Latest blog articles
-
“The SolarWinds Attack is, to date, the most visible, widespread, and intrusive information technology (‘IT’) software supply chain attack – i.e., a cyber attack that corrupts IT software and uses that software as an attack vector. Supply chain attacks are dangerous because the malware is embedded...
-
“Bartleby,” said I, “Ginger Nut is away; just step round to the Post Office, won’t you? (it was but a three minute walk,) and see if there is anything for me.” “I would prefer not to.” “You will not?” “I prefer not.”
-
While Europe holds its breath and follows the negotiations between Greece and its partners on the financial assistance, another ´piece in the puzzle` of the European attempts to contain the sovereign debt crisis has prominently featured in the press recently. The Court of Justice (CJEU) delivered...