Latest blog articles
-
“The SolarWinds Attack is, to date, the most visible, widespread, and intrusive information technology (‘IT’) software supply chain attack – i.e., a cyber attack that corrupts IT software and uses that software as an attack vector. Supply chain attacks are dangerous because the malware is embedded...
-
In recent weeks, the divisions between North and South, as well as the creation of European corona bonds have dominated most European debates. At the same time, there has been contradictory information regarding the financial aid mobilised by Brussels in response to the COVID-19 pandemic. The...
-
SMECC stands for School, Minimum standard, Education, Child-friendly policy and care-Continuum. Imagine SMECC as a flat drawing of a house. The regulatory backstop is the minimum standard in family litigation for competent parenthood – far on the horizon, however, a necessary fundament of human...
-
Asylum seekers usually do not cross borders with a bag of documents. They have lost their personal belongings or have been confiscated by smugglers. Oral statements are therefore the only proof of origin. (Dutch only)