Latest blog articles
-
“The SolarWinds Attack is, to date, the most visible, widespread, and intrusive information technology (‘IT’) software supply chain attack – i.e., a cyber attack that corrupts IT software and uses that software as an attack vector. Supply chain attacks are dangerous because the malware is embedded...
-
During the Easter weekend there was a lack of clarity about what the rules are at the German-Dutch border. What is actually still allowed when it comes to travelling from the Netherlands to Germany and vice versa? Both the government in North Rhine-Westphalia (NRW) and in the Netherlands have...
-
To counter misuse of student visas the Saxion University of Applied Sciences applies a so called ‘quota system’ for students from ‘risk countries’. The question is whether a quota is an appropriate instrument and if it is not in conflict with (European) law. This blog is only available in Dutch.
-
In the last few days, the tension between the International Criminal Court (ICC) and the African Union (AU) reached yet another climax in South Africa. Hosting the 25th AU Summit in Johannesburg, the South African Government guaranteed all attending AU leaders, including Sudanese President Omar al...