{"id":9772,"date":"2019-01-02T00:00:00","date_gmt":"2019-01-02T07:00:00","guid":{"rendered":"https:\/\/swimlane.com\/resource\/new-year-new-security-iot\/"},"modified":"2023-02-08T08:18:39","modified_gmt":"2023-02-08T08:18:39","slug":"nouvelle-annee-nouvelle-securite-iot","status":"publish","type":"sw_resource","link":"https:\/\/swimlane.com\/fr\/blog\/new-year-new-security-iot\/","title":{"rendered":"Nouvelle ann\u00e9e, nouvelle s\u00e9curit\u00e9 \u2013 Partie 1\u00a0: Cas d\u2019utilisation de l\u2019IoT"},"content":{"rendered":"\n\n\n<section class=\"bs-section bs-section-f49668dca89a07af4c4bed27713f079b6839f643 bs-section---default bs-section--blog-inner-banner  \"><style>.bs-section.bs-section-f49668dca89a07af4c4bed27713f079b6839f643{ background-color: #000743;} <\/style><div class=\"container\">\n<div class=\"bs-row row  flex-md-row-reverse bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-12 col-lg-6   bs-column-3c02e72bbbdd27fbc2206a57dc520373f8b450b2 bs-column---default bs-column--right d-flex flex-column justify-content-end    \"><figure class=\"wp-block-post-featured-image\"><img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/IoT-blog_1.4.19.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Close-up of a smart home voice assistant speaker beside a smartphone displaying \u201cWelcome Home\u201d device setup screen, soft indicator lights glowing in a dim interior as connected home automation awaits activation.\" style=\"object-fit:cover;\" srcset=\"https:\/\/swimlane.com\/wp-content\/uploads\/IoT-blog_1.4.19.png 800w, https:\/\/swimlane.com\/wp-content\/uploads\/IoT-blog_1.4.19-300x186.png 300w, https:\/\/swimlane.com\/wp-content\/uploads\/IoT-blog_1.4.19-768x477.png 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/figure><\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-6   bs-column-6a13826d98ae006805bf00373c567a95c3c65a9a bs-column---default d-flex flex-column    \"><div class=\"wp-block-post-date\"><time datetime=\"2019-01-02T00:00:00-07:00\">Jan 2, 2019<\/time><\/div>\n\n<h1 class=\"wp-block-post-title has-text-color has-white-color\">New year, new security &#8211; Part 1: IoT use cases<\/h1>\n\n\n<div class=\"bs-div bs-div-f106fb945b2c4610a440b9e5b4f63c0c1cbbec02 bs-div---default\"><div class=\"bs-div__inner d-flex flex-wrap align-items-center    \">\n<a class=\"bs-post__author has-text-align-center\" href=\"https:\/\/swimlane.com\/fr\/author\/Cody_Cornell\/\">\n\t<div class=\"profile-desc\">\n\t\t<figure>\n\t\t\t<img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/Headshot.jpg\" alt=\"user-avatar\">\n\t\t<\/figure>\n\t\t<span class=\"prefix\"><\/span>\n\t\t<span class=\"name\">\n\t\t\tCody Cornell\t\t<\/span>\n\t<\/div>\n<\/a>\n\n\n\n<div class=\"reading-time\">\n    <span class=\"reading-time__time\">4 <\/span> Minute Read\n<\/div><\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n\n\n\n\n<section class=\"bs-section bs-section-050e6505c2b06c7ce9ca858e2f56661a365e6ba8 bs-section---default bs-section--blog-inner-main-contents  \"><div class=\"container\">\n<div class=\"bs-row row justify-content-between  bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-1   bs-column-b9d738473a055284b615b4f50be5a383dfe4cc38 bs-column---default     \"><div class=\"heateor_sss_sharing_container heateor_sss_horizontal_sharing\" data-heateor-ss-offset=\"0\" data-heateor-sss-href='https:\/\/swimlane.com\/fr\/blog\/new-year-new-security-iot\/'><div class=\"heateor_sss_sharing_ul\"><a aria-label=\"Email\" class=\"heateor_sss_email\" href=\"https:\/\/swimlane.com\/fr\/blog\/new-year-new-security-iot\/\" onclick=\"event.preventDefault();window.open('mailto:?subject=' + decodeURIComponent('New%20year%2C%20new%20security%20-%20Part%201%3A%20IoT%20use%20cases').replace('&', '%26') + '&body=https%3A%2F%2Fswimlane.com%2Ffr%2Fblog%2Fnew-year-new-security-iot%2F', '_blank')\" title=\"Email\" rel=\"noopener\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#649a3f;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-.75 -.5 36 36\"><path d=\"M 5.5 11 h 23 v 1 l -11 6 l -11 -6 v -1 m 0 2 l 11 6 l 11 -6 v 11 h -22 v -11\" stroke-width=\"1\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Twitter\" class=\"heateor_sss_button_twitter\" href=\"https:\/\/twitter.com\/intent\/tweet?text=New%20year%2C%20new%20security%20-%20Part%201%3A%20IoT%20use%20cases&url=https%3A%2F%2Fswimlane.com%2Ffr%2Fblog%2Fnew-year-new-security-iot%2F\" title=\"Twitter\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_twitter\" style=\"background-color:#55acee;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-4 -4 39 39\"><path d=\"M28 8.557a9.913 9.913 0 0 1-2.828.775 4.93 4.93 0 0 0 2.166-2.725 9.738 9.738 0 0 1-3.13 1.194 4.92 4.92 0 0 0-3.593-1.55 4.924 4.924 0 0 0-4.794 6.049c-4.09-.21-7.72-2.17-10.15-5.15a4.942 4.942 0 0 0-.665 2.477c0 1.71.87 3.214 2.19 4.1a4.968 4.968 0 0 1-2.23-.616v.06c0 2.39 1.7 4.38 3.952 4.83-.414.115-.85.174-1.297.174-.318 0-.626-.03-.928-.086a4.935 4.935 0 0 0 4.6 3.42 9.893 9.893 0 0 1-6.114 2.107c-.398 0-.79-.023-1.175-.068a13.953 13.953 0 0 0 7.55 2.213c9.056 0 14.01-7.507 14.01-14.013 0-.213-.005-.426-.015-.637.96-.695 1.795-1.56 2.455-2.55z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Facebook\" class=\"heateor_sss_facebook\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fswimlane.com%2Ffr%2Fblog%2Fnew-year-new-security-iot%2F\" title=\"Facebook\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#0765FE;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path fill=\"#fff\" d=\"M28 16c0-6.627-5.373-12-12-12S4 9.373 4 16c0 5.628 3.875 10.35 9.101 11.647v-7.98h-2.474V16H13.1v-1.58c0-4.085 1.849-5.978 5.859-5.978.76 0 2.072.15 2.608.298v3.325c-.283-.03-.775-.045-1.386-.045-1.967 0-2.728.745-2.728 2.683V16h3.92l-.673 3.667h-3.247v8.245C23.395 27.195 28 22.135 28 16Z\"><\/path><\/svg><\/span><\/a><a aria-label=\"Linkedin\" class=\"heateor_sss_button_linkedin\" href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fswimlane.com%2Ffr%2Fblog%2Fnew-year-new-security-iot%2F\" title=\"Linkedin\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_linkedin\" style=\"background-color:#0077b5;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path d=\"M6.227 12.61h4.19v13.48h-4.19V12.61zm2.095-6.7a2.43 2.43 0 0 1 0 4.86c-1.344 0-2.428-1.09-2.428-2.43s1.084-2.43 2.428-2.43m4.72 6.7h4.02v1.84h.058c.56-1.058 1.927-2.176 3.965-2.176 4.238 0 5.02 2.792 5.02 6.42v7.395h-4.183v-6.56c0-1.564-.03-3.574-2.178-3.574-2.18 0-2.514 1.7-2.514 3.46v6.668h-4.187V12.61z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><\/div><div class=\"heateorSssClear\"><\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-lg-8 col-md-11   bs-column-5fcbee853797bef68c609dd2715f511e3ead78a3 bs-column---default bs-column--contents     \">\n<h2>Future security and privacy use cases for the internet of things and cloud-based networks<\/h2>\n<p>Happy New Year! Leading up to New Years Eve, we reflect on the year before\u2014its ups and downs, what we learned and how we want to grow. Now that it\u2019s officially 2019, it\u2019s time to look forward. As Swimlane\u2019s CEO, I want to spend some time looking forward to privacy challenges facing the security industry in the coming year. This is the first of a two-part series exploring how the internet of things (IoT) and ever-accelerating move to cloud computing present new-ish challenges for security operations centers (SOCs) and individual users as well as possible security orchestration, automation and response (SOAR) use cases.<\/p>\n<p>On the heels of the holiday season, gadgets and devices connected through the internet of things (IoT) are being un-boxed and placed all over households across the globe. While these devices are intended to make our lives easier in a variety of ways, instances of invasion of privacy using the IoT, like <a href=\"https:\/\/motherboard.vice.com\/en_us\/article\/vbajqd\/hacker-talks-to-arizona-man-directly-through-his-iot-security-camera\" target=\"_blank\" rel=\"noopener\">hackers talking to users through their cameras<\/a> or people fearing their microwaves are spying on them are continuing to spark conversations surrounding security and technology.<\/p>\n<span class='bctt-click-to-tweet'><span class='bctt-ctt-text'><a href='https:\/\/x.com\/intent\/tweet?url=https%3A%2F%2Fswimlane.com%2Ffr%2Fblog%2Fnew-year-new-security-iot%2F&#038;text=I%20really%20don%27t%20think%20people%20need%20to%20worry%20about%20their%20toasters%20and%20microwaves%20rising%20up%20against%20them.%20The%20issue%20with%20%23IoT%20is%20privacy.&#038;related' target='_blank'rel=\"noopener noreferrer\">I really don&#039;t think people need to worry about their toasters and microwaves rising up against them. The issue with #IoT is privacy. <\/a><\/span><a href='https:\/\/x.com\/intent\/tweet?url=https%3A%2F%2Fswimlane.com%2Ffr%2Fblog%2Fnew-year-new-security-iot%2F&#038;text=I%20really%20don%27t%20think%20people%20need%20to%20worry%20about%20their%20toasters%20and%20microwaves%20rising%20up%20against%20them.%20The%20issue%20with%20%23IoT%20is%20privacy.&#038;related' target='_blank' class='bctt-ctt-btn'rel=\"noopener noreferrer\">Share on X<\/a><\/span>\n<h3>When toasters attack?<\/h3>\n<p>As a security professional, I am intrinsically paranoid, but I really don\u2019t think people need to worry about their toasters and microwaves rising up against them. It is theoretically possible that, through the use of the camera and proper timing, your stackable washer\/dryer could hit you in the face, but the bigger issue with IoT is privacy.<\/p>\n<p>Sticking with your washer\/dryer, think about the <a href=\"https:\/\/www.digitaltrends.com\/home\/what-is-an-amazon-dash-button\/\" target=\"_blank\" rel=\"noopener\">Amazon Dash Button<\/a>. As it gains popularity, you might start saying, \u201cWell, that\u2019s how I\u2019m getting my laundry detergent.\u201d Next, your washer\/dryer\u2014but more importantly, Amazon and Tide\u2014is tracking the amount of detergent you use based on the clothes that you have and detecting when your detergent is low. The nice thing is you get your detergent on time; maybe you even get recommendations on the right detergent based on the clothes you have. But on the flipside, there\u2019s someone who knows that you don\u2019t wash your jeans as much as you probably should. Or less comically, you were doing your laundry in one location and weren\u2019t present in another location where something good or bad might have happened.<\/p>\n<p>So, to me, the security issues for IoT are less about my microwave hurting me and more about it exposing information about my habits and location to the world. And now we have to ask ourselves: How is that information leveraged for marketing or sales? What about law enforcement?<\/p>\n<span class='bctt-click-to-tweet'><span class='bctt-ctt-text'><a href='https:\/\/x.com\/intent\/tweet?url=https%3A%2F%2Fswimlane.com%2Ffr%2Fblog%2Fnew-year-new-security-iot%2F&#038;text=As%20an%20%23IoT%20user%2C%20you%20should%20ask%20yourself%3A%20What%20is%20my%20expectation%20for%20the%20information%20companies%20are%20capturing%20and%20how%20much%20they%27re%20sharing%3F%20What%20did%20I%20sign%20up%20for%20when%20I%20put%20these%20devices%20in%20my%20home%3F&#038;related' target='_blank'rel=\"noopener noreferrer\">As an #IoT user, you should ask yourself: What is my expectation for the information companies are capturing and how much they&#039;re sharing? What did I sign up for when I put these devices in my home? <\/a><\/span><a href='https:\/\/x.com\/intent\/tweet?url=https%3A%2F%2Fswimlane.com%2Ffr%2Fblog%2Fnew-year-new-security-iot%2F&#038;text=As%20an%20%23IoT%20user%2C%20you%20should%20ask%20yourself%3A%20What%20is%20my%20expectation%20for%20the%20information%20companies%20are%20capturing%20and%20how%20much%20they%27re%20sharing%3F%20What%20did%20I%20sign%20up%20for%20when%20I%20put%20these%20devices%20in%20my%20home%3F&#038;related' target='_blank' class='bctt-ctt-btn'rel=\"noopener noreferrer\">Share on X<\/a><\/span>\n<h3>\u201cI\u2019ll be watching you.\u201d<\/h3>\n<p>It\u2019s apropos that the \u201880s band <a href=\"https:\/\/www.youtube.com\/watch?v=OMOGaugKpzs\" target=\"_blank\" rel=\"noopener\">watching your every move<\/a> was called The Police. I\u2019m not suggesting that we\u2019re in an Orwellian \u201cBig Brother\u201d situation, but our phones, smart watches and <a href=\"https:\/\/www.cnn.com\/2017\/04\/25\/us\/fitbit-womans-death-investigation-trnd\/index.html\" target=\"_blank\" rel=\"noopener\">fitness trackers<\/a>\u2014to name a few\u2014do already provide data on our precise location at any given time. Law enforcement, corporations, business owners and advertising agencies alike can pull up a whole list of people through a geofence and say, \u201cThese are the people we\u2019re going to talk to because they were there.\u201d Is that bad? Not necessarily. But what if you were automatically included as a suspect for a crime because of proximity? That would be bad.<\/p>\n<h3>Where are the limits?<\/h3>\n<p>We see the cameras on TVs exposing people being unwittingly monitored. Obviously, everything we\u2019re saying is being recorded by a Google Home or Alexa device. Deciding how problematic IoT privacy is depends on how much you trust the companies that are monitoring you. What is your expectation for the information they\u2019re capturing and how much they\u2019re sharing? If they get a data request, do they just say, \u201cyes,\u201d and send it over? Or do they require those making requests to jump through a bunch of hoops with warrants and subpoenas to access that information?<\/p>\n<p>Even though IoT technology is relatively new, these questions are similar to the conversations we\u2019ve had about our internet service providers (ISPs) and our internet carriers for years: What\u2019s the barrier of entry for the government to ask for all the things that I ask for and look for on the internet? Now, it\u2019s not so much that the carrier that has the information, it\u2019s Amazon and Google. So, you should ask yourself, what did I sign up for when I decided to place said device in my bedroom or bathroom or kitchen?<\/p>\n<span class='bctt-click-to-tweet'><span class='bctt-ctt-text'><a href='https:\/\/x.com\/intent\/tweet?url=https%3A%2F%2Fswimlane.com%2Ffr%2Fblog%2Fnew-year-new-security-iot%2F&#038;text=So%20the%20question%20is%3A%20Privacy%20or%20security%3F%20The%20juxtaposition%20is%20really%20hard%20and%20what%20we%27re%20talking%20about%20A%20LOT%20in%20the%20intelligence%20and%20%23cybersecurity%20communities.%20%23IoT&#038;related' target='_blank'rel=\"noopener noreferrer\">So the question is: Privacy or security? The juxtaposition is really hard and what we&#039;re talking about A LOT in the intelligence and #cybersecurity communities. #IoT <\/a><\/span><a href='https:\/\/x.com\/intent\/tweet?url=https%3A%2F%2Fswimlane.com%2Ffr%2Fblog%2Fnew-year-new-security-iot%2F&#038;text=So%20the%20question%20is%3A%20Privacy%20or%20security%3F%20The%20juxtaposition%20is%20really%20hard%20and%20what%20we%27re%20talking%20about%20A%20LOT%20in%20the%20intelligence%20and%20%23cybersecurity%20communities.%20%23IoT&#038;related' target='_blank' class='bctt-ctt-btn'rel=\"noopener noreferrer\">Share on X<\/a><\/span>\n<h3>Privacy or security?<\/h3>\n<p>The privacy component here is really hard, and there\u2019s always going to be this juxtaposition between IoT privacy and security: The less I can see, the harder it is for me to identify bad behavior, but the more I can see, the more I can see.<\/p>\n<p>We talk about this a lot in the intelligence and cybersecurity communities. It\u2019s really a zero-sum game. The more you give on one side, the less you have on the other. You could argue for privacy, and you could argue for security. For most, it depends on the question: Were you recently the victim of a privacy violation, or were you most recently the victim of a security breach?<\/p>\n<p>Benjamin Franklin once said, \u201cThose who would give up essential liberty to purchase a little temporary safety, deserve neither liberty nor safety.\u201d And that was before the lightbulb! To me, that\u2019s the tough existential question: Privacy or security? As an individual, I prefer privacy, but as the CEO, I see the real-world examples on how privacy protections are compromising security<\/p>\n<p>It\u2019s a balance that is going to consistently challenge us in the face of growing IoT popularity and capability.<\/p>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-3   bs-column-4ffac197d945e44dadadc9d8f52ba4737135ba21 bs-column---default     \">\n<div class=\"bs-div bs-div-ffc71f24880cf5ca65c4a54e87fb14a656cc562d bs-div---default bs-div--tags\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\">Tags<\/h2>\n\n\n<div class=\"post-tag-wrapper\">\n    <p><\/p><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"bs-div bs-div-69c461f15bb5fa3fc09d1aa73a0e5865005218ff bs-div---default bs-div--related-posts\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\">Related Posts<\/h2>\n\n\n\n<div class=\"bs-related-posts bs-related-posts-block---default\"><div class=\"bs-related-posts__container\"><div class=\"bs-related-posts__items\">\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69e94a4dd4143 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/fr\/blog\/new-year-new-security-cloud\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>Jan 16, 2019<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>New year, new security &#8211; Part 2: Cloud computing use cases<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69e94a4dd5595 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/fr\/blog\/financial-services-swimlane\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>Jan 12, 2022<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Fortune 500 Financial Service Company Leverages Swimlane\u2019s Low-Code Security Automation to Solve Cross-Departmental Security Use Cases<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69e94a4dd669c bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/fr\/blog\/sao-use-cases\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>Jan 17, 2018<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Security automation and orchestration: Real-world use cases<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n\n\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"bs-section bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1 bs-section---default bs-section--newsletter bs-section--common-marketo-form bs-section--common-marketo-form-two-columns  \"><style>.bs-section.bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1{ background-color: #000743;} <\/style><div class=\"container-fluid\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \">\n<h2 class=\"wp-block-heading has-white-color has-text-color\" id=\"requestor\">Request a Live Demo<\/h2>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/liitp.svg' class='img-fluid'   alt='' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n<script src=\"\/\/pages.swimlane.com\/js\/forms2\/js\/forms2.min.js\"><\/script>\n<form id=\"mktoForm_1017\"><\/form>\n<script>\n    var embeddedFormId = '05a6905d0187a23e165b2fd995e965fe15cb94f6';\n    var marketoBaseUrl = '\/\/pages.swimlane.com';\n    var munchkinId = '978-QCM-390';\n    var formId = '1017';\n    var responseType = 'redirect';\n    var responseMessage = 'Thank you!';\n    var redirectURL = '';\n    var downloadFileURL = '';\n    var linkOpenType = '_self';\n    var popupVideo = 'url';\n    var popupVideoURL = '';\n    var popupVideoUploadURL = '';\n    MktoForms2.loadForm(marketoBaseUrl, munchkinId, formId, function(form) {\n        form.onSuccess(function(values, followUpUrl) {\n            document.getElementById(\"int_mktoForm_\" + formId).innerHTML = responseMessage;\n                    });\n    });\n<\/script>\n<div class=\"form-submit-note\" id=\"int_mktoForm_1017\"><\/div>\n<!-- Incluing form response options -->\n\n\n\n<script>\n    (function() {\n        \/\/ Please include the email domains you would like to block in this list\n        var invalidDomains = [\"@gmail.\", \"@yahoo.\", \"@hotmail.\", \"@live.\", \"@icloud.\",\"@aol.\", \"@outlook.\", \"@proton.\", \"@mailinator.\"];\n\n\n        MktoForms2.whenReady(function(form) {\n            form.onValidate(function() {\n                var email = form.vals().Email;\n                if (email) {\n                    if (!isEmailGood(email)) {\n                        form.submitable(false);\n                        var emailElem = form.getFormElem().find(\"#Email\");\n                        form.showErrorMessage(\"Must be Business email.\", emailElem);\n                    } else {\n                        form.submitable(true);\n                    }\n                }\n            });\n        });\n\n        function isEmailGood(email) {\n            for (var i = 0; i < invalidDomains.length; i++) {\n                var domain = invalidDomains[i];\n                if (email.indexOf(domain) != -1) {\n                    return false;\n                }\n            }\n            return true;\n        }\n\n\n    })(); \n<\/script>\n<\/div>\n<\/div>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"<p>Cas d&#039;utilisation futurs en mati\u00e8re de s\u00e9curit\u00e9 et de confidentialit\u00e9 pour l&#039;Internet des objets et les r\u00e9seaux bas\u00e9s sur le cloud<\/p>","protected":false},"author":66,"featured_media":9773,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"","learn_more_type":"","learn_more_link":[],"show_popup":false,"disable_iframe":false,"enable_lazy_loading":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","featured_page_list":[],"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"tags":[],"resource-type":[67],"resource-topic":[],"resource-industry":[],"blog-category":[68,69,70],"class_list":["post-9772","sw_resource","type-sw_resource","status-publish","has-post-thumbnail","hentry","resource-type-blogs","blog-category-news-and-events","blog-category-use-cases","blog-category-secops"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>New year, new security - Part 1: IoT use cases<\/title>\n<meta name=\"description\" content=\"This is the first of a two-part series exploring how IoT and moving to the cloud present new-ish challenges for SOCs and users plus possible SOAR use cases.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swimlane.com\/fr\/blog\/nouvelle-annee-nouvelle-securite-iot\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"New year, new security - Part 1: IoT use cases\" \/>\n<meta property=\"og:description\" content=\"This is the first of a two-part series exploring how IoT and moving to the cloud present new-ish challenges for SOCs and users plus possible SOAR use cases.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swimlane.com\/fr\/blog\/nouvelle-annee-nouvelle-securite-iot\/\" \/>\n<meta property=\"og:site_name\" content=\"AI Security Automation\" \/>\n<meta property=\"article:modified_time\" content=\"2023-02-08T08:18:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/IoT-blog_1.4.19.png\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"497\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@swimlane\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/blog\\\/new-year-new-security-iot\\\/\",\"url\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/blog\\\/new-year-new-security-iot\\\/\",\"name\":\"New year, new security - Part 1: IoT use cases\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/blog\\\/new-year-new-security-iot\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/blog\\\/new-year-new-security-iot\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/IoT-blog_1.4.19.png\",\"datePublished\":\"2019-01-02T07:00:00+00:00\",\"dateModified\":\"2023-02-08T08:18:39+00:00\",\"description\":\"This is the first of a two-part series exploring how IoT and moving to the cloud present new-ish challenges for SOCs and users plus possible SOAR use cases.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/blog\\\/new-year-new-security-iot\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/swimlane.com\\\/fr\\\/blog\\\/new-year-new-security-iot\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/blog\\\/new-year-new-security-iot\\\/#primaryimage\",\"url\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/IoT-blog_1.4.19.png\",\"contentUrl\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/IoT-blog_1.4.19.png\",\"width\":800,\"height\":497,\"caption\":\"Close-up of a smart home voice assistant speaker beside a smartphone displaying \u201cWelcome Home\u201d device setup screen, soft indicator lights glowing in a dim interior as connected home automation awaits activation.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/blog\\\/new-year-new-security-iot\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/swimlane.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"New year, new security &#8211; Part 1: IoT use cases\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"description\":\"Agentic AI automation for every security function\",\"publisher\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/#organization\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"url\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/sw-inline-logo-color-white.svg\",\"contentUrl\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/sw-inline-logo-color-white.svg\",\"width\":912,\"height\":190,\"caption\":\"Low-Code Security Automation & SOAR Platform | Swimlane\"},\"image\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/swimlane\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/swimlane\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Nouvelle ann\u00e9e, nouvelle s\u00e9curit\u00e9 - Partie 1\u00a0: Cas d\u2019utilisation de l\u2019IoT","description":"Il s&#039;agit du premier volet d&#039;une s\u00e9rie en deux parties explorant comment l&#039;IoT et le passage au cloud pr\u00e9sentent des d\u00e9fis relativement nouveaux pour les SOC et les utilisateurs, ainsi que des cas d&#039;utilisation SOAR possibles.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swimlane.com\/fr\/blog\/nouvelle-annee-nouvelle-securite-iot\/","og_locale":"fr_FR","og_type":"article","og_title":"New year, new security - Part 1: IoT use cases","og_description":"This is the first of a two-part series exploring how IoT and moving to the cloud present new-ish challenges for SOCs and users plus possible SOAR use cases.","og_url":"https:\/\/swimlane.com\/fr\/blog\/nouvelle-annee-nouvelle-securite-iot\/","og_site_name":"AI Security Automation","article_modified_time":"2023-02-08T08:18:39+00:00","og_image":[{"width":800,"height":497,"url":"https:\/\/swimlane.com\/wp-content\/uploads\/IoT-blog_1.4.19.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@swimlane","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swimlane.com\/fr\/blog\/new-year-new-security-iot\/","url":"https:\/\/swimlane.com\/fr\/blog\/new-year-new-security-iot\/","name":"Nouvelle ann\u00e9e, nouvelle s\u00e9curit\u00e9 - Partie 1\u00a0: Cas d\u2019utilisation de l\u2019IoT","isPartOf":{"@id":"https:\/\/swimlane.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swimlane.com\/fr\/blog\/new-year-new-security-iot\/#primaryimage"},"image":{"@id":"https:\/\/swimlane.com\/fr\/blog\/new-year-new-security-iot\/#primaryimage"},"thumbnailUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/IoT-blog_1.4.19.png","datePublished":"2019-01-02T07:00:00+00:00","dateModified":"2023-02-08T08:18:39+00:00","description":"Il s&#039;agit du premier volet d&#039;une s\u00e9rie en deux parties explorant comment l&#039;IoT et le passage au cloud pr\u00e9sentent des d\u00e9fis relativement nouveaux pour les SOC et les utilisateurs, ainsi que des cas d&#039;utilisation SOAR possibles.","breadcrumb":{"@id":"https:\/\/swimlane.com\/fr\/blog\/new-year-new-security-iot\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swimlane.com\/fr\/blog\/new-year-new-security-iot\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/swimlane.com\/fr\/blog\/new-year-new-security-iot\/#primaryimage","url":"https:\/\/swimlane.com\/wp-content\/uploads\/IoT-blog_1.4.19.png","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/IoT-blog_1.4.19.png","width":800,"height":497,"caption":"Close-up of a smart home voice assistant speaker beside a smartphone displaying \u201cWelcome Home\u201d device setup screen, soft indicator lights glowing in a dim interior as connected home automation awaits activation."},{"@type":"BreadcrumbList","@id":"https:\/\/swimlane.com\/fr\/blog\/new-year-new-security-iot\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swimlane.com\/"},{"@type":"ListItem","position":2,"name":"New year, new security &#8211; Part 1: IoT use cases"}]},{"@type":"WebSite","@id":"https:\/\/swimlane.com\/fr\/#website","url":"https:\/\/swimlane.com\/fr\/","name":"Plateforme d&#039;automatisation de la s\u00e9curit\u00e9 low-code et SOAR | Swimlane","description":"Automatisation par IA agentique pour chaque fonction de s\u00e9curit\u00e9","publisher":{"@id":"https:\/\/swimlane.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swimlane.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/swimlane.com\/fr\/#organization","name":"Plateforme d&#039;automatisation de la s\u00e9curit\u00e9 low-code et SOAR | Swimlane","url":"https:\/\/swimlane.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/swimlane.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","width":912,"height":190,"caption":"Low-Code Security Automation & SOAR Platform | Swimlane"},"image":{"@id":"https:\/\/swimlane.com\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/swimlane","https:\/\/www.linkedin.com\/company\/swimlane\/"]}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/sw_resource\/9772","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/sw_resource"}],"about":[{"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/types\/sw_resource"}],"author":[{"embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/users\/66"}],"version-history":[{"count":0,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/sw_resource\/9772\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/media\/9773"}],"wp:attachment":[{"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/media?parent=9772"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/tags?post=9772"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/resource-type?post=9772"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/resource-topic?post=9772"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/resource-industry?post=9772"},{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/blog-category?post=9772"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}