Latest blog articles
-
On 30 May 2024, the Council of the European Union announced its final approval of the Union’s long anticipated withdrawal from what can fairly be labelled as the most controversial international treaty ever, the Energy Charter Treaty (ECT).
-
As the 37th edition of TEFAF Maastricht is set to welcome visitors from 9th to 14th of March, many will remember the armed jewel heist that took place almost two years ago. During TEFAF opening hours on 28th of June 2022, five men violently smashed a display case with a sledgehammer, removed...
-
Last year’s COP28 has resulted in a ‘historic’ mention of fossil fuels in its final decision, be it in a rather limited way. Where does the EU, the forerunner in climate action, stand when it comes to the elimination of fossil fuels? This post highlights a few problematic features of the EU’s policy...
-
Why it is so challenging for Dutch authorities to effectively implement the government policy against serious drug related organized crime? Recently, my colleagues and I from Maastricht University and Erasmus University Rotterdam published an article in the Dutch Tijdschrift over Cultuur en...
-
The debate on the implications of Dutch colonial rule in Indonesia recently intensified after a report concluded that the Dutch forces had used extreme violence. Reactions to the report reveal that the issue remains controversial and challenging to discuss. The findings in the report do however...
-
I am very pleased that today we will start teaching the EU and Global Cybersecurity Fundamentals course within the Advanced Master in Privacy, Cybersecurity and Data Management LLM we created at ECPC. Today we will kick off the course with Brian Honan, who will lecture on the concept of...
-
This blog post is a re-elaboration of my interview this morning with Luca Bertuzzi, Digital & Media Editor from EurActiv, available here.
-
“The SolarWinds Attack is, to date, the most visible, widespread, and intrusive information technology (‘IT’) software supply chain attack – i.e., a cyber attack that corrupts IT software and uses that software as an attack vector. Supply chain attacks are dangerous because the malware is embedded...
-
Over the last 20 years, access to cheap computational capacity has increasingly led to the harvesting of more and more personal data, without having to worry too much about costs related to data storage and processing activities.
-
What was promised by the GDPR (Art. 80 and Rec. 142) is now a reality!