Latest blog articles
-
“The SolarWinds Attack is, to date, the most visible, widespread, and intrusive information technology (‘IT’) software supply chain attack – i.e., a cyber attack that corrupts IT software and uses that software as an attack vector. Supply chain attacks are dangerous because the malware is embedded...
-
The Maastricht Treaty marked the first step towards the establishment of the European Union (EU) as we know it today, after the Lisbon Treaty.
-
May the US President appoint his son in law as advisor to the White House? For quite a lot formal appointments the President needs the advice and consent (permission) from the senate, but not here. Is it permissible?