Latest blog articles
-
“The SolarWinds Attack is, to date, the most visible, widespread, and intrusive information technology (‘IT’) software supply chain attack – i.e., a cyber attack that corrupts IT software and uses that software as an attack vector. Supply chain attacks are dangerous because the malware is embedded...
-
Two prominent issues on the agenda of European equality lawyers have so far largely (although see recently CJ C-83/14 Nikolova) remained outside scrutiny of the Court of Justice of the European Union: discrimination on grounds of religion or belief and segregation of Roma. Recent developments may...
-
The senseless killings and horrific attack on a newspaper and on a shop. Of course these terrorist attacks are violations of the right to life and the freedom of expression and therefore on our democratic societies. The perpetrators wanted to instill fear and to create chaos and undo our precious...
-
‘CISG Conference’ where experts on the international sale of goods came together to review the Vienna Convention in the light of similar structures such as its latest contender, the Common European Sales Law, or the UCC.