Latest blog articles
-
“The SolarWinds Attack is, to date, the most visible, widespread, and intrusive information technology (‘IT’) software supply chain attack – i.e., a cyber attack that corrupts IT software and uses that software as an attack vector. Supply chain attacks are dangerous because the malware is embedded...
-
As bills don’t pay themselves an income is required, some obtain it by working for a wage, others by starting up their own business and some are so talented that they can make an income out of their hobby. In this column ‘My Way to Make Money’ we interview a student or a university employee about...
-
On September 9th 2015 the president of the Commission, Juncker, adressed for his first time the European Parliament in his State of the Union. This year’s State of the Union was entitled: Time for Honesty, Unity and Solidarity. And the key concepts were: more Europe in the Union, and more Union in...
-
As bills don’t pay themselves an income is required, some obtain it by working for a wage, others by starting up their own business and some are so talented that they can make an income out of their hobby. In the Weekly column ‘My Way to Make Money’ we interview a student or a university employee...