Latest blog articles
-
“The SolarWinds Attack is, to date, the most visible, widespread, and intrusive information technology (‘IT’) software supply chain attack – i.e., a cyber attack that corrupts IT software and uses that software as an attack vector. Supply chain attacks are dangerous because the malware is embedded...
-
The Swedish Data Protection Authority recently launched an investigation into Umeå University’s handling of sensitive personal data, specifically data obtained from the Danish Police Authority for research purposes.
-
The Nikolova case (C-83/14), currently pending before the Court of Justice (CoJ), constitutes an interesting and unique example of a practice alleged to have discriminatory effects on a large group of persons defined by reference to their Roma ethnic origin. The case sheds light on the role that EU...