Latest blog articles
-
“The SolarWinds Attack is, to date, the most visible, widespread, and intrusive information technology (‘IT’) software supply chain attack – i.e., a cyber attack that corrupts IT software and uses that software as an attack vector. Supply chain attacks are dangerous because the malware is embedded...
-
Blog by UCM-student Svea Grünkorn about Green Impact.
The Green Impact programme first crossed my mind when I saw a picture of the frog “Kermit” being circulated within the university. Teams of the UM-wide Green Impact programme were trying to steal the stuffed animal from one another whereby they... -
This week, the book based on the conference on pluralism in European private law, organised by Leone Niglia of the University of Exeter, was published by Hart Publishing.
-
The Symposium is organised by the ULEP research project and LeCTra Research School (the University of Lapland) in cooperation with M-EPLI (the University of Maastricht).