Latest blog articles
-
“The SolarWinds Attack is, to date, the most visible, widespread, and intrusive information technology (‘IT’) software supply chain attack – i.e., a cyber attack that corrupts IT software and uses that software as an attack vector. Supply chain attacks are dangerous because the malware is embedded...
-
Mobility and good public transport prove to be essential requirements for an attractive (border) region. Establishes ITEM-PhD candidate Julia Reinold in an interview with EurekaRail.
-
Stimulating cross-border labour mobility? Provide an adequate supply of information, uniformity in laws and regulations, language education and infrastructure, suggests 'ontgrenzer' Martin Unfried in an interview with EurekaRail.
-
The 30%-facility is regularly discussed in both case-law and politics. The facility is currently under pressure and facing turbulent times. With a potential abolition, which may become reality, particular attention must be paid to the effects and possible alternatives. This blog is only available in...
-
Last week Dutch Prime Minister Mark Rutte went on an economic mission to China, accompanied by a delegation of business people representing Dutch corporations. China’s presence as an economic and political power is increasing steadily. Its economic and financial potential is huge, not only in China...