{"id":9934,"date":"2015-06-23T21:23:00","date_gmt":"2015-06-24T03:23:00","guid":{"rendered":"https:\/\/swimlane.com\/resource\/top-5-long-term-effects-of-the-target-breach\/"},"modified":"2026-04-06T04:40:05","modified_gmt":"2026-04-06T10:40:05","slug":"les-5-principaux-effets-a-long-terme-de-la-breche-ciblee","status":"publish","type":"sw_resource","link":"https:\/\/swimlane.com\/fr\/blog\/top-5-long-term-effects-of-the-target-breach\/","title":{"rendered":"Les cinq principaux effets \u00e0 long terme de la violation de donn\u00e9es chez Target"},"content":{"rendered":"<section class=\"bs-section bs-section-50ac0cc438dbf2f3b380783c05a3c736bb0670e7 bs-section---default bs-section--blog-inner-banner\"><style>.bs-section.bs-section-50ac0cc438dbf2f3b380783c05a3c736bb0670e7{ background-color: #000743;} <\/style><div class=\"container\">\n<div class=\"bs-row row  flex-md-row-reverse bs-row---default\">\n<div class=\"bs-column col-sm-12 col-md-12 col-lg-6   bs-column-6770b3369b6c61539d3140cb52ed6bc5ec393625 bs-column---default bs-column--right d-flex flex-column justify-content-end\"><figure class=\"wp-block-post-featured-image\"><img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/2015-target-breach.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"La fl\u00e9chette atteignant le centre de la cible symbolise la pr\u00e9cision, l&#039;exactitude de la d\u00e9tection des menaces et les r\u00e9sultats mesurables en mati\u00e8re de performance du SOC.\" style=\"object-fit:cover;\" srcset=\"https:\/\/swimlane.com\/wp-content\/uploads\/2015-target-breach.png 1120w, https:\/\/swimlane.com\/wp-content\/uploads\/2015-target-breach-300x186.png 300w, https:\/\/swimlane.com\/wp-content\/uploads\/2015-target-breach-1024x636.png 1024w, https:\/\/swimlane.com\/wp-content\/uploads\/2015-target-breach-768x477.png 768w\" sizes=\"(max-width: 1120px) 100vw, 1120px\" \/><\/figure><\/div>\n\n\n\n<div class=\"bs-column col-sm-12  col-md-12 col-lg-6   bs-column-2ba18c9b6304620af4785b54fe900bf0ce0fc4d5 bs-column---default d-flex flex-column\"><div class=\"wp-block-post-date\"><time datetime=\"2015-06-23T21:23:00-06:00\">23 juin 2015<\/time><\/div>\n\n<h1 class=\"wp-block-post-title has-text-color has-white-color\">Les cinq principaux effets \u00e0 long terme de la violation de donn\u00e9es chez Target<\/h1>\n\n\n<div class=\"bs-div bs-div-44a15e4b99450b7aaf810333a0fbaa4ff5112133 bs-div---default\"><div class=\"bs-div__inner d-flex flex-wrap align-items-center\">\n<a class=\"bs-post__author has-text-align-center\" href=\"https:\/\/swimlane.com\/fr\/author\/Cody_Cornell\/\">\n\t<div class=\"profile-desc\">\n\t\t<figure>\n\t\t\t<img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/Headshot.jpg\" alt=\"avatar de l&#039;utilisateur\">\n\t\t<\/figure>\n\t\t<span class=\"prefix\"><\/span>\n\t\t<span class=\"name\">\n\t\t\tCody Cornell\t\t<\/span>\n\t<\/div>\n<\/a>\n\n\n\n<div class=\"reading-time\">\n    <span class=\"reading-time__time\">2 <\/span> Lecture en une minute\n<\/div><\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n\n\n\n\n<section class=\"bs-section bs-section-205a03f93391472c82564395e3b5684e68c8ef7d bs-section---default bs-section--blog-inner-main-contents\"><div class=\"container\">\n<div class=\"bs-row row justify-content-between  bs-row---default\">\n<div class=\"bs-column col-sm-12 col-md-1   bs-column-fa02c15a19a9c2952663733986e45d4eef708638 bs-column---default\"><div class=\"heateor_sss_sharing_container heateor_sss_horizontal_sharing\" data-heateor-ss-offset=\"0\" data-heateor-sss-href='https:\/\/swimlane.com\/fr\/blog\/top-5-long-term-effects-of-the-target-breach\/'><div class=\"heateor_sss_sharing_ul\"><a aria-label=\"E-mail\" class=\"heateor_sss_email\" href=\"https:\/\/swimlane.com\/fr\/blog\/top-5-long-term-effects-of-the-target-breach\/\" onclick=\"event.preventDefault();window.open('mailto:?subject=' + decodeURIComponent('The%20top%20five%20long-term%20effects%20of%20the%20Target%20breach').replace('&', '%26') + '&body=https%3A%2F%2Fswimlane.com%2Ffr%2Fblog%2Ftop-5-long-term-effects-of-the-target-breach%2F', '_blank')\" title=\"E-mail\" rel=\"noopener\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#649a3f;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewbox=\"-.75 -.5 36 36\"><path d=\"M 5.5 11 h 23 v 1 l -11 6 l -11 -6 v -1 m 0 2 l 11 6 l 11 -6 v 11 h -22 v -11\" stroke-width=\"1\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Gazouillement\" class=\"heateor_sss_button_twitter\" href=\"https:\/\/twitter.com\/intent\/tweet?text=The%20top%20five%20long-term%20effects%20of%20the%20Target%20breach&url=https%3A%2F%2Fswimlane.com%2Ffr%2Fblog%2Ftop-5-long-term-effects-of-the-target-breach%2F\" title=\"Gazouillement\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_twitter\" style=\"background-color:#55acee;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewbox=\"-4 -4 39 39\"><path d=\"M28 8.557a9.913 9.913 0 0 1-2.828.775 4.93 4.93 0 0 0 2.166-2.725 9.738 9.738 0 0 1-3.13 1.194 4.92 4.92 0 0 0-3.593-1.55 4.924 4.924 0 0 0-4.794 6.049c-4.09-.21-7.72-2.17-10.15-5.15a4.942 4.942 0 0 0-.665 2.477c0 1.71.87 3.214 2.19 4.1a4.968 4.968 0 0 1-2.23-.616v.06c0 2.39 1.7 4.38 3.952 4.83-.414.115-.85.174-1.297.174-.318 0-.626-.03-.928-.086a4.935 4.935 0 0 0 4.6 3.42 9.893 9.893 0 0 1-6.114 2.107c-.398 0-.79-.023-1.175-.068a13.953 13.953 0 0 0 7.55 2.213c9.056 0 14.01-7.507 14.01-14.013 0-.213-.005-.426-.015-.637.96-.695 1.795-1.56 2.455-2.55z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Facebook\" class=\"heateor_sss_facebook\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fswimlane.com%2Ffr%2Fblog%2Ftop-5-long-term-effects-of-the-target-breach%2F\" title=\"Facebook\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#0765FE;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewbox=\"0 0 32 32\"><path fill=\"#fff\" d=\"M28 16c0-6.627-5.373-12-12-12S4 9.373 4 16c0 5.628 3.875 10.35 9.101 11.647v-7.98h-2.474V16H13.1v-1.58c0-4.085 1.849-5.978 5.859-5.978.76 0 2.072.15 2.608.298v3.325c-.283-.03-.775-.045-1.386-.045-1.967 0-2.728.745-2.728 2.683V16h3.92l-.673 3.667h-3.247v8.245C23.395 27.195 28 22.135 28 16Z\"><\/path><\/svg><\/span><\/a><a aria-label=\"LinkedIn\" class=\"heateor_sss_button_linkedin\" href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fswimlane.com%2Ffr%2Fblog%2Ftop-5-long-term-effects-of-the-target-breach%2F\" title=\"LinkedIn\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_linkedin\" style=\"background-color:#0077b5;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewbox=\"0 0 32 32\"><path d=\"M6.227 12.61h4.19v13.48h-4.19V12.61zm2.095-6.7a2.43 2.43 0 0 1 0 4.86c-1.344 0-2.428-1.09-2.428-2.43s1.084-2.43 2.428-2.43m4.72 6.7h4.02v1.84h.058c.56-1.058 1.927-2.176 3.965-2.176 4.238 0 5.02 2.792 5.02 6.42v7.395h-4.183v-6.56c0-1.564-.03-3.574-2.178-3.574-2.18 0-2.514 1.7-2.514 3.46v6.668h-4.187V12.61z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><\/div><div class=\"heateorSssClear\"><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"bs-column col-sm-12  col-lg-8 col-md-11   bs-column-0d83d6d9863f92131cc95492d42e5b50c72f00bb bs-column---default bs-column--contents\">\n<h2>\u00a0<\/h2>\n<p>Lorsque la nouvelle est tomb\u00e9e r\u00e9cemment que trois banques avaient refus\u00e9 les cartes Mastercard <a href=\"http:\/\/www.wsj.com\/articles\/biggest-mastercard-issuers-scuttled-deal-on-target-data-breach-1433253072\" target=\"_blank\" rel=\"noreferrer noopener\">R\u00e8glement de $19 millions<\/a> Le litige avec Target concernant les r\u00e9clamations li\u00e9es \u00e0 la fuite massive de donn\u00e9es dont l&#039;enseigne a \u00e9t\u00e9 victime a rappel\u00e9 que les cons\u00e9quences d&#039;un piratage informatique majeur sont souvent durables. En effet, le r\u00e8glement finalement abandonn\u00e9 n&#039;est qu&#039;un des nombreux effets persistants du piratage de Target, parmi lesquels\u00a0:<\/p>\n<ol>\n<li><strong>Nouvelle l\u00e9gislation sur la cybers\u00e9curit\u00e9\u00a0: <\/strong>La cyberattaque contre Target a \u00e9t\u00e9 la premi\u00e8re d&#039;une longue s\u00e9rie de piratages de grande envergure qui ont amorc\u00e9 une prise de conscience et une inqui\u00e9tude croissantes quant \u00e0 l&#039;\u00e9tat de la cybers\u00e9curit\u00e9. Ces violations ont \u00e9galement attir\u00e9 l&#039;attention des responsables politiques, notamment du pr\u00e9sident Obama, qui a propos\u00e9 une loi sur la cybers\u00e9curit\u00e9 depuis adopt\u00e9e. <a href=\"http:\/\/www.nytimes.com\/2015\/04\/23\/us\/politics\/computer-attacks-spur-congress-to-act-on-cybersecurity-bill-years-in-making.html\" target=\"_blank\" rel=\"noreferrer noopener\">adopt\u00e9 par la Chambre des repr\u00e9sentants<\/a>.<\/li>\n<\/ol>\n<ol start=\"2\">\n<li><strong>R\u00e9\u00e9valuation des processus SOC\u00a0: <\/strong>La longue s\u00e9rie de violations de donn\u00e9es qui a d\u00e9but\u00e9 chez Target a entra\u00een\u00e9 une remise en question des m\u00e9thodes de travail des professionnels de la s\u00e9curit\u00e9 informatique. De plus en plus d&#039;organisations reconnaissent qu&#039;il est impossible de traiter manuellement chaque alerte de s\u00e9curit\u00e9 lorsque les solutions de d\u00e9tection en g\u00e9n\u00e8rent des milliers chaque jour. Par cons\u00e9quent, la r\u00e9ponse automatis\u00e9e aux incidents (ou r\u00e9ponse automatis\u00e9e aux incidents) \u2013 gr\u00e2ce \u00e0 laquelle les organisations <a href=\"\/fr\/solution\/\">outils de levier<\/a> La capacit\u00e9 \u00e0 prioriser, analyser et r\u00e9soudre automatiquement les alertes \u00e0 la vitesse de la machine est un concept de plus en plus populaire dans les SOC.<\/li>\n<\/ol>\n<ol start=\"3\">\n<li><strong>Davantage d&#039;attention de la part de la direction : <\/strong>Le carnage provoqu\u00e9 par la cyberattaque contre Target a incit\u00e9 de nombreux dirigeants \u00e0 revoir la place qu&#039;occupe la cybers\u00e9curit\u00e9 dans leurs priorit\u00e9s. Cela se comprend ais\u00e9ment, puisque l&#039;ancien PDG de l&#039;entreprise, Gregg Steinhafel, a \u00e9t\u00e9 contraint de d\u00e9missionner peu apr\u00e8s la r\u00e9v\u00e9lation du piratage.<\/li>\n<\/ol>\n<ol start=\"4\">\n<li><strong>Augmentation des d\u00e9penses de s\u00e9curit\u00e9 : <\/strong>Avec la prise de conscience croissante en mati\u00e8re de cybers\u00e9curit\u00e9, les investissements des entreprises dans les solutions de cybers\u00e9curit\u00e9 ont \u00e9galement augment\u00e9. Le gouvernement f\u00e9d\u00e9ral pr\u00e9voit d&#039;accro\u00eetre ses d\u00e9penses d&#039;environ <a href=\"http:\/\/gcn.com\/articles\/2015\/02\/03\/budget-cybersecurity.aspx\" target=\"_blank\" rel=\"noreferrer noopener\">10 pour cent<\/a> En 2016, de nombreuses entreprises du secteur priv\u00e9 ont \u00e9galement accru leurs engagements financiers.<\/li>\n<\/ol>\n<ol start=\"5\">\n<li><strong>Pr\u00e9occupation pour l&#039;avenir : <\/strong>L&#039;effet le plus significatif de la violation de donn\u00e9es chez Target et des piratages ult\u00e9rieurs a sans doute \u00e9t\u00e9 son impact sur la psych\u00e9 collective. Nombre de consommateurs et d&#039;entreprises sont extr\u00eamement pr\u00e9occup\u00e9s par la s\u00e9curit\u00e9 de leurs donn\u00e9es et, dans certains cas, fondent leurs d\u00e9cisions d&#039;achat sur la r\u00e9putation des fournisseurs en mati\u00e8re de protection des informations.<\/li>\n<\/ol>\n<p>Vous cherchez un moyen d&#039;am\u00e9liorer les capacit\u00e9s de s\u00e9curit\u00e9 de l&#039;information de votre organisation ? <a href=\"\/fr\/demo\/\">Demander une d\u00e9mo<\/a> Aujourd&#039;hui, d\u00e9couvrez de plus pr\u00e8s \u00e0 quoi ressemble la r\u00e9ponse automatis\u00e9e aux incidents en action.<\/p>\n\n\n\n<div class=\"bs-div bs-div-e58db17650a1975e915ce3762609cb867efbbf13 bs-div---default bs-div--blog-inner-download-guide\"><style>.bs-div.bs-div-e58db17650a1975e915ce3762609cb867efbbf13 {background-image: url(https:\/\/swimlane.com\/wp-content\/uploads\/2022\/10\/download-report.png); background-position: center center;\n    background-size: cover;} <\/style><div class=\"bs-div__inner d-flex flex-wrap justify-content-center  flex-md-row-reverse align-items-md-center justify-content-md-between flex-md-nowrap\"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/Turbine_Alert-Triage-Solution.gif' class='img-fluid'   alt='Tableau de bord Swimlane Playbooks affichant les flux de travail de correction automatis\u00e9e, de gestion des vuln\u00e9rabilit\u00e9s, de triage des alertes et de gestion des cas.' title='' data-gif= \"https:\/\/swimlane.com\/wp-content\/uploads\/Turbine_Alert-Triage-Solution.gif\" \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n\n<div class=\"bs-div bs-div-773aef0a3852274bc6b23f7985e05efd194e399e bs-div---default\"><div class=\"bs-div__inner\">\n<h3 class=\"wp-block-heading\" id=\"h-request-a-demo\">Demander une d\u00e9mo<\/h3>\n\n\n\n<p>Si vous n&#039;avez pas encore eu l&#039;occasion de d\u00e9couvrir Swimlane Turbine, demandez une d\u00e9monstration.&nbsp;<\/p>\n\n\n\n<span class=\"bs-pro-button bs-pro-button---default bs-pro-button--primary-with-arrow-small bs-pro-button-p-btn-b5e2ce2cbf1f4d529f52862c0479e3d945077781\"><style>.bs-pro-button-p-btn-b5e2ce2cbf1f4d529f52862c0479e3d945077781 .bs-pro-button__container {background-color: #abb8c3; color: #000000;}<\/style><a href=\"https:\/\/swimlane.com\/fr\/demo\/\" target=\"\" rel=\"noopener noreferrer\" class=\"bs-pro-button__container\">En savoir plus<\/a><\/span>\n<\/div><\/div>\n<\/div><\/div>\n<\/div>\n\n\n\n<div class=\"bs-column col-sm-12  col-md-12 col-lg-3   bs-column-0ad64702520e52820989c3b8a4a5574abd826112 bs-column---default\">\n<div class=\"bs-div bs-div-f0851be86a4542da358c10ec17ccebffa17efe07 bs-div---default bs-div--tags\"><div class=\"bs-div__inner\">\n<h2 class=\"wp-block-heading\" id=\"h-tags\">\u00c9tiquettes<\/h2>\n\n\n<div class=\"post-tag-wrapper\">\n    <p><a href='https:\/\/swimlane.com\/fr\/tag\/research\/'><span class='tag-content'>Recherche<\/span><\/a><\/p><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"bs-div bs-div-5e7267355d8caf36f5b5e0c86eef387b664b848d bs-div---default bs-div--related-posts\"><div class=\"bs-div__inner\">\n<h2 class=\"wp-block-heading\" id=\"h-related-posts\">Articles similaires<\/h2>\n\n\n\n<div class=\"bs-related-posts bs-related-posts-block---default\"><div class=\"bs-related-posts__container\"><div class=\"bs-related-posts__items\">\n<div class=\"bs-column col-sm-4   bs-column-b619eb984092e720779a969a873521d2ec1a85a5 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post-69e0715dd3a0a bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/fr\/blog\/how-long-does-it-take-you-to-identify-phishing-emails\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>27 septembre 2024<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Combien de temps vous faut-il pour identifier avec succ\u00e8s les courriels d&#039;hame\u00e7onnage\u00a0?<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>En savoir plus<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\"bs-column col-sm-4   bs-column-b619eb984092e720779a969a873521d2ec1a85a5 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post-69e0715dd57ed bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/fr\/blog\/security-automation-considerations\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>3 mai 2023<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Automatisation de la s\u00e9curit\u00e9\u00a0: cinq points \u00e0 prendre en compte<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>En savoir plus<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\"bs-column col-sm-4   bs-column-b619eb984092e720779a969a873521d2ec1a85a5 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post-69e0715dd6b6b bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/fr\/blog\/five-metrics-for-incident-response-2\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>25 janvier 2023<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Cinq indicateurs de r\u00e9ponse aux incidents que vous devriez enregistrer<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>En savoir plus<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n\n\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n<section class=\"bs-section bs-section-5adc44600f2304c3b9941b865c835e0a9c78d445 bs-section---default bs-section--newsletter bs-section--common-marketo-form bs-section--common-marketo-form-two-columns\"><style>.bs-section.bs-section-5adc44600f2304c3b9941b865c835e0a9c78d445{ background-color: #000743;} <\/style><div class=\"container-fluid\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\"bs-column col-sm-0 col-md-0 col-lg-6   bs-column-d2d8c4b3c1410779c29ad1a82316f755dc61b41c bs-column---default\">\n<h2 class=\"wp-block-heading has-white-color has-text-color\" id=\"h-interested-in-learning-more\">Vous souhaitez en savoir plus ?<\/h2>\n<\/div>\n\n\n\n<div class=\"bs-column col-sm-0 col-md-0 col-lg-6   bs-column-d2d8c4b3c1410779c29ad1a82316f755dc61b41c bs-column---default\">\n<p class=\"has-white-color has-text-color\">Abonnez-vous d\u00e8s aujourd&#039;hui pour rester inform\u00e9 et recevoir r\u00e9guli\u00e8rement des mises \u00e0 jour de Swimlane.<\/p>\n\n\n\n\n<div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/2022\/11\/newsletter-bg.svg' class='img-fluid'   alt='Contexte moderne de la s\u00e9curit\u00e9 op\u00e9rationnelle\u00a0: un graphique g\u00e9om\u00e9trique en d\u00e9grad\u00e9 repr\u00e9sentant un flux de donn\u00e9es fluide et l\u2019agilit\u00e9 native du cloud.' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n<script src=\"\/\/pages.swimlane.com\/js\/forms2\/js\/forms2.min.js\"><\/script>\n<form id=\"mktoForm_1042\" action=\"\"><input type=\"hidden\" name=\"trp-form-language\" value=\"fr\"\/><\/form>\n<script>\n    var embeddedFormId = '3469ddc6f5089e38abe5d2f6859d7b8c66a1031c';\n    var marketoBaseUrl = '\/\/pages.swimlane.com';\n    var munchkinId = '978-QCM-390';\n    var formId = '1042';\n    var responseType = 'redirect';\n    var responseMessage = 'Thank you!';\n    var redirectURL = '';\n    var downloadFileURL = '';\n    var linkOpenType = '_self';\n    var popupVideo = 'url';\n    var popupVideoURL = '';\n    var popupVideoUploadURL = '';\n    MktoForms2.loadForm(marketoBaseUrl, munchkinId, formId, function(form) {\n        form.onSuccess(function(values, followUpUrl) {\n            document.getElementById(\"int_mktoForm_\" + formId).innerHTML = responseMessage;\n                    });\n    });\n<\/script>\n<div class=\"form-submit-note\" id=\"int_mktoForm_1042\"><\/div>\n<!-- Incluing form response options -->\n<\/div>\n<\/div>\n<\/div><\/section>","protected":false},"excerpt":{"rendered":"","protected":false},"author":66,"featured_media":9935,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"","learn_more_type":"","learn_more_link":[],"show_popup":false,"disable_iframe":false,"enable_lazy_loading":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","featured_page_list":[],"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"tags":[86],"resource-type":[67],"resource-topic":[],"resource-industry":[],"blog-category":[70],"class_list":["post-9934","sw_resource","type-sw_resource","status-publish","has-post-thumbnail","hentry","tag-research","resource-type-blogs","blog-category-secops"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>The top five long-term effects of the Target breach<\/title>\n<meta name=\"description\" content=\"Mastercard&#039;s rejected bank settlement is just one of numerous effects of the Target hack, here are five (5) others that will continue to impact business:\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swimlane.com\/fr\/blog\/les-5-principaux-effets-a-long-terme-de-la-breche-ciblee\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The top five long-term effects of the Target breach\" \/>\n<meta property=\"og:description\" content=\"Mastercard&#039;s rejected bank settlement is just one of numerous effects of the Target hack, here are five (5) others that will continue to impact business:\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swimlane.com\/fr\/blog\/les-5-principaux-effets-a-long-terme-de-la-breche-ciblee\/\" \/>\n<meta property=\"og:site_name\" content=\"AI Security Automation\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-06T10:40:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/2015-target-breach.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1120\" \/>\n\t<meta property=\"og:image:height\" content=\"696\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@swimlane\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Les cinq principaux effets \u00e0 long terme de la violation de donn\u00e9es chez Target","description":"Le refus de Mastercard d&#039;accorder un r\u00e8glement bancaire n&#039;est qu&#039;un des nombreux effets du piratage de Target. En voici cinq (5) autres qui continueront d&#039;avoir un impact sur les entreprises\u00a0:","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swimlane.com\/fr\/blog\/les-5-principaux-effets-a-long-terme-de-la-breche-ciblee\/","og_locale":"fr_FR","og_type":"article","og_title":"The top five long-term effects of the Target breach","og_description":"Mastercard's rejected bank settlement is just one of numerous effects of the Target hack, here are five (5) others that will continue to impact business:","og_url":"https:\/\/swimlane.com\/fr\/blog\/les-5-principaux-effets-a-long-terme-de-la-breche-ciblee\/","og_site_name":"AI Security Automation","article_modified_time":"2026-04-06T10:40:05+00:00","og_image":[{"width":1120,"height":696,"url":"https:\/\/swimlane.com\/wp-content\/uploads\/2015-target-breach.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@swimlane","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swimlane.com\/fr\/blog\/top-5-long-term-effects-of-the-target-breach\/","url":"https:\/\/swimlane.com\/fr\/blog\/top-5-long-term-effects-of-the-target-breach\/","name":"Les cinq principaux effets \u00e0 long terme de la violation de donn\u00e9es chez Target","isPartOf":{"@id":"https:\/\/swimlane.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swimlane.com\/fr\/blog\/top-5-long-term-effects-of-the-target-breach\/#primaryimage"},"image":{"@id":"https:\/\/swimlane.com\/fr\/blog\/top-5-long-term-effects-of-the-target-breach\/#primaryimage"},"thumbnailUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/2015-target-breach.png","datePublished":"2015-06-24T03:23:00+00:00","dateModified":"2026-04-06T10:40:05+00:00","description":"Le refus de Mastercard d&#039;accorder un r\u00e8glement bancaire n&#039;est qu&#039;un des nombreux effets du piratage de Target. En voici cinq (5) autres qui continueront d&#039;avoir un impact sur les entreprises\u00a0:","breadcrumb":{"@id":"https:\/\/swimlane.com\/fr\/blog\/top-5-long-term-effects-of-the-target-breach\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swimlane.com\/fr\/blog\/top-5-long-term-effects-of-the-target-breach\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/swimlane.com\/fr\/blog\/top-5-long-term-effects-of-the-target-breach\/#primaryimage","url":"https:\/\/swimlane.com\/wp-content\/uploads\/2015-target-breach.png","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/2015-target-breach.png","width":1120,"height":696,"caption":"Dart hitting bullseye target symbolizing precision, threat detection accuracy and measurable SOC performance outcomes."},{"@type":"BreadcrumbList","@id":"https:\/\/swimlane.com\/fr\/blog\/top-5-long-term-effects-of-the-target-breach\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swimlane.com\/"},{"@type":"ListItem","position":2,"name":"The top five long-term effects of the Target breach"}]},{"@type":"WebSite","@id":"https:\/\/swimlane.com\/fr\/#website","url":"https:\/\/swimlane.com\/fr\/","name":"Plateforme d&#039;automatisation de la s\u00e9curit\u00e9 low-code et SOAR | Swimlane","description":"Automatisation par IA agentique pour chaque fonction de s\u00e9curit\u00e9","publisher":{"@id":"https:\/\/swimlane.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swimlane.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/swimlane.com\/fr\/#organization","name":"Plateforme d&#039;automatisation de la s\u00e9curit\u00e9 low-code et SOAR | Swimlane","url":"https:\/\/swimlane.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/swimlane.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","width":912,"height":190,"caption":"Low-Code Security Automation & SOAR Platform | Swimlane"},"image":{"@id":"https:\/\/swimlane.com\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/swimlane","https:\/\/www.linkedin.com\/company\/swimlane\/"]}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/sw_resource\/9934","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/sw_resource"}],"about":[{"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/types\/sw_resource"}],"author":[{"embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/users\/66"}],"version-history":[{"count":1,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/sw_resource\/9934\/revisions"}],"predecessor-version":[{"id":55528,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/sw_resource\/9934\/revisions\/55528"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/media\/9935"}],"wp:attachment":[{"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/media?parent=9934"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/tags?post=9934"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/resource-type?post=9934"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/resource-topic?post=9934"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/resource-industry?post=9934"},{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/blog-category?post=9934"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}