Latest blog articles
-
“The SolarWinds Attack is, to date, the most visible, widespread, and intrusive information technology (‘IT’) software supply chain attack – i.e., a cyber attack that corrupts IT software and uses that software as an attack vector. Supply chain attacks are dangerous because the malware is embedded...
-
In January Dr. Jessica Alleva, from the Department of Clinical Psychological Science at the Faculty of Psychology and Neuroscience, was honoured twice for her work on improving body image. She received the 2016 Seymour Fisher Outstanding Body Image Dissertation Award and the Distinguished Women...
-
What happens if the Netherlands rejects the EU-Ukraine association agreement? If they reach the participation quorum of 30%, it is up to the government to present a legislative proposal to the States-General by which the special legislation will be withdrawn. This article is only available in Dutch...