Latest blog articles
-
“The SolarWinds Attack is, to date, the most visible, widespread, and intrusive information technology (‘IT’) software supply chain attack – i.e., a cyber attack that corrupts IT software and uses that software as an attack vector. Supply chain attacks are dangerous because the malware is embedded...
-
M-EPLI, along with the Maastricht Law & Tech Lab and the Institute of Data Science, hosted the online webinar ‘Researching Discrimination in E-Commerce and Online Advertising’ on the 4th and 5th of March 2021. Throughout the two-day event, speakers from different countries, institutes and...
-
Is the Wilders trial a political process - like his attorney Geert-Jan Knoops argues? Is it an impossible task for the judge because, like he said, it is in fact about the party programme of the PVV - and therefore encroaches on the political decision-making process?... This blog is only available...