Latest blog articles
-
“The SolarWinds Attack is, to date, the most visible, widespread, and intrusive information technology (‘IT’) software supply chain attack – i.e., a cyber attack that corrupts IT software and uses that software as an attack vector. Supply chain attacks are dangerous because the malware is embedded...
-
The Digital Services Act (‘DSA’) is part of the long-awaited package aimed at providing a transparency and accountability framework for online platforms and laying down additional duties for large providers with gatekeeping powers. There is surely a lot to unpack in this hefty proposal. This piece...
-
What once was their wealth, can become a burden. Museums in Europe (may) have to consider what to do with their cultural and historical treasures from former colonies. How happy or eager are these former colonies to retrieve their treasures?
-
The UN Security Council has moved to protect cultural heritage in armed conflicts. Will this initiative be a successful one?