{"id":13898,"date":"2026-02-06T13:40:53","date_gmt":"2026-02-06T18:40:53","guid":{"rendered":"https:\/\/www.prival.ca\/?p=13898"},"modified":"2026-02-18T20:58:44","modified_gmt":"2026-02-19T01:58:44","slug":"the-firewall-is-no-longer-enough-why-identity-is-the-new-perimeter","status":"publish","type":"post","link":"https:\/\/www.prival.ca\/fr\/the-firewall-is-no-longer-enough-why-identity-is-the-new-perimeter\/","title":{"rendered":"Le pare-feu ne suffit plus, pourquoi l\u2019identit\u00e9 est le nouveau p\u00e9rim\u00e8tre"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-margin-bottom-medium:40px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:calc( 1200px + 0px );margin-left: calc(-0px \/ 2 );margin-right: calc(-0px \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:0px;--awb-margin-bottom-large:0px;--awb-spacing-left-large:0px;--awb-width-medium:100%;--awb-spacing-right-medium:0px;--awb-spacing-left-medium:0px;--awb-width-small:100%;--awb-spacing-right-small:0px;--awb-spacing-left-small:0px;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1 fusion-text-no-margin\" style=\"--awb-margin-bottom:35px;\"><p class=\"text-md font-regular leading-&#091;24px&#093; pb-xxs pt-&#091;9px&#093;\" dir=\"ltr\">La s\u00e9curit\u00e9 informatique reposait autrefois sur des d\u00e9fenses p\u00e9rim\u00e9triques telles que les pare-feu et les VPN, mais aujourd'hui cette fronti\u00e8re a disparu.<\/p>\n<p>Les donn\u00e9es sont claires : Le nouveau champ de bataille n\u2019est plus \u00e0 la p\u00e9riph\u00e9rie du r\u00e9seau, mais au niveau de l\u2019identit\u00e9.<\/p>\n<p class=\"text-md font-regular leading-&#091;24px&#093; pb-xxs pt-&#091;9px&#093;\" dir=\"ltr\">Les syst\u00e8mes d\u2019authentification sont d\u00e9sormais les portes d\u2019entr\u00e9e des r\u00e9seaux, applications et donn\u00e9es d\u2019entreprise. Cela en fait la cible privil\u00e9gi\u00e9e des adversaires modernes.<\/p>\n<p>Pour les responsables TI, s\u00e9curiser la couche identit\u00e9 est devenu l\u2019\u00e9l\u00e9ment le plus critique pour prot\u00e9ger l\u2019organisation.<\/p>\n<\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-bottom:1%;width:100%;\"><\/div><div class=\"fusion-text fusion-text-2\"><h3 class=\"font-semibold pdf-heading-class-replace pb-xxs text-lg leading-&#091;30px&#093; &#091;&amp;:not(:first-child)&#093;:pt-&#091;15px&#093; &#091;&amp;_.underline&#093;:underline-offset-&#091;6px&#093; &#091;&amp;_a&#093;:underline-offset-&#091;6px&#093;\" dir=\"ltr\">Les attaquants ne forcent plus l\u2019entr\u00e9e, ils se font passer pour vous<\/h3>\n<\/div><div class=\"fusion-text fusion-text-3 fusion-text-no-margin\" style=\"--awb-margin-bottom:35px;\"><p class=\"text-md font-regular leading-&#091;24px&#093; pb-xxs pt-&#091;9px&#093;\" dir=\"ltr\">Les cybercriminels les plus redoutables aujourd\u2019hui ne piratent pas. Ils se connectent. Selon le <span class=\"font-semibold\"><a href=\"https:\/\/www.verizon.com\/business\/resources\/reports\/2025-dbir-data-breach-investigations-report.pdf\">Verizon 2025 Data Breach Investigations Report (DBIR)<\/a><\/span>, l\u2019exploitation des identifiants reste le principal vecteur d\u2019acc\u00e8s initial, repr\u00e9sentant 22 % des violations.<\/p>\n<p class=\"text-md font-regular leading-&#091;24px&#093; pb-xxs pt-&#091;9px&#093;\" dir=\"ltr\">Les acteurs malveillants exploitent activement les vuln\u00e9rabilit\u00e9s des syst\u00e8mes Identity and Access Management (IAM). En compromettant des identifiants, ils imitent des activit\u00e9s l\u00e9gitimes et contournent les outils classiques de d\u00e9tection d\u2019anomalies.<\/p>\n<p>Une fois infiltr\u00e9s, ils escaladent les privil\u00e8ges et se d\u00e9placent lat\u00e9ralement dans le r\u00e9seau. Ils sont souvent impossibles \u00e0 distinguer d\u2019un utilisateur l\u00e9gitime... jusqu\u2019\u00e0 ce qu\u2019il soit trop tard.<\/p>\n<\/div><div class=\"fusion-text fusion-text-4\"><h3 class=\"font-semibold pdf-heading-class-replace pb-xxs text-lg leading-&#091;30px&#093; &#091;&amp;:not(:first-child)&#093;:pt-&#091;15px&#093; &#091;&amp;_.underline&#093;:underline-offset-&#091;6px&#093; &#091;&amp;_a&#093;:underline-offset-&#091;6px&#093;\" dir=\"ltr\">L\u2019angle mort ? les identit\u00e9s non humaines<\/h3>\n<\/div><div class=\"fusion-text fusion-text-5 fusion-text-no-margin\" style=\"--awb-margin-bottom:35px;\"><p class=\"text-md font-regular leading-&#091;24px&#093; pb-xxs pt-&#091;9px&#093;\" dir=\"ltr\">Quand on parle de gestion des identit\u00e9s, on pense d\u2019abord aux utilisateurs humains. Pourtant, dans les environnements TI actuels, les identit\u00e9s non humaines (Non-Human Identities, NHI) dominent de plus en plus. Cela inclut les comptes de service, bots, cl\u00e9s API et workloads cloud.<\/p>\n<p class=\"text-md font-regular leading-&#091;24px&#093; pb-xxs pt-&#091;9px&#093;\" dir=\"ltr\">Les recherches montrent que les NHIs surpassent d\u00e9sormais les identit\u00e9s humaines sur Internet dans une proportion de <b><strong class=\"font-semibold\">huit pour un.<\/strong><\/b>Ces identit\u00e9s machine sont souvent surdimensionn\u00e9es en termes de privil\u00e8ges et insuffisamment surveill\u00e9es, cr\u00e9ant une immense surface d\u2019attaque silencieuse.<\/p>\n<p>S\u00e9curiser ces identit\u00e9s automatis\u00e9es est d\u00e9sormais une priorit\u00e9. Une strat\u00e9gie ax\u00e9e uniquement sur les utilisateurs humains laisse la majorit\u00e9 des identit\u00e9s expos\u00e9es.<\/p>\n<\/div><div class=\"fusion-text fusion-text-6\"><h3>La gouvernance est la nouvelle r\u00e8gle de pare-feu<\/h3>\n<\/div><div class=\"fusion-text fusion-text-7 fusion-text-no-margin\" style=\"--awb-margin-bottom:35px;\"><p class=\"text-md font-regular leading-&#091;24px&#093; pb-xxs pt-&#091;9px&#093;\" dir=\"ltr\">Dans un mod\u00e8le centr\u00e9 sur le r\u00e9seau, on g\u00e9rait les r\u00e8gles des pare-feux. Dans un mod\u00e8le centr\u00e9 sur l\u2019identit\u00e9, il faut g\u00e9rer le <span class=\"font-semibold\">cycle de vie des identit\u00e9s.<\/span>La gouvernance des identit\u00e9s, et plus particuli\u00e8rement les processus  Join, Move, Leave  (JML), est indispensable pour arr\u00eater les acc\u00e8s non autoris\u00e9s.<\/p>\n<ul class=\"pb-xxs pt-&#091;9px&#093; list-disc pl-5xl pt-&#091;5px&#093;\">\n<li class=\"text-md font-regular leading-&#091;24px&#093; my-&#091;5px&#093; &#091;&amp;&gt;ol&#093;:!pb-0 &#091;&amp;&gt;ol&#093;:!pt-0 &#091;&amp;&gt;ul&#093;:!pb-0 &#091;&amp;&gt;ul&#093;:!pt-0\" dir=\"ltr\" value=\"1\"><b><strong class=\"font-semibold\">Join :<\/strong><\/b> Automatiser l\u2019attribution des acc\u00e8s en fonction des r\u00f4les pour \u00e9viter une surprovisionnement.<\/li>\n<li class=\"text-md font-regular leading-&#091;24px&#093; my-&#091;5px&#093; &#091;&amp;&gt;ol&#093;:!pb-0 &#091;&amp;&gt;ol&#093;:!pt-0 &#091;&amp;&gt;ul&#093;:!pb-0 &#091;&amp;&gt;ul&#093;:!pt-0\" dir=\"ltr\" value=\"2\"><b><strong class=\"font-semibold\">Move :<\/strong><\/b> R\u00e9voquer les droits d\u2019acc\u00e8s lors des changements de r\u00f4le pour \u00e9viter l\u2019accumulation de privil\u00e8ges.<\/li>\n<li class=\"text-md font-regular leading-&#091;24px&#093; my-&#091;5px&#093; &#091;&amp;&gt;ol&#093;:!pb-0 &#091;&amp;&gt;ol&#093;:!pt-0 &#091;&amp;&gt;ul&#093;:!pb-0 &#091;&amp;&gt;ul&#093;:!pt-0\" dir=\"ltr\" value=\"3\"><b><strong class=\"font-semibold\">Leave :<\/strong><\/b> Supprimer imm\u00e9diatement les acc\u00e8s lors du d\u00e9part de l\u2019utilisateur.<\/li>\n<\/ul>\n<p class=\"text-md font-regular leading-&#091;24px&#093; pb-xxs pt-&#091;9px&#093;\" dir=\"ltr\">Sans gouvernance rigoureuse, les organisations accumulent des comptes orphelins que les attaquants exploitent pour rester ind\u00e9tect\u00e9s.<\/p>\n<\/div><div class=\"fusion-text fusion-text-8\"><h3 class=\"font-semibold pdf-heading-class-replace pb-xxs text-lg leading-&#091;30px&#093; &#091;&amp;:not(:first-child)&#093;:pt-&#091;15px&#093; &#091;&amp;_.underline&#093;:underline-offset-&#091;6px&#093; &#091;&amp;_a&#093;:underline-offset-&#091;6px&#093;\" dir=\"ltr\">Zero Trust et la transition vers la d\u00e9centralisation<\/h3>\n<\/div><div class=\"fusion-text fusion-text-9 fusion-text-no-margin\" style=\"--awb-margin-bottom:35px;\"><p class=\"text-md font-regular leading-&#091;24px&#093; pb-xxs pt-&#091;9px&#093;\" dir=\"ltr\">Selon l'Identity Defined Security Alliance (IDSA), 95 % des organisations adoptent le mod\u00e8le Zero Trust pour s\u00e9curiser les fronti\u00e8res du r\u00e9seau, o\u00f9 les exploits de vuln\u00e9rabilit\u00e9s des VPN ont augment\u00e9 jusqu'\u00e0 22 %. Les attaquants utilisent d\u00e9sormais le bombardement de requ\u00eates et le vol de jetons pour contourner les contr\u00f4les standards.<\/p>\n<p>Cela a entra\u00een\u00e9 un passage vers une authentification r\u00e9sistante au phishing pour contrer ces menaces. Alors que le p\u00e9rim\u00e8tre r\u00e9seau s'\u00e9tend aux shadow IT, les organisations s'adaptent. <\/p>\n<p>Avec 15 % des employ\u00e9s utilisant des outils d'intelligence artificielle g\u00e9n\u00e9rative en dehors de la supervision de l'entreprise, beaucoup se tournent vers les portefeuilles num\u00e9riques pour reprendre le contr\u00f4le des identifiants d\u00e9centralis\u00e9s.<\/p>\n<\/div><div class=\"fusion-text fusion-text-10\"><h3 class=\"font-semibold pdf-heading-class-replace pb-xxs text-lg leading-&#091;30px&#093; &#091;&amp;:not(:first-child)&#093;:pt-&#091;15px&#093; &#091;&amp;_.underline&#093;:underline-offset-&#091;6px&#093; &#091;&amp;_a&#093;:underline-offset-&#091;6px&#093;\" dir=\"ltr\">Ce que les responsables TI doivent retenir<\/h3>\n<\/div><div class=\"fusion-text fusion-text-11 fusion-text-no-margin\" style=\"--awb-margin-bottom:25px;\"><p class=\"text-md font-regular leading-&#091;24px&#093; pb-xxs pt-&#091;9px&#093;\" dir=\"ltr\">Le p\u00e9rim\u00e8tre d\u2019identit\u00e9 d\u00e9finira le paysage op\u00e9rationnel de 2026 et des ann\u00e9es \u00e0 venir. Pour prot\u00e9ger ce nouveau p\u00e9rim\u00e8tre, pensez \u00e0 :<\/p>\n<ol class=\"pb-xxs pt-&#091;9px&#093; pl-5xl list-decimal\">\n<li class=\"text-md font-regular leading-&#091;24px&#093; my-&#091;5px&#093; &#091;&amp;&gt;ol&#093;:!pb-0 &#091;&amp;&gt;ol&#093;:!pt-0 &#091;&amp;&gt;ul&#093;:!pb-0 &#091;&amp;&gt;ul&#093;:!pt-0\" dir=\"ltr\" value=\"1\"><b><strong class=\"font-semibold\">Pr\u00e9sumer la compromission :<\/strong><\/b> Mettre en place des d\u00e9fenses pour limiter l\u2019impact d\u2019identifiants pirat\u00e9s.<\/li>\n<\/ol>\n<ol class=\"pb-xxs pt-&#091;9px&#093; pl-5xl list-decimal\">\n<li class=\"text-md font-regular leading-&#091;24px&#093; my-&#091;5px&#093; &#091;&amp;&gt;ol&#093;:!pb-0 &#091;&amp;&gt;ol&#093;:!pt-0 &#091;&amp;&gt;ul&#093;:!pb-0 &#091;&amp;&gt;ul&#093;:!pt-0\" dir=\"ltr\" value=\"2\"><b><strong class=\"font-semibold\">Auditer les identit\u00e9s machines :<\/strong><\/b> Inventorier et gouverner rigoureusement les comptes de service.<\/li>\n<\/ol>\n<ol class=\"pb-xxs pt-&#091;9px&#093; pl-5xl list-decimal\">\n<li class=\"text-md font-regular leading-&#091;24px&#093; my-&#091;5px&#093; &#091;&amp;&gt;ol&#093;:!pb-0 &#091;&amp;&gt;ol&#093;:!pt-0 &#091;&amp;&gt;ul&#093;:!pb-0 &#091;&amp;&gt;ul&#093;:!pt-0\" dir=\"ltr\" value=\"3\"><b><strong class=\"font-semibold\">Automatiser la gouvernance :<\/strong><\/b> Appliquer le principe du moindre privil\u00e8ge tout au long du cycle de vie des employ\u00e9s.<\/li>\n<\/ol>\n<\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:35px;margin-bottom:1%;width:100%;\"><div class=\"fusion-separator-border sep-single sep-solid\" style=\"--awb-height:20px;--awb-amount:20px;--awb-sep-color:var(--awb-color2);border-color:var(--awb-color2);border-top-width:1px;\"><\/div><\/div><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-text fusion-title-size-two fusion-animated\" style=\"--awb-text-color:var(--awb-color6);--awb-margin-bottom:40px;--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;--awb-font-size:20px;\" data-animationtype=\"slideShortInUp\" data-animationduration=\"1.5\" data-animationoffset=\"top-into-view\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;font-size:1em;--fontSize:20;--minFontSize:20;line-height:1.5;\">Vous pensez \u00e0 revoir votre strat\u00e9gie de gestion des identit\u00e9s ?<\/h2><\/div><div class=\"fusion-text fusion-text-12 fusion-animated fusion-text-no-margin\" style=\"--awb-margin-bottom:25px;\" data-animationtype=\"slideShortInUp\" data-animationduration=\"1.5\" data-animationoffset=\"top-into-view\"><p>Nos sp\u00e9cialistes sont l\u00e0 pour vous aider \u00e0 analyser et am\u00e9liorer votre processus, en vous accompagnant pour le rendre plus efficace \u00e0 chaque \u00e9tape.<\/p>\n<\/div><div style=\"text-align:center;\"><a class=\"fusion-button button-flat fusion-button-default-size button-default fusion-button-default button-1 fusion-button-default-span fusion-button-default-type fusion-animated\" style=\"--awb-margin-bottom:40px;--button-border-radius-top-left:35px;--button-border-radius-top-right:35px;--button-border-radius-bottom-right:35px;--button-border-radius-bottom-left:35px;--button_typography-font-family:&quot;Montserrat&quot;;--button_typography-font-style:normal;--button_typography-font-weight:600;\" data-animationtype=\"slideShortInUp\" data-animationduration=\"1.5\" data-animationoffset=\"top-into-view\" target=\"_self\" href=\"https:\/\/outlook.office.com\/book\/ConsultationTI@prival.ca\/s\/0IR9ptEJYkO1m4Sns0PGsQ2?ismsaljsauthenabled\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Commencez ici<\/span><\/a><\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-bottom:1%;width:100%;\"><div class=\"fusion-separator-border sep-single sep-solid\" style=\"--awb-height:20px;--awb-amount:20px;--awb-sep-color:var(--awb-color2);border-color:var(--awb-color2);border-top-width:1px;\"><\/div><\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-bottom:1%;width:100%;\"><\/div><div class=\"fusion-text fusion-text-13 fusion-text-no-margin\" style=\"--awb-margin-top:35px;--awb-margin-bottom:50px;\"><p class=\"text-md font-regular leading-&#091;24px&#093; pb-xxs pt-&#091;9px&#093;\" dir=\"ltr\">En traitant l\u2019identit\u00e9 comme le principal contr\u00f4le de s\u00e9curit\u00e9, vous prot\u00e9gez le seul p\u00e9rim\u00e8tre qui suit vos donn\u00e9es o\u00f9 qu\u2019elles aillent.<\/p>\n<\/div><div class=\"fusion-text fusion-text-14 fusion-text-no-margin\" style=\"--awb-margin-bottom:35px;\"><p style=\"font-family: 'Red Hat Display'; font-weight: 400;\" data-fusion-font=\"true\" data-fusion-google-font=\"Red Hat Display\" data-fusion-google-variant=\"400\">Sources :<\/p>\n<ul>\n<li class=\"paragraph normal ng-star-inserted\" data-start-index=\"11\"><span style=\"font-family: 'Red Hat Display'; font-weight: 400; font-size: 18px;\" data-fusion-font=\"true\" data-fusion-google-font=\"Red Hat Display\" data-fusion-google-variant=\"400\">Identity Defined Security Alliance (IDSA)<\/span><span class=\"ng-star-inserted\" style=\"font-family: 'Red Hat Display'; font-weight: 400; font-size: 18px;\" data-start-index=\"52\" data-fusion-font=\"true\" data-fusion-google-font=\"Red Hat Display\" data-fusion-google-variant=\"400\">. (2025). <\/span><i class=\"ng-star-inserted\" data-start-index=\"62\"><span style=\"font-family: 'Red Hat Display'; font-weight: 400; font-size: 18px;\" data-fusion-font=\"true\" data-fusion-google-font=\"Red Hat Display\" data-fusion-google-variant=\"400\">2025 Trends in Identity Security: A Survey of IT Security and Identity Professionals<\/span><\/i><span class=\"ng-star-inserted\" style=\"font-family: 'Red Hat Display'; font-weight: 400; font-size: 18px;\" data-start-index=\"146\" data-fusion-font=\"true\" data-fusion-google-font=\"Red Hat Display\" data-fusion-google-variant=\"400\">.<\/span><\/li>\n<\/ul>\n<ul>\n<li class=\"paragraph normal ng-star-inserted\" data-start-index=\"147\"><span style=\"font-family: 'Red Hat Display'; font-weight: 400; font-size: 18px;\" data-fusion-font=\"true\" data-fusion-google-font=\"Red Hat Display\" data-fusion-google-variant=\"400\">National Security Agency (NSA) &amp; Cybersecurity and Infrastructure Security Agency (CISA)<\/span><span class=\"ng-star-inserted\" style=\"font-family: 'Red Hat Display'; font-weight: 400; font-size: 18px;\" data-start-index=\"235\" data-fusion-font=\"true\" data-fusion-google-font=\"Red Hat Display\" data-fusion-google-variant=\"400\">. (2023). <\/span><i class=\"ng-star-inserted\" data-start-index=\"245\"><span style=\"font-family: 'Red Hat Display'; font-weight: 400; font-size: 18px;\" data-fusion-font=\"true\" data-fusion-google-font=\"Red Hat Display\" data-fusion-google-variant=\"400\">Identity and Access Management Recommended Best Practices for Administrators<\/span><\/i><span class=\"ng-star-inserted\" style=\"font-family: 'Red Hat Display'; font-weight: 400; font-size: 18px;\" data-start-index=\"322\" data-fusion-font=\"true\" data-fusion-google-font=\"Red Hat Display\" data-fusion-google-variant=\"400\">.<\/span><\/li>\n<\/ul>\n<ul>\n<li class=\"paragraph normal ng-star-inserted\" data-start-index=\"323\"><span style=\"font-family: 'Red Hat Display'; font-weight: 400; font-size: 18px;\" data-fusion-font=\"true\" data-fusion-google-font=\"Red Hat Display\" data-fusion-google-variant=\"400\">Verizon<\/span><span class=\"ng-star-inserted\" style=\"font-family: 'Red Hat Display'; font-weight: 400; font-size: 18px;\" data-start-index=\"330\" data-fusion-font=\"true\" data-fusion-google-font=\"Red Hat Display\" data-fusion-google-variant=\"400\">. (2025). <\/span><i class=\"ng-star-inserted\" data-start-index=\"340\"><span style=\"font-family: 'Red Hat Display'; font-weight: 400; font-size: 18px;\" data-fusion-font=\"true\" data-fusion-google-font=\"Red Hat Display\" data-fusion-google-variant=\"400\">2025 Data Breach Investigations Report<\/span><\/i><span class=\"ng-star-inserted\" style=\"font-family: 'Red Hat Display'; font-weight: 400; font-size: 18px;\" data-start-index=\"378\" data-fusion-font=\"true\" data-fusion-google-font=\"Red Hat Display\" data-fusion-google-variant=\"400\">.<\/span><\/li>\n<\/ul>\n<ul>\n<li class=\"paragraph normal ng-star-inserted\" data-start-index=\"379\"><span style=\"font-family: 'Red Hat Display'; font-weight: 400; font-size: 18px;\" data-fusion-font=\"true\" data-fusion-google-font=\"Red Hat Display\" data-fusion-google-variant=\"400\">World Economic Forum<\/span><span class=\"ng-star-inserted\" style=\"font-family: 'Red Hat Display'; font-weight: 400; font-size: 18px;\" data-start-index=\"399\" data-fusion-font=\"true\" data-fusion-google-font=\"Red Hat Display\" data-fusion-google-variant=\"400\">. (2023, June). <\/span><i class=\"ng-star-inserted\" data-start-index=\"415\"><span style=\"font-family: 'Red Hat Display'; font-weight: 400; font-size: 18px;\" data-fusion-font=\"true\" data-fusion-google-font=\"Red Hat Display\" data-fusion-google-variant=\"400\">Reimagining Digital ID: Insight Report<\/span><\/i><span class=\"ng-star-inserted\" style=\"font-family: 'Red Hat Display'; font-weight: 400; font-size: 18px;\" data-start-index=\"453\" data-fusion-font=\"true\" data-fusion-google-font=\"Red Hat Display\" data-fusion-google-variant=\"400\">.<\/span><\/li>\n<\/ul>\n<\/div><div class=\"fusion-title title fusion-title-2 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:30;--minFontSize:30;line-height:1.5;\"><h2>D'autres points de vue<\/h2><\/h2><\/div><div class=\"fusion-recent-posts fusion-recent-posts-1 avada-container layout-default layout-columns-3\"><section class=\"fusion-columns columns fusion-columns-3 columns-3\"><article class=\"post fusion-column column col col-lg-4 col-md-4 col-sm-4\"><div class=\"fusion-flexslider fusion-flexslider-loading flexslider flexslider-hover-type-none\"><ul class=\"slides\"><li><a href=\"https:\/\/www.prival.ca\/fr\/the-shadow-pandemic-why-bans-and-training-fall-short\/\" aria-label=\"La pand\u00e9mie du Shadow AI : Pourquoi les interdictions et la formation ne suffisent pas\" class=\"hover-type-none\"><img decoding=\"async\" width=\"700\" height=\"441\" src=\"https:\/\/www.prival.ca\/wp-content\/uploads\/2026\/04\/prival-shadow-ai-governance-hero-1600x900-1-700x441.jpg\" class=\"attachment-recent-posts size-recent-posts lazyload\" alt=\"Two business colleagues collaborate at a workstation in a modern office, reviewing AI tool usage across the organization to identify shadow AI exposure.\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%271600%27%20height%3D%27900%27%20viewBox%3D%270%200%201600%20900%27%3E%3Crect%20width%3D%271600%27%20height%3D%27900%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/www.prival.ca\/wp-content\/uploads\/2026\/04\/prival-shadow-ai-governance-hero-1600x900-1-700x441.jpg\" data-srcset=\"https:\/\/www.prival.ca\/wp-content\/uploads\/2026\/04\/prival-shadow-ai-governance-hero-1600x900-1-18x10.jpg 18w, https:\/\/www.prival.ca\/wp-content\/uploads\/2026\/04\/prival-shadow-ai-governance-hero-1600x900-1-320x202.jpg 320w, https:\/\/www.prival.ca\/wp-content\/uploads\/2026\/04\/prival-shadow-ai-governance-hero-1600x900-1-700x441.jpg 700w\" data-sizes=\"auto\" \/><\/a><\/li><\/ul><\/div><div class=\"recent-posts-content\"><span class=\"vcard\" style=\"display: none;\"><span class=\"fn\"><a href=\"https:\/\/www.prival.ca\/fr\/author\/ralmaraz\/\" title=\"Articles par Robin Almaraz\" rel=\"author\">Robin Almaraz<\/a><\/span><\/span><span class=\"updated\" style=\"display:none;\">2026-04-29T08:29:47-05:00<\/span><h4 class=\"entry-title\"><a href=\"https:\/\/www.prival.ca\/fr\/the-shadow-pandemic-why-bans-and-training-fall-short\/\">La pand\u00e9mie du Shadow AI : Pourquoi les interdictions et la formation ne suffisent pas<\/a><\/h4><\/div><\/article><article class=\"post fusion-column column col col-lg-4 col-md-4 col-sm-4\"><div class=\"fusion-flexslider fusion-flexslider-loading flexslider flexslider-hover-type-none\"><ul class=\"slides\"><li><a href=\"https:\/\/www.prival.ca\/fr\/the-ai-adoption-blind-spot-what-the-data-is-telling-you\/\" aria-label=\"L&#039;angle mort de l&#039;adoption de l&#039;IA : Ce que les chiffres r\u00e9v\u00e8lent\" class=\"hover-type-none\"><img decoding=\"async\" width=\"700\" height=\"441\" src=\"https:\/\/www.prival.ca\/wp-content\/uploads\/2026\/04\/prival-ai-adoption-blind-spot-hero-1600x900-1-700x441.jpg\" class=\"attachment-recent-posts size-recent-posts lazyload\" alt=\"IT leader assessing AI security risk in his organization\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%271600%27%20height%3D%27900%27%20viewBox%3D%270%200%201600%20900%27%3E%3Crect%20width%3D%271600%27%20height%3D%27900%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/www.prival.ca\/wp-content\/uploads\/2026\/04\/prival-ai-adoption-blind-spot-hero-1600x900-1-700x441.jpg\" data-srcset=\"https:\/\/www.prival.ca\/wp-content\/uploads\/2026\/04\/prival-ai-adoption-blind-spot-hero-1600x900-1-18x10.jpg 18w, https:\/\/www.prival.ca\/wp-content\/uploads\/2026\/04\/prival-ai-adoption-blind-spot-hero-1600x900-1-320x202.jpg 320w, https:\/\/www.prival.ca\/wp-content\/uploads\/2026\/04\/prival-ai-adoption-blind-spot-hero-1600x900-1-700x441.jpg 700w\" data-sizes=\"auto\" \/><\/a><\/li><\/ul><\/div><div class=\"recent-posts-content\"><span class=\"vcard\" style=\"display: none;\"><span class=\"fn\"><a href=\"https:\/\/www.prival.ca\/fr\/author\/ralmaraz\/\" title=\"Articles par Robin Almaraz\" rel=\"author\">Robin Almaraz<\/a><\/span><\/span><span class=\"updated\" style=\"display:none;\">2026-04-28T15:09:08-05:00<\/span><h4 class=\"entry-title\"><a href=\"https:\/\/www.prival.ca\/fr\/the-ai-adoption-blind-spot-what-the-data-is-telling-you\/\">L'angle mort de l'adoption de l'IA : Ce que les chiffres r\u00e9v\u00e8lent<\/a><\/h4><\/div><\/article><article class=\"post fusion-column column col col-lg-4 col-md-4 col-sm-4\"><div class=\"fusion-flexslider fusion-flexslider-loading flexslider flexslider-hover-type-none\"><ul class=\"slides\"><li><a href=\"https:\/\/www.prival.ca\/fr\/why-identity-federation-and-sso-are-a-security-priority\/\" aria-label=\"F\u00e9d\u00e9ration d&#039;identit\u00e9s et SSO : une priorit\u00e9 de s\u00e9curit\u00e9\" class=\"hover-type-none\"><img decoding=\"async\" width=\"700\" height=\"441\" src=\"https:\/\/www.prival.ca\/wp-content\/uploads\/2026\/03\/professional-man-laptop-web-700x441.jpg\" class=\"attachment-recent-posts size-recent-posts lazyload\" alt=\"\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%271500%27%20height%3D%271000%27%20viewBox%3D%270%200%201500%201000%27%3E%3Crect%20width%3D%271500%27%20height%3D%271000%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/www.prival.ca\/wp-content\/uploads\/2026\/03\/professional-man-laptop-web-700x441.jpg\" data-srcset=\"https:\/\/www.prival.ca\/wp-content\/uploads\/2026\/03\/professional-man-laptop-web-18x12.jpg 18w, https:\/\/www.prival.ca\/wp-content\/uploads\/2026\/03\/professional-man-laptop-web-320x202.jpg 320w, https:\/\/www.prival.ca\/wp-content\/uploads\/2026\/03\/professional-man-laptop-web-700x441.jpg 700w\" data-sizes=\"auto\" \/><\/a><\/li><\/ul><\/div><div class=\"recent-posts-content\"><span class=\"vcard\" style=\"display: none;\"><span class=\"fn\"><a href=\"https:\/\/www.prival.ca\/fr\/author\/ralmaraz\/\" title=\"Articles par Robin Almaraz\" rel=\"author\">Robin Almaraz<\/a><\/span><\/span><span class=\"updated\" style=\"display:none;\">2026-03-26T14:01:34-05:00<\/span><h4 class=\"entry-title\"><a href=\"https:\/\/www.prival.ca\/fr\/why-identity-federation-and-sso-are-a-security-priority\/\">F\u00e9d\u00e9ration d'identit\u00e9s et SSO : une priorit\u00e9 de s\u00e9curit\u00e9<\/a><\/h4><\/div><\/article><\/section><\/div><\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Les syst\u00e8mes d\u2019authentification sont d\u00e9sormais les portes d\u2019entr\u00e9e des r\u00e9seaux, applications et donn\u00e9es d\u2019entreprise. Cela en fait la cible privil\u00e9gi\u00e9e des adversaires modernes.<\/p>","protected":false},"author":4,"featured_media":13998,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[67,57],"tags":[],"class_list":["post-13898","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybsersecurity","category-news-and-updates"],"_links":{"self":[{"href":"https:\/\/www.prival.ca\/fr\/wp-json\/wp\/v2\/posts\/13898","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.prival.ca\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.prival.ca\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.prival.ca\/fr\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.prival.ca\/fr\/wp-json\/wp\/v2\/comments?post=13898"}],"version-history":[{"count":11,"href":"https:\/\/www.prival.ca\/fr\/wp-json\/wp\/v2\/posts\/13898\/revisions"}],"predecessor-version":[{"id":14000,"href":"https:\/\/www.prival.ca\/fr\/wp-json\/wp\/v2\/posts\/13898\/revisions\/14000"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.prival.ca\/fr\/wp-json\/wp\/v2\/media\/13998"}],"wp:attachment":[{"href":"https:\/\/www.prival.ca\/fr\/wp-json\/wp\/v2\/media?parent=13898"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.prival.ca\/fr\/wp-json\/wp\/v2\/categories?post=13898"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.prival.ca\/fr\/wp-json\/wp\/v2\/tags?post=13898"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}