{"id":96137,"date":"2019-03-15T17:05:28","date_gmt":"2019-03-15T17:05:28","guid":{"rendered":"https:\/\/www.internetsociety.org\/blog\/2019\/03\/recherche-de-commentaires-canadiens-rapport-preliminaire-sur-la-securisation-de-linternet-des-objets-au-canada\/"},"modified":"2025-11-10T16:34:00","modified_gmt":"2025-11-10T16:34:00","slug":"recherche-de-commentaires-canadiens-rapport-preliminaire-sur-la-securisation-de-linternet-des-objets-au-canada","status":"publish","type":"post","link":"https:\/\/www.internetsociety.org\/fr\/blog\/2019\/03\/recherche-de-commentaires-canadiens-rapport-preliminaire-sur-la-securisation-de-linternet-des-objets-au-canada\/","title":{"rendered":"Recherche de commentaires canadiens&nbsp;: rapport pr\u00e9liminaire sur la s\u00e9curisation de l&rsquo;Internet des objets au Canada"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"","protected":false},"author":39,"featured_media":95887,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","footnotes":""},"categories":[185,170,156,4909],"tags":[6247],"region_news_regions":[142],"content_category":[6101],"ppma_author":[4053],"class_list":["post-96137","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-confiance","category-confidentialite","category-iot-fr","category-renforcer-internet","tag-internet-des-objets-ido","region_news_regions-amerique-du-nord","content_category-blog-type"],"acf":[],"uagb_featured_image_src":{"full":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/03\/Draft-Report-Securing-IoT-Canada.jpg",1280,550,false],"thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/03\/Draft-Report-Securing-IoT-Canada-150x150.jpg",150,150,true],"medium":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/03\/Draft-Report-Securing-IoT-Canada-450x193.jpg",450,193,true],"medium_large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/03\/Draft-Report-Securing-IoT-Canada-768x330.jpg",768,330,true],"large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/03\/Draft-Report-Securing-IoT-Canada-1024x440.jpg",1024,440,true],"1536x1536":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/03\/Draft-Report-Securing-IoT-Canada.jpg",1280,550,false],"2048x2048":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/03\/Draft-Report-Securing-IoT-Canada.jpg",1280,550,false],"post-thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/03\/Draft-Report-Securing-IoT-Canada-250x107.jpg",250,107,true],"square":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/03\/Draft-Report-Securing-IoT-Canada-600x550.jpg",600,550,true],"gform-image-choice-sm":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/03\/Draft-Report-Securing-IoT-Canada.jpg",300,129,false],"gform-image-choice-md":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/03\/Draft-Report-Securing-IoT-Canada.jpg",400,172,false],"gform-image-choice-lg":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/03\/Draft-Report-Securing-IoT-Canada.jpg",600,258,false]},"uagb_author_info":{"display_name":"Mark Buell","author_link":"https:\/\/www.internetsociety.org\/fr\/author\/buell\/"},"uagb_comment_info":0,"uagb_excerpt":null,"authors":[{"term_id":4053,"user_id":39,"is_guest":0,"slug":"buell","display_name":"Mark Buell","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/9923abedeb495281298a2e3ae929138fe0f89f4d5d897f44641198fa285c3a42?s=96&d=mm&r=g","0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/posts\/96137","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/users\/39"}],"replies":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/comments?post=96137"}],"version-history":[{"count":0,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/posts\/96137\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/media\/95887"}],"wp:attachment":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/media?parent=96137"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/categories?post=96137"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/tags?post=96137"},{"taxonomy":"region_news_regions","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/region_news_regions?post=96137"},{"taxonomy":"content_category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/content_category?post=96137"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/ppma_author?post=96137"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}