Latest blog articles
-
“The SolarWinds Attack is, to date, the most visible, widespread, and intrusive information technology (‘IT’) software supply chain attack – i.e., a cyber attack that corrupts IT software and uses that software as an attack vector. Supply chain attacks are dangerous because the malware is embedded...
-
During the Easter weekend there was a lack of clarity about what the rules are at the German-Dutch border. What is actually still allowed when it comes to travelling from the Netherlands to Germany and vice versa? Both the government in North Rhine-Westphalia (NRW) and in the Netherlands have...
-
Blog by UCM-student Svea Grünkorn about Green Impact.
The Green Impact programme first crossed my mind when I saw a picture of the frog “Kermit” being circulated within the university. Teams of the UM-wide Green Impact programme were trying to steal the stuffed animal from one another whereby they... -
On March 9, the European Commission has presented the 2015 Justice Scoreboard, an information tool that monitors national justice systems developed and managed by DG Justice. This year marked the third edition of the Scoreboard, which was created in 2013 with the aim to assist EU institutions and...