Latest blog articles
-
“The SolarWinds Attack is, to date, the most visible, widespread, and intrusive information technology (‘IT’) software supply chain attack – i.e., a cyber attack that corrupts IT software and uses that software as an attack vector. Supply chain attacks are dangerous because the malware is embedded...
-
During the Easter weekend there was a lack of clarity about what the rules are at the German-Dutch border. What is actually still allowed when it comes to travelling from the Netherlands to Germany and vice versa? Both the government in North Rhine-Westphalia (NRW) and in the Netherlands have...
-
There is wide agreement that the EU has not been effective in dealing with what I would define here as values’ awkwardness, cases in which EU Member States threaten the rule of law and the other common values of the European project. The obvious reference is in this respect to Hungary and Poland...
-
While Europe holds its breath and follows the negotiations between Greece and its partners on the financial assistance, another ´piece in the puzzle` of the European attempts to contain the sovereign debt crisis has prominently featured in the press recently. The Court of Justice (CJEU) delivered...