
04/08/2025
How do you maintain data sovereignty in the cloud?
What is data sovereignty in the cloud, and why is it so important today? We discuss the issue with one of our experts.

News 01/07/2025
Protect your endpoints from cyber threats 24/7
Micro-SOC Endpoint protects your business from cyberattacks 24/7 without placing any additional demands on your own IT t…

News 26/05/2025
Watch our webinar: NIS2 compliance & IoT resilience
Is your business resilient to cybercrime and ready for the demands of NIS2? Our webinar helps you build a future-proof s…

News 21/03/2025
Cybersec Europe 2025: will you be there?
On 21 and 22 May, Cybersec Europe is coming to Brussels Expo. Visit the stand of Orange and discover our security soluti…

21/03/2025
Why is it that cyberattacks often succeed?
How do cybercriminals so often get what they want despite the best security solutions? We take a closer look.

26/02/2025
What IT challenges do Belgian companies face?
Organisations are increasingly going digital – and that also brings challenges. Discover how Belgian companies are dea…

26/02/2025
Cybersecurity in 2025: evolutions and trends
The 2025 Security Navigator report by Orange Cyberdefense outlines the latest insights in cybersecurity.

News 17/02/2025
Orange Phone app blocks your spam calls
Another spam call? Block unsafe numbers and gain time and peace of mind with the free Orange Phone app.

21/03/2025
‘SMEs raising employee awareness of cyberthreats is crucial’
40% of all cyberattacks target SMEs. Phédra Clouner of the CCB explains how companies can protect themselves.

News 26/11/2024
Privacy at the heart of the data journey
You have to protect your customers’ privacy at every step of the data journey, with complete transparency. We tell you…

News 22/11/2024
Focus on cybersecurity
With the right security solutions, you can focus on growing your business. How do you protect your confidential data?

News 18/10/2024
Orange boosts the NSSO’s cyber resilience
Orange keeps NSSO staff on their toes through training sessions and phishing simulations. This enhances their security a…