Latest blog articles
-
“The SolarWinds Attack is, to date, the most visible, widespread, and intrusive information technology (‘IT’) software supply chain attack – i.e., a cyber attack that corrupts IT software and uses that software as an attack vector. Supply chain attacks are dangerous because the malware is embedded...
-
Concluded at the end of 2015, the European Union-Vietnam FTA (EVFTA) has marked a successive breakthrough for the EU in exporting its long-standing sui generis protection of geographical indications (GIs). With respect to the scope of protection, the GI chapter in EVFTA has introduced a peculiar...
-
Every once in a while it will pop up again as an argument: a judge may not occupy the seat of a legislator (or politician)... This article is only available in Dutch.