques charg\u00e9s d&#8217;attaquer leur propre&#8230;<\/p>\n","protected":false},"author":112,"featured_media":39270,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"colt_type":[],"colt_ind":[],"colt_products":[],"colt_solutions":[],"class_list":["post-43823","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>En entreprise les pirates deviennent \u00e9thiques - Colt Technology Services<\/title>\n<meta name=\"description\" content=\"En entreprise les pirates deviennent \u00e9thiques Colt Technology Services\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"En entreprise les pirates deviennent \u00e9thiques - Colt Technology Services\" \/>\n<meta property=\"og:description\" content=\"En entreprise les pirates deviennent \u00e9thiques Colt Technology Services\" \/>\n<meta property=\"og:url\" content=\"https:\/\/legacy.colt.net\/fr\/resources\/en-entreprise-les-pirates-deviennent-ethiques\/\" \/>\n<meta property=\"og:site_name\" content=\"Colt Technology Services\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ColtTechnologyServices\/\" \/>\n<meta property=\"article:published_time\" content=\"2014-11-25T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/legacy.colt.net\/wp-content\/uploads\/2019\/03\/175752993.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"718\" \/>\n\t<meta property=\"og:image:height\" content=\"360\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Make Do\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/legacy.colt.net\/wp-content\/uploads\/2019\/03\/175752993.jpg\" \/>\n<meta name=\"twitter:creator\" content=\"@colt_technology\" \/>\n<meta name=\"twitter:site\" content=\"@colt_technology\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Make Do\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/legacy.colt.net\/fr\/resources\/en-entreprise-les-pirates-deviennent-ethiques\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/legacy.colt.net\/fr\/resources\/en-entreprise-les-pirates-deviennent-ethiques\/\"},\"author\":{\"name\":\"Make Do\",\"@id\":\"https:\/\/legacy.colt.net\/#\/schema\/person\/71cb803a99c6757c1c6940a6f0683e57\"},\"headline\":\"En entreprise les pirates deviennent \u00e9thiques\",\"datePublished\":\"2014-11-25T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/legacy.colt.net\/fr\/resources\/en-entreprise-les-pirates-deviennent-ethiques\/\"},\"wordCount\":454,\"publisher\":{\"@id\":\"https:\/\/legacy.colt.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/legacy.colt.net\/fr\/resources\/en-entreprise-les-pirates-deviennent-ethiques\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/legacy.colt.net\/wp-content\/uploads\/2019\/03\/175752993.jpg\",\"articleSection\":[\"Prot\u00e9ger\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/legacy.colt.net\/fr\/resources\/en-entreprise-les-pirates-deviennent-ethiques\/\",\"url\":\"https:\/\/legacy.colt.net\/fr\/resources\/en-entreprise-les-pirates-deviennent-ethiques\/\",\"name\":\"En entreprise les pirates deviennent \u00e9thiques - Colt Technology Services\",\"isPartOf\":{\"@id\":\"https:\/\/legacy.colt.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/legacy.colt.net\/fr\/resources\/en-entreprise-les-pirates-deviennent-ethiques\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/legacy.colt.net\/fr\/resources\/en-entreprise-les-pirates-deviennent-ethiques\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/legacy.colt.net\/wp-content\/uploads\/2019\/03\/175752993.jpg\",\"datePublished\":\"2014-11-25T00:00:00+00:00\",\"description\":\"En entreprise les pirates deviennent \u00e9thiques Colt Technology Services\",\"breadcrumb\":{\"@id\":\"https:\/\/legacy.colt.net\/fr\/resources\/en-entreprise-les-pirates-deviennent-ethiques\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/legacy.colt.net\/fr\/resources\/en-entreprise-les-pirates-deviennent-ethiques\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/legacy.colt.net\/fr\/resources\/en-entreprise-les-pirates-deviennent-ethiques\/#primaryimage\",\"url\":\"https:\/\/legacy.colt.net\/wp-content\/uploads\/2019\/03\/175752993.jpg\",\"contentUrl\":\"https:\/\/legacy.colt.net\/wp-content\/uploads\/2019\/03\/175752993.jpg\",\"width\":718,\"height\":360},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/legacy.colt.net\/fr\/resources\/en-entreprise-les-pirates-deviennent-ethiques\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/legacy.colt.net\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"En entreprise les pirates deviennent \u00e9thiques\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/legacy.colt.net\/#website\",\"url\":\"https:\/\/legacy.colt.net\/\",\"name\":\"Colt\u30c6\u30af\u30ce\u30ed\u30b8\u30fc\u30b5\u30fc\u30d3\u30b9\u682a\u5f0f\u4f1a\u793e\",\"description\":\"Managed Network &amp; Voice Services Provider\",\"publisher\":{\"@id\":\"https:\/\/legacy.colt.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/legacy.colt.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/legacy.colt.net\/#organization\",\"name\":\"Colt Technology Services\",\"url\":\"https:\/\/legacy.colt.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/legacy.colt.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/legacy.colt.net\/wp-content\/uploads\/2019\/02\/Colt-Logo.png\",\"contentUrl\":\"https:\/\/legacy.colt.net\/wp-content\/uploads\/2019\/02\/Colt-Logo.png\",\"width\":195,\"height\":77,\"caption\":\"Colt Technology Services\"},\"image\":{\"@id\":\"https:\/\/legacy.colt.net\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ColtTechnologyServices\/\",\"https:\/\/x.com\/colt_technology\",\"https:\/\/www.instagram.com\/colttechnologyservices\/\",\"https:\/\/www.linkedin.com\/company\/colt-technology-services\",\"https:\/\/www.youtube.com\/user\/ColtTechnology\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/legacy.colt.net\/#\/schema\/person\/71cb803a99c6757c1c6940a6f0683e57\",\"name\":\"Make Do\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/legacy.colt.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/fe73597d3286e48e5f95eb7e1bd97ea091a03336686cad88ca44eadaa6287761?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/fe73597d3286e48e5f95eb7e1bd97ea091a03336686cad88ca44eadaa6287761?s=96&d=mm&r=g\",\"caption\":\"Make Do\"},\"sameAs\":[\"https:\/\/makedo.net\"],\"url\":\"https:\/\/legacy.colt.net\/fr\/resources\/author\/makedo\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"En entreprise les pirates deviennent \u00e9thiques - Colt Technology Services","description":"En entreprise les pirates deviennent \u00e9thiques Colt Technology Services","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"fr_FR","og_type":"article","og_title":"En entreprise les pirates deviennent \u00e9thiques - Colt Technology Services","og_description":"En entreprise les pirates deviennent \u00e9thiques Colt Technology Services","og_url":"https:\/\/legacy.colt.net\/fr\/resources\/en-entreprise-les-pirates-deviennent-ethiques\/","og_site_name":"Colt Technology Services","article_publisher":"https:\/\/www.facebook.com\/ColtTechnologyServices\/","article_published_time":"2014-11-25T00:00:00+00:00","og_image":[{"width":718,"height":360,"url":"https:\/\/legacy.colt.net\/wp-content\/uploads\/2019\/03\/175752993.jpg","type":"image\/jpeg"}],"author":"Make Do","twitter_card":"summary_large_image","twitter_image":"https:\/\/legacy.colt.net\/wp-content\/uploads\/2019\/03\/175752993.jpg","twitter_creator":"@colt_technology","twitter_site":"@colt_technology","twitter_misc":{"Written by":"Make Do","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/legacy.colt.net\/fr\/resources\/en-entreprise-les-pirates-deviennent-ethiques\/#article","isPartOf":{"@id":"https:\/\/legacy.colt.net\/fr\/resources\/en-entreprise-les-pirates-deviennent-ethiques\/"},"author":{"name":"Make Do","@id":"https:\/\/legacy.colt.net\/#\/schema\/person\/71cb803a99c6757c1c6940a6f0683e57"},"headline":"En entreprise les pirates deviennent \u00e9thiques","datePublished":"2014-11-25T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/legacy.colt.net\/fr\/resources\/en-entreprise-les-pirates-deviennent-ethiques\/"},"wordCount":454,"publisher":{"@id":"https:\/\/legacy.colt.net\/#organization"},"image":{"@id":"https:\/\/legacy.colt.net\/fr\/resources\/en-entreprise-les-pirates-deviennent-ethiques\/#primaryimage"},"thumbnailUrl":"https:\/\/legacy.colt.net\/wp-content\/uploads\/2019\/03\/175752993.jpg","articleSection":["Prot\u00e9ger"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/legacy.colt.net\/fr\/resources\/en-entreprise-les-pirates-deviennent-ethiques\/","url":"https:\/\/legacy.colt.net\/fr\/resources\/en-entreprise-les-pirates-deviennent-ethiques\/","name":"En entreprise les pirates deviennent \u00e9thiques - Colt Technology Services","isPartOf":{"@id":"https:\/\/legacy.colt.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/legacy.colt.net\/fr\/resources\/en-entreprise-les-pirates-deviennent-ethiques\/#primaryimage"},"image":{"@id":"https:\/\/legacy.colt.net\/fr\/resources\/en-entreprise-les-pirates-deviennent-ethiques\/#primaryimage"},"thumbnailUrl":"https:\/\/legacy.colt.net\/wp-content\/uploads\/2019\/03\/175752993.jpg","datePublished":"2014-11-25T00:00:00+00:00","description":"En entreprise les pirates deviennent \u00e9thiques Colt Technology Services","breadcrumb":{"@id":"https:\/\/legacy.colt.net\/fr\/resources\/en-entreprise-les-pirates-deviennent-ethiques\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/legacy.colt.net\/fr\/resources\/en-entreprise-les-pirates-deviennent-ethiques\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/legacy.colt.net\/fr\/resources\/en-entreprise-les-pirates-deviennent-ethiques\/#primaryimage","url":"https:\/\/legacy.colt.net\/wp-content\/uploads\/2019\/03\/175752993.jpg","contentUrl":"https:\/\/legacy.colt.net\/wp-content\/uploads\/2019\/03\/175752993.jpg","width":718,"height":360},{"@type":"BreadcrumbList","@id":"https:\/\/legacy.colt.net\/fr\/resources\/en-entreprise-les-pirates-deviennent-ethiques\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/legacy.colt.net\/fr\/"},{"@type":"ListItem","position":2,"name":"En entreprise les pirates deviennent \u00e9thiques"}]},{"@type":"WebSite","@id":"https:\/\/legacy.colt.net\/#website","url":"https:\/\/legacy.colt.net\/","name":"Colt\u30c6\u30af\u30ce\u30ed\u30b8\u30fc\u30b5\u30fc\u30d3\u30b9\u682a\u5f0f\u4f1a\u793e","description":"Managed Network &amp; Voice Services Provider","publisher":{"@id":"https:\/\/legacy.colt.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/legacy.colt.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/legacy.colt.net\/#organization","name":"Colt Technology Services","url":"https:\/\/legacy.colt.net\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/legacy.colt.net\/#\/schema\/logo\/image\/","url":"https:\/\/legacy.colt.net\/wp-content\/uploads\/2019\/02\/Colt-Logo.png","contentUrl":"https:\/\/legacy.colt.net\/wp-content\/uploads\/2019\/02\/Colt-Logo.png","width":195,"height":77,"caption":"Colt Technology Services"},"image":{"@id":"https:\/\/legacy.colt.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ColtTechnologyServices\/","https:\/\/x.com\/colt_technology","https:\/\/www.instagram.com\/colttechnologyservices\/","https:\/\/www.linkedin.com\/company\/colt-technology-services","https:\/\/www.youtube.com\/user\/ColtTechnology"]},{"@type":"Person","@id":"https:\/\/legacy.colt.net\/#\/schema\/person\/71cb803a99c6757c1c6940a6f0683e57","name":"Make Do","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/legacy.colt.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/fe73597d3286e48e5f95eb7e1bd97ea091a03336686cad88ca44eadaa6287761?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fe73597d3286e48e5f95eb7e1bd97ea091a03336686cad88ca44eadaa6287761?s=96&d=mm&r=g","caption":"Make Do"},"sameAs":["https:\/\/makedo.net"],"url":"https:\/\/legacy.colt.net\/fr\/resources\/author\/makedo\/"}]}},"_links":{"self":[{"href":"https:\/\/legacy.colt.net\/fr\/wp-json\/wp\/v2\/posts\/43823","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/legacy.colt.net\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/legacy.colt.net\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/legacy.colt.net\/fr\/wp-json\/wp\/v2\/users\/112"}],"replies":[{"embeddable":true,"href":"https:\/\/legacy.colt.net\/fr\/wp-json\/wp\/v2\/comments?post=43823"}],"version-history":[{"count":0,"href":"https:\/\/legacy.colt.net\/fr\/wp-json\/wp\/v2\/posts\/43823\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/legacy.colt.net\/fr\/wp-json\/wp\/v2\/media\/39270"}],"wp:attachment":[{"href":"https:\/\/legacy.colt.net\/fr\/wp-json\/wp\/v2\/media?parent=43823"}],"wp:term":[{"taxonomy":"colt_type","embeddable":true,"href":"https:\/\/legacy.colt.net\/fr\/wp-json\/wp\/v2\/colt_type?post=43823"},{"taxonomy":"colt_ind","embeddable":true,"href":"https:\/\/legacy.colt.net\/fr\/wp-json\/wp\/v2\/colt_ind?post=43823"},{"taxonomy":"colt_products","embeddable":true,"href":"https:\/\/legacy.colt.net\/fr\/wp-json\/wp\/v2\/colt_products?post=43823"},{"taxonomy":"colt_solutions","embeddable":true,"href":"https:\/\/legacy.colt.net\/fr\/wp-json\/wp\/v2\/colt_solutions?post=43823"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}