Latest blog articles
-
Reflecting on the M-EPLI Interns' Thesis Workshop: Can institutions benefit from reassessing their priorities in terms of what they incentivize and analyzing why these types of events offering an opportunity for students to write and get substantive feedback so rare?
-
“The SolarWinds Attack is, to date, the most visible, widespread, and intrusive information technology (‘IT’) software supply chain attack – i.e., a cyber attack that corrupts IT software and uses that software as an attack vector. Supply chain attacks are dangerous because the malware is embedded...
-
The workshop will focus on different contributions that identify potential legal wrongs arising out of decentralization, with the goal of exploring old and new remedies (both substantive and procedural) that could correct them, while emphasizing the role of technology in delivering these potential...
-
Published on LBM. As the attack on the Twin Towers on 9/11 has shown, terrorism can lead to large-scale damage, massive property damage, thousands of cases of personal injury, pain and suffering and enormous consequential damage, including billions in lost profits. Can the security industry be...
-
The senseless killings and horrific attack on a newspaper and on a shop. Of course these terrorist attacks are violations of the right to life and the freedom of expression and therefore on our democratic societies. The perpetrators wanted to instill fear and to create chaos and undo our precious...