Latest Stories

Stay up-to-date with everything at Approach

Publication

Digital sovereignty: What’s the fuss about?

Publication date

15.04.2026

This is a cover image of the Digital Sovereignty whitepaper of Approach Cyber.
Three years ago, no one was talking about it, and now it feels like the term “digital sovereignty” is popping up everywhere. That’s no coincidence. It’s not a sudden hype, but the result of a storm of geopolitical, legal, and technological developments that have gained momentum in recent years.

Download the whitepaper and discover the principles of digital sovereignty and why it is important for Europe, its organizations, and its citizens.

 

Download the whitepaper

OTHER STORIES

For years, threat modeling was the mark of a mature security team: valuable, recommended, but ultimately optional. That era is over. With the EU Cyber Resilience Act and NIS2 now shaping how software must be built across Europe, threat modeling has quietly become a compliance obligation. The question is no longer whether your team should do it. It’s whether your team is equipped to do it well.
Across Belgium, the NIS2 directive is no longer a distant regulatory change, it is becoming a concrete operational obligation. With the Belgian transposition now in force and the first compliance milestones already activated, organisations must ensure they are not only aware of the upcoming deadlines but actively preparing to demonstrate progress.
Anonymisation isn’t just a compliance tactic — it’s a strategic enabler that reduces risk, builds trust, and unlocks data for innovation. In this practical guide, our Data protection expert Ana-Maria Luca explains why anonymisation matters, how it strengthens smarter data governance, and how organisations can get started through a phased approach.

Contact us to learn more about our services and solutions

Our team will help you start your journey towards cyber serenity

Do you prefer to send us an email?