Latest blog articles
-
“The SolarWinds Attack is, to date, the most visible, widespread, and intrusive information technology (‘IT’) software supply chain attack – i.e., a cyber attack that corrupts IT software and uses that software as an attack vector. Supply chain attacks are dangerous because the malware is embedded...
-
Amidst the complaints about lack of productivity and switch to online education, I feel almost guilty to say that I also enjoy my new corona-induced working reality. Well, I would not consciously choose to combine work with childcare. As for the rest, my work satisfaction has actually improved. I...
-
Last February, the Court of Justice (CoJ) received a notable appeal against an order of the General Court (GC) in Case T-479/14 Kendrion. There are various notable and interesting aspects to the appeal case but the most eye-catching one concerns the appellant: the Court of Justice of the European...