Latest blog articles
-
“The SolarWinds Attack is, to date, the most visible, widespread, and intrusive information technology (‘IT’) software supply chain attack – i.e., a cyber attack that corrupts IT software and uses that software as an attack vector. Supply chain attacks are dangerous because the malware is embedded...
-
During the Easter weekend there was a lack of clarity about what the rules are at the German-Dutch border. What is actually still allowed when it comes to travelling from the Netherlands to Germany and vice versa? Both the government in North Rhine-Westphalia (NRW) and in the Netherlands have...
-
What works to make EU law work? Or, how can we ensure that EU law is implemented effectively in the member states? I have researched[1] this question by studying the usefulness of instruments that are meant to support national administrations in the application of EU law or that may otherwise be...
-
Duo blog by Dersim Yabasun and Alexander Hoogenboom
At the outset of this blog there is reason to underline the value of an effective asylum policy. There is a tendency in some populist media, as well as among some populist politicians, to depict and cast the current humanitarian crisis as largely...