Latest blog articles
-
“The SolarWinds Attack is, to date, the most visible, widespread, and intrusive information technology (‘IT’) software supply chain attack – i.e., a cyber attack that corrupts IT software and uses that software as an attack vector. Supply chain attacks are dangerous because the malware is embedded...
-
Plant varieties are difficult to make but easy to reproduce. Proving that someone reproduced a plant variety, however, is extremely hard. For organized crime, infringing plant variety rights therefore presents low-hanging fruit, with consequences far beyond the infringement of IP rights.
-
After more than eight years of work, the Ius Commune Casebook on Property Law - edited by M-EPLI fellow Sjef van Erp and Bram Akkermans, was published.
-
There are many questions as to how the landmark Regulation in EU property legislation will have to work.