Latest blog articles
-
“The SolarWinds Attack is, to date, the most visible, widespread, and intrusive information technology (‘IT’) software supply chain attack – i.e., a cyber attack that corrupts IT software and uses that software as an attack vector. Supply chain attacks are dangerous because the malware is embedded...
-
For more than 40 years now, the harmonisation and unification of the European patent law have been discussed. So far, the only European legal instrument regulating substantive patent matters is a European Patent Convention (EPC) signed in 1973. The EPC, however, is outside the EU’s legislative and...
-
“What kind of skills do we want our graduates to have?” was the main topic of discussion during a recent staff meeting, which got me thinking.
As the faculty of law, perhaps the “right” answer would entail something along the lines of: “Our graduates need to be capable of arguing logically, writing...