Latest blog articles
-
“The SolarWinds Attack is, to date, the most visible, widespread, and intrusive information technology (‘IT’) software supply chain attack – i.e., a cyber attack that corrupts IT software and uses that software as an attack vector. Supply chain attacks are dangerous because the malware is embedded...
-
During the Easter weekend there was a lack of clarity about what the rules are at the German-Dutch border. What is actually still allowed when it comes to travelling from the Netherlands to Germany and vice versa? Both the government in North Rhine-Westphalia (NRW) and in the Netherlands have...
-
After months of negotiations between Greece, the International Monetary Fund (IMF), the European Central Bank (ECB) and the European Union (EU), which acuminated in an overwhelming amount of over 60% of “no”-votes by the Greek citizens to the reforms attached to the second Greek bailout programme...
-
The phenomenon of the inverted-U curve - could it be doing more harm than good?
-
HiiL on the law of the future.