{"id":172,"date":"2010-01-04T20:08:25","date_gmt":"2010-01-04T18:08:25","guid":{"rendered":"http:\/\/www.identitycosmos.com\/?p=172"},"modified":"2010-01-04T20:08:25","modified_gmt":"2010-01-04T18:08:25","slug":"howard-schmid","status":"publish","type":"post","link":"https:\/\/identitycosmos.com\/index.php\/2010\/01\/04\/howard-schmid\/","title":{"rendered":"La maison blanche choisit un ex-Microsoft pour contr\u00f4ler les vols de cyber-identit\u00e9s sur Internet"},"content":{"rendered":"<p>La maison blanche a choisi de nommer Howard Schmidt au poste de &#8220;White House Cybersecurity Coordinator&#8221;, avec comme focus une action sur le vol d&#8217;identit\u00e9 au travers du r\u00e9seau Internet. Cet ex employ\u00e9 de Microsoft a d\u00e9j\u00e0 travaill\u00e9 en profondeur dans le domaine de la protection des identit\u00e9s num\u00e9riques lors de sa mission chez l&#8217;\u00e9diteur.<\/p>\n<p>Pour voir la pr\u00e9sentation de Howard Schmidt:<br \/>\n<object classid=\"clsid:d27cdb6e-ae6d-11cf-96b8-444553540000\" width=\"480\" height=\"300\" codebase=\"http:\/\/download.macromedia.com\/pub\/shockwave\/cabs\/flash\/swflash.cab#version=6,0,40,0\"><param name=\"allowFullScreen\" value=\"true\" \/><param name=\"bgcolor\" value=\"282828\" \/><param name=\"allowscriptaccess\" value=\"always\" \/><param name=\"flashvars\" value=\"path_to_player=http:\/\/www.whitehouse.gov\/sites\/all\/modules\/swftools\/shared\/flash_media_player&amp;path_to_plugins=http:\/\/www.whitehouse.gov\/\/sites\/default\/modules\/wh_multimedia\/wh_jwplayer&amp;path_to_captions=&amp;file=http:\/\/www.whitehouse.gov\/videos\/2009\/December\/122209_CyberSecurity.m4v&amp;image=http:\/\/www.whitehouse.gov\/sites\/default\/files\/audio-video\/video_thumbnail\/CyberSec.jpg&amp;controlbar=bottom&amp;frontcolor=AAAAAA&amp;plugins=http:\/\/www.whitehouse.gov\/\/sites\/default\/modules\/wh_multimedia\/wh_jwplayer\/captions,http:\/\/www.whitehouse.gov\/\/sites\/default\/modules\/wh_multimedia\/wh_jwplayer\/hat&amp;captions.file=&amp;stretching=fill&amp;menu=false\" \/><param name=\"src\" value=\"http:\/\/www.whitehouse.gov\/sites\/all\/modules\/swftools\/shared\/flash_media_player\/player.swf\" \/><param name=\"allowfullscreen\" value=\"true\" \/><embed type=\"application\/x-shockwave-flash\" width=\"480\" height=\"300\" src=\"http:\/\/www.whitehouse.gov\/sites\/all\/modules\/swftools\/shared\/flash_media_player\/player.swf\" allowfullscreen=\"true\" flashvars=\"path_to_player=http:\/\/www.whitehouse.gov\/sites\/all\/modules\/swftools\/shared\/flash_media_player&amp;path_to_plugins=http:\/\/www.whitehouse.gov\/\/sites\/default\/modules\/wh_multimedia\/wh_jwplayer&amp;path_to_captions=&amp;file=http:\/\/www.whitehouse.gov\/videos\/2009\/December\/122209_CyberSecurity.m4v&amp;image=http:\/\/www.whitehouse.gov\/sites\/default\/files\/audio-video\/video_thumbnail\/CyberSec.jpg&amp;controlbar=bottom&amp;frontcolor=AAAAAA&amp;plugins=http:\/\/www.whitehouse.gov\/\/sites\/default\/modules\/wh_multimedia\/wh_jwplayer\/captions,http:\/\/www.whitehouse.gov\/\/sites\/default\/modules\/wh_multimedia\/wh_jwplayer\/hat&amp;captions.file=&amp;stretching=fill&amp;menu=false\" allowscriptaccess=\"always\" bgcolor=\"282828\"><\/embed><\/object><\/p>\n<p>{ merci \u00e0 oliwek pour son commentaire \ud83d\ude09 }<\/p>\n","protected":false},"excerpt":{"rendered":"<p>La maison blanche a choisi de nommer Howard Schmidt au poste de &#8220;White House Cybersecurity Coordinator&#8221;, avec comme focus une action sur le vol d&#8217;identit\u00e9 au travers du r\u00e9seau Internet. Cet ex employ\u00e9 de Microsoft a d\u00e9j\u00e0 travaill\u00e9 en profondeur dans le domaine de la protection des identit\u00e9s num\u00e9riques lors de sa mission chez l&#8217;\u00e9diteur.<\/p>\n<p>Pour voir la pr\u00e9sentation de Howard Schmidt:<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[68,147,216],"class_list":["post-172","post","type-post","status-publish","format-standard","hentry","category-strategie","tag-cnil","tag-microsoft","tag-securite"],"_links":{"self":[{"href":"https:\/\/identitycosmos.com\/index.php\/wp-json\/wp\/v2\/posts\/172","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/identitycosmos.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/identitycosmos.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/identitycosmos.com\/index.php\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/identitycosmos.com\/index.php\/wp-json\/wp\/v2\/comments?post=172"}],"version-history":[{"count":0,"href":"https:\/\/identitycosmos.com\/index.php\/wp-json\/wp\/v2\/posts\/172\/revisions"}],"wp:attachment":[{"href":"https:\/\/identitycosmos.com\/index.php\/wp-json\/wp\/v2\/media?parent=172"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/identitycosmos.com\/index.php\/wp-json\/wp\/v2\/categories?post=172"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/identitycosmos.com\/index.php\/wp-json\/wp\/v2\/tags?post=172"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}