Latest blog articles
-
“The SolarWinds Attack is, to date, the most visible, widespread, and intrusive information technology (‘IT’) software supply chain attack – i.e., a cyber attack that corrupts IT software and uses that software as an attack vector. Supply chain attacks are dangerous because the malware is embedded...
-
On 24 January, the Council of Ministers of the Spanish Government, following the mandate of the Head of State, approved the Law-Decree that foresees the suspension of Articles 12, 14, 15, 16 and 18 of the Charter of Rights and Freedoms of Spaniards (Fuero de los españoles). For a period of three...
-
There was a workshop that took place at Tsinghua University School of Law, Beijing. It was the first meeting of the collaborators in a project which aims to investigate contract law in China and Europe in a comparative and cross-cultural perspective.