{"id":351,"date":"2022-11-16T18:03:05","date_gmt":"2022-11-16T17:03:05","guid":{"rendered":"https:\/\/industrial-cybersec.com\/?page_id=351"},"modified":"2026-04-02T15:30:10","modified_gmt":"2026-04-02T13:30:10","slug":"news","status":"publish","type":"page","link":"https:\/\/industrial-cybersec.com\/en\/news\/","title":{"rendered":"News"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"351\" class=\"elementor elementor-351\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-832c4c3 elementor-section-full_width elementor-section-height-min-height elementor-section-items-stretch elementor-section-height-default\" data-id=\"832c4c3\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-361d7b4\" data-id=\"361d7b4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-a7945e2 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a7945e2\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-256d8b6 elementor-invisible\" data-id=\"256d8b6\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;fadeInLeft&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9a837e3 elementor-hidden-mobile elementor-widget elementor-widget-image\" data-id=\"9a837e3\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;motion_fx_motion_fx_mouse&quot;:&quot;yes&quot;,&quot;motion_fx_mouseTrack_effect&quot;:&quot;yes&quot;,&quot;motion_fx_mouseTrack_speed&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:0.1,&quot;sizes&quot;:[]}}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"828\" height=\"815\" src=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Design-sans-titre-14-e1765285637919.png\" class=\"attachment-large size-large wp-image-2893\" alt=\"\" srcset=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Design-sans-titre-14-e1765285637919.png 828w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Design-sans-titre-14-e1765285637919-768x756.png 768w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Design-sans-titre-14-e1765285637919-12x12.png 12w\" sizes=\"(max-width: 828px) 100vw, 828px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-74882b9 elementor-invisible\" data-id=\"74882b9\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;fadeInRight&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-52a3a37 elementor-widget elementor-widget-heading\" data-id=\"52a3a37\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">News\n<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-550ed4e elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"550ed4e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-365ab24 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"365ab24\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e2efbba\" data-id=\"e2efbba\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-422cd5f elementor-cta--layout-image-left elementor-cta--tablet-layout-image-above elementor-cta--mobile-layout-image-above elementor-bg-transform elementor-bg-transform-zoom-out elementor-cta--skin-classic elementor-animated-content elementor-invisible elementor-widget elementor-widget-call-to-action\" data-id=\"422cd5f\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInLeft&quot;}\" data-widget_type=\"call-to-action.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-cta\">\n\t\t\t\t\t<div class=\"elementor-cta__bg-wrapper\">\n\t\t\t\t<div class=\"elementor-cta__bg elementor-bg\" style=\"background-image: url(https:\/\/industrial-cybersec.com\/wp-content\/uploads\/EIN-DC-Byte-1200.png);\" role=\"img\" aria-label=\"EIN-DC-Byte-1200\"><\/div>\n\t\t\t\t<div class=\"elementor-cta__bg-overlay\"><\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-cta__content\">\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h2 class=\"elementor-cta__title elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t\t2026 Data Centre Outlook: The Top Five Trends Reshaping Global Infrastructure Decisions (source: DC Byte)\t\t\t\t\t<\/h2>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-cta__description elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t\tCybersecurity poses an interesting business duality for today's IT service providers (ITSPs). ITSPs often lament their difficult daily battle against ark increasingly sophisticated threat landscape, while at the same time realizing that the need for nonstop vigilance drives demand and revenue for their businesses.\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-cta__button-wrapper elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t<a class=\"elementor-cta__button elementor-button elementor-size-\" href=\"https:\/\/www.dcbyte.com\/news-blogs\/2026-data-centre-outlook-top-five-trends\/\" target=\"_blank\">\n\t\t\t\t\t\tSee more\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0a0531b elementor-cta--layout-image-left elementor-cta--tablet-layout-image-above elementor-cta--mobile-layout-image-above elementor-cta--skin-classic elementor-animated-content elementor-bg-transform elementor-bg-transform-zoom-in elementor-invisible elementor-widget elementor-widget-call-to-action\" data-id=\"0a0531b\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInLeft&quot;}\" data-widget_type=\"call-to-action.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-cta\">\n\t\t\t\t\t<div class=\"elementor-cta__bg-wrapper\">\n\t\t\t\t<div class=\"elementor-cta__bg elementor-bg\" style=\"background-image: url(https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Capture-decran-2026-01-08-a-11.53.16.png);\" role=\"img\" aria-label=\"Screenshot 2026-01-08 at 11.53.16\"><\/div>\n\t\t\t\t<div class=\"elementor-cta__bg-overlay\"><\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-cta__content\">\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h2 class=\"elementor-cta__title elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t\tChannel Trends in Cybersecurity 2026 Benelux (source: GTIA)\t\t\t\t\t<\/h2>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-cta__description elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t\tCybersecurity represents a paradox for IT service providers: the proliferation and sophistication of cyberthreats complicates their day-to-day work, while generating a strong and enduring demand for their services. Although cybercrime can never be totally eradicated, cybersecurity is establishing itself as an essential pillar of the IT ecosystem, constantly evolving with digitalization and AI. This article introduces a GTIA study aimed at analyzing the position and opportunities of ITSPs, with a particular focus on the Benelux region.\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-cta__button-wrapper elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t<a class=\"elementor-cta__button elementor-button elementor-size-\" href=\"https:\/\/gtia.org\/hubfs\/Channel%20Trends%20in%20Cybersecurity%20Benelux%202025.pdf\" target=\"_blank\">\n\t\t\t\t\t\tSee more\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-14056f0 elementor-cta--layout-image-below elementor-cta--tablet-layout-image-above elementor-cta--mobile-layout-image-above elementor-cta--skin-classic elementor-animated-content elementor-bg-transform elementor-bg-transform-zoom-in elementor-invisible elementor-widget elementor-widget-call-to-action\" data-id=\"14056f0\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInRight&quot;}\" data-widget_type=\"call-to-action.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-cta\">\n\t\t\t\t\t<div class=\"elementor-cta__bg-wrapper\">\n\t\t\t\t<div class=\"elementor-cta__bg elementor-bg\" style=\"background-image: url(https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Senza-titolo.jpg);\" role=\"img\" aria-label=\"Untitled\"><\/div>\n\t\t\t\t<div class=\"elementor-cta__bg-overlay\"><\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-cta__content\">\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h2 class=\"elementor-cta__title elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t\tCybersecurity: a unique map of over 300 European solutions\t\t\t\t\t<\/h2>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-cta__description elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t\tCyber Panorama is a unique map of sovereign cybersecurity solutions available in France and Europe. Designed as an operational guide, this radar aims to structure a thriving but often overlooked market and give European players greater visibility in the face of offerings from elsewhere.\nCyberxpert, the leading distributor and integrator of sovereign \u00abmade in Europe\u00bb solutions in Belgium and Luxembourg, already offers more than 20 solutions to protect corporate information systems.\n\nThis overview has been published by CESIN (Club des Experts de la S\u00e9curit\u00e9 de l'Information et du Num\u00e9rique) and Hexatrust, presenting a new tool designed to help provide greater clarity. CyberXpert is a member of Hexatrust.\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4e42776 elementor-cta--layout-image-left elementor-cta--tablet-layout-image-above elementor-cta--mobile-layout-image-above elementor-bg-transform elementor-bg-transform-zoom-out elementor-cta--skin-classic elementor-animated-content elementor-invisible elementor-widget elementor-widget-call-to-action\" data-id=\"4e42776\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInLeft&quot;}\" data-widget_type=\"call-to-action.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-cta\">\n\t\t\t\t\t<div class=\"elementor-cta__bg-wrapper\">\n\t\t\t\t<div class=\"elementor-cta__bg elementor-bg\" style=\"background-image: url(https:\/\/industrial-cybersec.com\/wp-content\/uploads\/7547314.jpg.webp);\" role=\"img\" aria-label=\"7547314.jpg\"><\/div>\n\t\t\t\t<div class=\"elementor-cta__bg-overlay\"><\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-cta__content\">\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h2 class=\"elementor-cta__title elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t\tAWS also considers sovereign cloud to be a form of disaster recovery.\t\t\t\t\t<\/h2>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-cta__description elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t\tA surprising observation during the AWS re:Invent conference in Las Vegas: the term \u2018sovereignty\u2019 was barely mentioned. Little new information was provided regarding AWS's European Sovereign Cloud. Yet digital sovereignty is one of the priorities for European companies.\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-cta__button-wrapper elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t<a class=\"elementor-cta__button elementor-button elementor-size-\" href=\"https:\/\/datanews.levif.be\/analyse\/arriere-plan\/aws-considere-aussi-le-cloud-souverain-comme-une-forme-de-reprise-apres-sinistre\/\" target=\"_blank\">\n\t\t\t\t\t\tSee more\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5bde0af elementor-cta--layout-image-right elementor-cta--tablet-layout-image-above elementor-cta--mobile-layout-image-above elementor-cta--skin-classic elementor-animated-content elementor-bg-transform elementor-bg-transform-zoom-in elementor-invisible elementor-widget elementor-widget-call-to-action\" data-id=\"5bde0af\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInRight&quot;}\" data-widget_type=\"call-to-action.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-cta\">\n\t\t\t\t\t<div class=\"elementor-cta__bg-wrapper\">\n\t\t\t\t<div class=\"elementor-cta__bg elementor-bg\" style=\"background-image: url(https:\/\/industrial-cybersec.com\/wp-content\/uploads\/data-breach-recap-2025.webp);\" role=\"img\" aria-label=\"data-breach-recap-2025\"><\/div>\n\t\t\t\t<div class=\"elementor-cta__bg-overlay\"><\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-cta__content\">\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h2 class=\"elementor-cta__title elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t\tLooking back to 2025: key figures for global data breaches (source: Surfshark)\t\t\t\t\t<\/h2>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-cta__description elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-cta__button-wrapper elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t<a class=\"elementor-cta__button elementor-button elementor-size-\" href=\"https:\/\/surfshark.com\/research\/study\/data-breach-recap-2025\" target=\"_blank\">\n\t\t\t\t\t\tSee more\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-96fbef6 elementor-cta--layout-image-right elementor-cta--tablet-layout-image-above elementor-cta--mobile-layout-image-above elementor-cta--skin-classic elementor-animated-content elementor-bg-transform elementor-bg-transform-zoom-in elementor-invisible elementor-widget elementor-widget-call-to-action\" data-id=\"96fbef6\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInRight&quot;}\" data-widget_type=\"call-to-action.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-cta\">\n\t\t\t\t\t<div class=\"elementor-cta__bg-wrapper\">\n\t\t\t\t<div class=\"elementor-cta__bg elementor-bg\" style=\"background-image: url(https:\/\/industrial-cybersec.com\/wp-content\/uploads\/cyber-security-article.jpg);\" role=\"img\" aria-label=\"cyber-security-article\"><\/div>\n\t\t\t\t<div class=\"elementor-cta__bg-overlay\"><\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-cta__content\">\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h2 class=\"elementor-cta__title elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t\tBE PREPARED: a look back at the event and launch of the campaign\t\t\t\t\t<\/h2>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-cta__description elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t\tThis week, more than 800 CEOs, captains of industry, decision-makers, academics, and politicians attended BE PREPARED, the event at which the FEB launched its campaign of the same name. Risk management starts with good preparation. Better still, being well prepared allows you to avoid many problems before they even arise.\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-cta__button-wrapper elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t<a class=\"elementor-cta__button elementor-button elementor-size-\" href=\"https:\/\/www.vbo-feb.be\/fr\/nouvelles\/be-prepared-retour-sur-levenement-et-lancement-de-la-campagne\/\" target=\"_blank\">\n\t\t\t\t\t\tSee more\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-34b0d8f elementor-cta--layout-image-right elementor-cta--tablet-layout-image-above elementor-cta--mobile-layout-image-above elementor-cta--skin-classic elementor-animated-content elementor-bg-transform elementor-bg-transform-zoom-in elementor-invisible elementor-widget elementor-widget-call-to-action\" data-id=\"34b0d8f\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInRight&quot;}\" data-widget_type=\"call-to-action.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-cta\">\n\t\t\t\t\t<div class=\"elementor-cta__bg-wrapper\">\n\t\t\t\t<div class=\"elementor-cta__bg elementor-bg\" style=\"background-image: url(https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Capture-decran-2022-11-21-105845.png);\" role=\"img\" aria-label=\"Screenshot 2022-11-21 105845\"><\/div>\n\t\t\t\t<div class=\"elementor-cta__bg-overlay\"><\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-cta__content\">\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h2 class=\"elementor-cta__title elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t\tIndustrial safety in the manufacturing industry (source: Agoria)\t\t\t\t\t<\/h2>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-cta__description elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t\tWhich companies are doing well?\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-cta__button-wrapper elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t<a class=\"elementor-cta__button elementor-button elementor-size-\" href=\"https:\/\/www.orangecyberdefense.com\/global\/\" target=\"_blank\">\n\t\t\t\t\t\tSee more\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3853dbb elementor-cta--layout-image-right elementor-cta--tablet-layout-image-above elementor-cta--mobile-layout-image-above elementor-cta--skin-classic elementor-animated-content elementor-bg-transform elementor-bg-transform-zoom-in elementor-invisible elementor-widget elementor-widget-call-to-action\" data-id=\"3853dbb\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInRight&quot;}\" data-widget_type=\"call-to-action.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-cta\">\n\t\t\t\t\t<div class=\"elementor-cta__bg-wrapper\">\n\t\t\t\t<div class=\"elementor-cta__bg elementor-bg\" style=\"background-image: url(https:\/\/industrial-cybersec.com\/wp-content\/uploads\/IMAGE-IT-FOR-BUSINESS.png);\" role=\"img\" aria-label=\"IMAGE IT FOR BUSINESS\"><\/div>\n\t\t\t\t<div class=\"elementor-cta__bg-overlay\"><\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-cta__content\">\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h2 class=\"elementor-cta__title elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t\tDigital Resilience Index (DRI): the thermometer for managing dependencies (source: IT for Business) \t\t\t\t\t<\/h2>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-cta__description elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t\tOn January 26, 2026, at Bercy, the Digital Resilience Index (IRN) will be officially launched. Designed as a \u00abComex-compatible\u00bb steering tool, it aims to make technological dependencies measurable - and therefore arbitrable - across the entire stack, critical system by critical system. A method for getting out of the fog, and finally making informed decisions.\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-cta__button-wrapper elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t<a class=\"elementor-cta__button elementor-button elementor-size-\" href=\"https:\/\/www.itforbusiness.fr\/indice-de-resilience-numerique-irn-le-thermometre-pour-gouverner-ses-dependances-99428\" target=\"_blank\">\n\t\t\t\t\t\tSee more\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3002922 elementor-cta--layout-image-left elementor-cta--tablet-layout-image-above elementor-cta--mobile-layout-image-above elementor-cta--skin-classic elementor-animated-content elementor-bg-transform elementor-bg-transform-zoom-in elementor-invisible elementor-widget elementor-widget-call-to-action\" data-id=\"3002922\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInRight&quot;}\" data-widget_type=\"call-to-action.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-cta\">\n\t\t\t\t\t<div class=\"elementor-cta__bg-wrapper\">\n\t\t\t\t<div class=\"elementor-cta__bg elementor-bg\" style=\"background-image: url(https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Capture-decran-2026-01-30-a-10.09.46.png);\" role=\"img\" aria-label=\"Screenshot 2026-01-30 at 10.09.46\"><\/div>\n\t\t\t\t<div class=\"elementor-cta__bg-overlay\"><\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-cta__content\">\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h2 class=\"elementor-cta__title elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t\tThe price of sovereignty: \u2018Countries will have to set aside 1 percent of their GDP for their AI\u2019 ( Source: Trends DataNews)\t\t\t\t\t<\/h2>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-cta__description elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t\tGeopolitical tensions and regulations are forcing public authorities to make major investments, if they are to have their own independent AI infrastructure.\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-cta__button-wrapper elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t<a class=\"elementor-cta__button elementor-button elementor-size-\" href=\"https:\/\/datanews.levif.be\/analyse\/le-prix-de-la-souverainete-les-pays-devront-reserver-1-pour-cent-de-leur-pib-pour-leur-ia\/?cel_hash=5faa0173c4111a936abfb9f7f153956e50f344eb&#038;chts=1769708741&#038;utm_source=Newsletter-20260129&#038;utm_medium=Email&#038;utm_campaign=Newsletter-RNBDATANFR\" target=\"_blank\">\n\t\t\t\t\t\tSee more\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5b513da elementor-cta--layout-image-left elementor-cta--tablet-layout-image-above elementor-cta--mobile-layout-image-above elementor-cta--skin-classic elementor-animated-content elementor-bg-transform elementor-bg-transform-zoom-in elementor-invisible elementor-widget elementor-widget-call-to-action\" data-id=\"5b513da\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInRight&quot;}\" data-widget_type=\"call-to-action.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-cta\">\n\t\t\t\t\t<div class=\"elementor-cta__bg-wrapper\">\n\t\t\t\t<div class=\"elementor-cta__bg elementor-bg\" style=\"background-image: url(https:\/\/industrial-cybersec.com\/wp-content\/uploads\/1770769094535.png);\" role=\"img\" aria-label=\"1770769094535\"><\/div>\n\t\t\t\t<div class=\"elementor-cta__bg-overlay\"><\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-cta__content\">\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h2 class=\"elementor-cta__title elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t\tCybersecurity in the MENA region: the new geopolitical frontier you can no longer ignore (source Tech Pulse Insights)\t\t\t\t\t<\/h2>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-cta__description elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t\tIn 2024, the average cost of a cyber attack in the MENA region will reach $7.29 million, according to IBM's Cost of a Data Breach Report. Cybersecurity is now a cross-functional issue that extends beyond IT departments, with measurable financial, operational and reputational impacts. Cyberspace is now a structured environment of confrontation, with growing strategic implications for organizations.\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-cta__button-wrapper elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t<a class=\"elementor-cta__button elementor-button elementor-size-\" href=\"https:\/\/www.linkedin.com\/pulse\/cybers%C3%A9curit%C3%A9-dans-la-r%C3%A9gion-mena-nouvelle-fronti%C3%A8re-que-bouabdallah-y82lf\/\" target=\"_blank\">\n\t\t\t\t\t\tSee more\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-62291a1 elementor-cta--layout-image-left elementor-cta--tablet-layout-image-above elementor-cta--mobile-layout-image-above elementor-cta--skin-classic elementor-animated-content elementor-bg-transform elementor-bg-transform-zoom-in elementor-invisible elementor-widget elementor-widget-call-to-action\" data-id=\"62291a1\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInRight&quot;}\" data-widget_type=\"call-to-action.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-cta\">\n\t\t\t\t\t<div class=\"elementor-cta__bg-wrapper\">\n\t\t\t\t<div class=\"elementor-cta__bg elementor-bg\" style=\"background-image: url(https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Capture-decran-2026-01-26-a-11.17.01.png);\" role=\"img\" aria-label=\"Screenshot 2026-01-26 at 11.17.01\"><\/div>\n\t\t\t\t<div class=\"elementor-cta__bg-overlay\"><\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-cta__content\">\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h2 class=\"elementor-cta__title elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t\tThe impact of data center growth on the Belgian energy system (source: BCG)\t\t\t\t\t<\/h2>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-cta__description elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t\tElectricity demand from data centers in Belgium could double or even quintuple by 2035, driven by the growth of AI and the cloud, increasing their share of national consumption from 4% to over 10%. This expansion, encouraged by the saturation of traditional European hubs, positions Belgium as a strategic alternative, but raises major issues for its energy system, notably low-carbon access and management of an already constrained grid.\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-cta__button-wrapper elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t<a class=\"elementor-cta__button elementor-button elementor-size-\" href=\"https:\/\/web-assets.bcg.com\/f9\/d3\/f35435ce484e93d0fe1e9dfdc70b\/the-power-of-compute-the-effects-of-data-center-growth-on-belgiums-energy-system-r.pdf\" target=\"_blank\">\n\t\t\t\t\t\tSee more\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e6499a8 elementor-cta--layout-image-left elementor-cta--tablet-layout-image-above elementor-cta--mobile-layout-image-above elementor-cta--skin-classic elementor-animated-content elementor-bg-transform elementor-bg-transform-zoom-in elementor-invisible elementor-widget elementor-widget-call-to-action\" data-id=\"e6499a8\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInRight&quot;}\" data-widget_type=\"call-to-action.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-cta\">\n\t\t\t\t\t<div class=\"elementor-cta__bg-wrapper\">\n\t\t\t\t<div class=\"elementor-cta__bg elementor-bg\" style=\"background-image: url(https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Sinistralite-Stoik.webp);\" role=\"img\" aria-label=\"Sinistralite-Stoik\"><\/div>\n\t\t\t\t<div class=\"elementor-cta__bg-overlay\"><\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-cta__content\">\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h2 class=\"elementor-cta__title elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t\tCyber risks are on the rise in Europe: cyber insurer Sto\u00efk has recorded a claims frequency 2.5 times higher than in 2024 (Source: Sto\u00efk)\t\t\t\t\t<\/h2>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-cta__description elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t\tFor the third time, Sto\u00efk, Europe's leading insurtech specializing in cyber risks for businesses, publishes its annual claims report. The Sto\u00efk <b>CERT (Computer Emergency Response Team) <\/b>In this report, Sto\u00efk analyses the cyber incidents encountered by its customers. The aim of the report is to provide a clear picture of the cyber challenges facing European companies. \t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-cta__button-wrapper elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t<a class=\"elementor-cta__button elementor-button elementor-size-\" href=\"https:\/\/www.stoik.com\/rapport-sinistralite-2025\" target=\"_blank\">\n\t\t\t\t\t\tSee more\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3e9eb85 elementor-cta--layout-image-right elementor-cta--tablet-layout-image-above elementor-cta--mobile-layout-image-above elementor-cta--skin-classic elementor-animated-content elementor-bg-transform elementor-bg-transform-zoom-in elementor-invisible elementor-widget elementor-widget-call-to-action\" data-id=\"3e9eb85\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInRight&quot;}\" data-widget_type=\"call-to-action.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-cta\">\n\t\t\t\t\t<div class=\"elementor-cta__bg-wrapper\">\n\t\t\t\t<div class=\"elementor-cta__bg elementor-bg\" style=\"background-image: url(https:\/\/industrial-cybersec.com\/wp-content\/uploads\/images-news-scaled.jpg);\" role=\"img\" aria-label=\"images news\"><\/div>\n\t\t\t\t<div class=\"elementor-cta__bg-overlay\"><\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-cta__content\">\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h2 class=\"elementor-cta__title elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t\tDiving into the heart of technology: the Tech Deep Dive (source: Trends DataNews)\t\t\t\t\t<\/h2>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-cta__description elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t\tIn this Tech Deep Dive, we go beyond the daily news. Each week, we'll focus on a crucial technological trend, a major breakthrough, market dynamics and decision-making keys, an interview or a concrete use case. But always with the same objective: to prepare you for the challenges of tomorrow. As always, you'll find the day's news in our daily newsletter, which will soon be bringing you the top 10 tech news stories every day. Everything you need to keep abreast of the latest technological developments.\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-cta__button-wrapper elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t<a class=\"elementor-cta__button elementor-button elementor-size-\" href=\"https:\/\/mail.datanews.be\/optiext\/optiextension.dll?ID=5qFs-YgwgsdNwFxIxCG2q3FRqeiFtiCyIJ1bSOB0NJ8j9ZyAeiGu4axYQf--lC29ifxN-ivMZuXRrdpKjSOBP5bgx6HHO2qBoeR0QJ4N\" target=\"_blank\">\n\t\t\t\t\t\tSee more\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8695e16 elementor-cta--layout-image-right elementor-cta--tablet-layout-image-above elementor-cta--mobile-layout-image-above elementor-cta--skin-classic elementor-animated-content elementor-bg-transform elementor-bg-transform-zoom-in elementor-invisible elementor-widget elementor-widget-call-to-action\" data-id=\"8695e16\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInRight&quot;}\" data-widget_type=\"call-to-action.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-cta\">\n\t\t\t\t\t<div class=\"elementor-cta__bg-wrapper\">\n\t\t\t\t<div class=\"elementor-cta__bg elementor-bg\" style=\"background-image: url(https:\/\/industrial-cybersec.com\/wp-content\/uploads\/c5c8b00_upload-1-veogbvzv735f-000-937f472.avif);\" role=\"img\" aria-label=\"c5c8b00_upload-1-veogbvzv735f-000-937f472\"><\/div>\n\t\t\t\t<div class=\"elementor-cta__bg-overlay\"><\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-cta__content\">\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h2 class=\"elementor-cta__title elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t\tEconomic sovereignty: the urgent need for a European strategy (Source : Le Monde)\t\t\t\t\t<\/h2>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-cta__description elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t\tIt is high time for the EU-27 to overcome their divisions if they are to secure their economic future. In the face of China's power and American tariffs, this will require greater protection of strategic sectors and a joint investment plan for industry.\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-cta__button-wrapper elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t<a class=\"elementor-cta__button elementor-button elementor-size-\" href=\"https:\/\/www.lemonde.fr\/idees\/article\/2026\/02\/11\/souverainete-economique-l-urgence-d-une-strategie-europeenne_6666303_3232.html\" target=\"_blank\">\n\t\t\t\t\t\tSee more\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-affb759 elementor-cta--layout-image-left elementor-cta--tablet-layout-image-above elementor-cta--mobile-layout-image-above elementor-cta--skin-classic elementor-animated-content elementor-bg-transform elementor-bg-transform-zoom-in elementor-invisible elementor-widget elementor-widget-call-to-action\" data-id=\"affb759\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInRight&quot;}\" data-widget_type=\"call-to-action.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-cta\">\n\t\t\t\t\t<div class=\"elementor-cta__bg-wrapper\">\n\t\t\t\t<div class=\"elementor-cta__bg elementor-bg\" style=\"background-image: url(https:\/\/industrial-cybersec.com\/wp-content\/uploads\/1770888979339.jpeg);\" role=\"img\" aria-label=\"1770888979339\"><\/div>\n\t\t\t\t<div class=\"elementor-cta__bg-overlay\"><\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-cta__content\">\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h2 class=\"elementor-cta__title elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t\tSovereignty: time to wake up (and get moving) (source: Control-Alt-Delete)\t\t\t\t\t<\/h2>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-cta__description elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t\tIn industry, \u201csovereignty\u201d is no longer just a buzzword. The issue of control over data, OT\/IT environments and critical systems is now at the heart of cybersecurity strategies. More and more positions are being taken - but above all, pragmatic solutions are taking shape to meet the new demands for resilience and autonomy.\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-cta__button-wrapper elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t<a class=\"elementor-cta__button elementor-button elementor-size-\" href=\"https:\/\/www.linkedin.com\/pulse\/sovereignty-time-get-real-maybe-move-some-stuff-enrico-signoretti-4ehvf\/\" target=\"_blank\">\n\t\t\t\t\t\tSee more\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1c00fcf elementor-cta--layout-image-right elementor-cta--tablet-layout-image-above elementor-cta--mobile-layout-image-above elementor-cta--skin-classic elementor-animated-content elementor-bg-transform elementor-bg-transform-zoom-in elementor-invisible elementor-widget elementor-widget-call-to-action\" data-id=\"1c00fcf\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInRight&quot;}\" data-widget_type=\"call-to-action.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-cta\">\n\t\t\t\t\t<div class=\"elementor-cta__bg-wrapper\">\n\t\t\t\t<div class=\"elementor-cta__bg elementor-bg\" style=\"background-image: url(https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Data_Center.avif);\" role=\"img\" aria-label=\"Data_Center\"><\/div>\n\t\t\t\t<div class=\"elementor-cta__bg-overlay\"><\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-cta__content\">\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h2 class=\"elementor-cta__title elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t\tMistral AI boosts its infrastructure with EcoDataCenter (source : LEBIGDATA.FR)\t\t\t\t\t<\/h2>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-cta__description elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t\tFrench champion Mistral AI strikes a blow in Sweden with a record investment of 1.2 billion euros. Between the quest for a European 100 % infrastructure and the reality...\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-cta__button-wrapper elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t<a class=\"elementor-cta__button elementor-button elementor-size-\" href=\"https:\/\/newsletter.lebigdata.fr\/p\/runway-leve-315-m-pour-sortir-l-ia-video-du-divertissement-1?_bhlid=c13c8f4bf7d7ec75beb9c82a21da5fae6f641afe\" target=\"_blank\">\n\t\t\t\t\t\tSee more\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0aa8b5c elementor-cta--layout-image-left elementor-cta--tablet-layout-image-above elementor-cta--mobile-layout-image-above elementor-cta--skin-classic elementor-animated-content elementor-bg-transform elementor-bg-transform-zoom-in elementor-invisible elementor-widget elementor-widget-call-to-action\" data-id=\"0aa8b5c\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInRight&quot;}\" data-widget_type=\"call-to-action.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-cta\">\n\t\t\t\t\t<div class=\"elementor-cta__bg-wrapper\">\n\t\t\t\t<div class=\"elementor-cta__bg elementor-bg\" style=\"background-image: url(https:\/\/industrial-cybersec.com\/wp-content\/uploads\/BDO_CompanyBarometer2025_12000x630.jpg);\" role=\"img\" aria-label=\"BDO_CompanyBarometer2025_12000x630\"><\/div>\n\t\t\t\t<div class=\"elementor-cta__bg-overlay\"><\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-cta__content\">\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h2 class=\"elementor-cta__title elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t\tBDO Business Barometer 2025 (source BDO)\t\t\t\t\t<\/h2>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-cta__description elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t\tWhile the headlines speak of economic uncertainty, BDO wanted to know how Belgian companies are reacting in concrete terms: are they investing, what technologies are they favoring, and how are they preparing for obligations such as electronic invoicing? The third edition of the Business Barometer, based on responses from 432 managers, reveals the strategies that will shape the Belgian business landscape in 2025.\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-cta__button-wrapper elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t<a class=\"elementor-cta__button elementor-button elementor-size-\" href=\"https:\/\/www.bdo.be\/fr-be\/publications\/rapports\/2025\/barometre-des-entreprises-de-bdo#form\" target=\"_blank\">\n\t\t\t\t\t\tSee more\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bae5ff2 elementor-cta--layout-image-right elementor-cta--tablet-layout-image-above elementor-cta--mobile-layout-image-above elementor-cta--skin-classic elementor-animated-content elementor-bg-transform elementor-bg-transform-zoom-in elementor-invisible elementor-widget elementor-widget-call-to-action\" data-id=\"bae5ff2\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInRight&quot;}\" data-widget_type=\"call-to-action.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-cta\">\n\t\t\t\t\t<div class=\"elementor-cta__bg-wrapper\">\n\t\t\t\t<div class=\"elementor-cta__bg elementor-bg\" style=\"background-image: url(https:\/\/industrial-cybersec.com\/wp-content\/uploads\/datacenterAI-640x320-1.png);\" role=\"img\" aria-label=\"datacenterAI-640x320\"><\/div>\n\t\t\t\t<div class=\"elementor-cta__bg-overlay\"><\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-cta__content\">\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h2 class=\"elementor-cta__title elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t\tData center capital expenditure jumps by 57 % in 2025, driven by accelerating AI deployments (source: Dell'Oro Group)\t\t\t\t\t<\/h2>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-cta__description elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t\tCloud giants and AI developers are expected to maintain massive investments in 2026, extending the current momentum.\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-cta__button-wrapper elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t<a class=\"elementor-cta__button elementor-button elementor-size-\" href=\"https:\/\/www.delloro.com\/news\/data-center-capex-surges-57-percent-in-2025-as-ai-deployments-accelerate\/?utm_source=substack&#038;utm_medium=email\" target=\"_blank\">\n\t\t\t\t\t\tSee more\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dd49938 elementor-cta--layout-image-left elementor-cta--tablet-layout-image-above elementor-cta--mobile-layout-image-above elementor-cta--skin-classic elementor-animated-content elementor-bg-transform elementor-bg-transform-zoom-in elementor-invisible elementor-widget elementor-widget-call-to-action\" data-id=\"dd49938\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInRight&quot;}\" data-widget_type=\"call-to-action.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-cta\">\n\t\t\t\t\t<div class=\"elementor-cta__bg-wrapper\">\n\t\t\t\t<div class=\"elementor-cta__bg elementor-bg\" style=\"background-image: url(https:\/\/industrial-cybersec.com\/wp-content\/uploads\/exterior.jpg);\" role=\"img\" aria-label=\"exterior\"><\/div>\n\t\t\t\t<div class=\"elementor-cta__bg-overlay\"><\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-cta__content\">\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h2 class=\"elementor-cta__title elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t\t2026, Redefining Security and Compliance (Source: Solutions Magazine)\t\t\t\t\t<\/h2>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-cta__description elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t\tIn 2026, security and compliance become strategic pillars, driven by AI and continuous risk management, in a context of reinforced digital sovereignty at the heart of exchanges such as the <b><i>Resilience and Sovereignty Convention<\/i><\/b>, The company's strategy is based on a proactive, integrated approach.\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-cta__button-wrapper elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t<a class=\"elementor-cta__button elementor-button elementor-size-\" href=\"https:\/\/www.solutions-magazine.com\/2026-redefinition-securite-conformite\/\" target=\"_blank\">\n\t\t\t\t\t\tSee more\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bae04fa elementor-cta--layout-image-right elementor-cta--tablet-layout-image-above elementor-cta--mobile-layout-image-above elementor-cta--skin-classic elementor-animated-content elementor-bg-transform elementor-bg-transform-zoom-in elementor-invisible elementor-widget elementor-widget-call-to-action\" data-id=\"bae04fa\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInRight&quot;}\" data-widget_type=\"call-to-action.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-cta\">\n\t\t\t\t\t<div class=\"elementor-cta__bg-wrapper\">\n\t\t\t\t<div class=\"elementor-cta__bg elementor-bg\" style=\"background-image: url(https:\/\/industrial-cybersec.com\/wp-content\/uploads\/mistral-ai-revolutionne-lia-avec-son-datacenter.jpeg);\" role=\"img\" aria-label=\"mistral-ai-revolutionne-lia-with-its-datacenter\"><\/div>\n\t\t\t\t<div class=\"elementor-cta__bg-overlay\"><\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-cta__content\">\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h2 class=\"elementor-cta__title elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t\tMistral borrows 720 million euros to build a vast data center near Paris (source Trend Data News)\t\t\t\t\t<\/h2>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-cta__description elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t\tMistral, a European developer of language models and AI tools, has taken out a new loan of some 720 million euros for the acquisition of 13,800 Nvidia chips. These will be destined for a vast data center near Paris. For Mistral, this loan represents an important step towards expanding the capacity of its new data center.\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-cta__button-wrapper elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t<a class=\"elementor-cta__button elementor-button elementor-size-\" href=\"https:\/\/datanews.levif.be\/actualite\/entreprises\/finances\/mistral-emprunte-720-millions-deuros-pour-construire-un-vaste-centre-de-donnees-pres-de-paris\/?cel_hash=5faa0173c4111a936abfb9f7f153956e50f344eb&#038;chts=1774947669&#038;utm_source=Newsletter-20260330&#038;utm_medium=Email&#038;utm_campaign=Newsletter-RNBDATANFR\" target=\"_blank\">\n\t\t\t\t\t\tSee more\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-59dee59 elementor-cta--layout-image-right elementor-cta--tablet-layout-image-above elementor-cta--mobile-layout-image-above elementor-cta--skin-classic elementor-animated-content elementor-bg-transform elementor-bg-transform-zoom-in elementor-invisible elementor-widget elementor-widget-call-to-action\" data-id=\"59dee59\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInRight&quot;}\" data-widget_type=\"call-to-action.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-cta\">\n\t\t\t\t\t<div class=\"elementor-cta__bg-wrapper\">\n\t\t\t\t<div class=\"elementor-cta__bg elementor-bg\" style=\"background-image: url(https:\/\/industrial-cybersec.com\/wp-content\/uploads\/telechargement-1.jpeg);\" role=\"img\" aria-label=\"download (1)\"><\/div>\n\t\t\t\t<div class=\"elementor-cta__bg-overlay\"><\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-cta__content\">\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h2 class=\"elementor-cta__title elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t\t7 steps to digital sovereignty and why it's necessary (Source: Data Trend News)\t\t\t\t\t<\/h2>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-cta__description elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t\tIn the face of dependency on digital giants, Jo Caudron, founder of DearMedai and SocialSeeder, proposes 7 steps to regain control of digital data and infrastructure.\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-cta__button-wrapper elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t<a class=\"elementor-cta__button elementor-button elementor-size-\" href=\"https:\/\/datanews.levif.be\/opinion\/en-7-etapes-vers-la-souverainete-numerique-et-pourquoi-elle-est-necessaire\/\" target=\"_blank\">\n\t\t\t\t\t\tSee more\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Actualit\u00e9s 2026 Data Centre Outlook: The Top Five Trends Reshaping Global Infrastructure Decisions (source : DC Byte) Cybersecurity poses an interesting business duality for today&rsquo;s IT service providers (ITSPs). ITSPs often lament their difficult daily battle against ark increasingly sophisticated threat landscape, while at the same time realizing that the need for nonstop vigilance drives [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-351","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/industrial-cybersec.com\/en\/wp-json\/wp\/v2\/pages\/351","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/industrial-cybersec.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/industrial-cybersec.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/industrial-cybersec.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/industrial-cybersec.com\/en\/wp-json\/wp\/v2\/comments?post=351"}],"version-history":[{"count":120,"href":"https:\/\/industrial-cybersec.com\/en\/wp-json\/wp\/v2\/pages\/351\/revisions"}],"predecessor-version":[{"id":3863,"href":"https:\/\/industrial-cybersec.com\/en\/wp-json\/wp\/v2\/pages\/351\/revisions\/3863"}],"wp:attachment":[{"href":"https:\/\/industrial-cybersec.com\/en\/wp-json\/wp\/v2\/media?parent=351"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}