Latest blog articles
-
“The SolarWinds Attack is, to date, the most visible, widespread, and intrusive information technology (‘IT’) software supply chain attack – i.e., a cyber attack that corrupts IT software and uses that software as an attack vector. Supply chain attacks are dangerous because the malware is embedded...
-
Over the last years, the business of influencer marketing has practically exploded. Companies have begun to realise the multiplying factor of having influencers promote their brand through original and entertaining content. However, in combination with this marketing trend, several legal issues have...
-
Blog by UCM-student Svea Grünkorn about Green Impact.
The Green Impact programme first crossed my mind when I saw a picture of the frog “Kermit” being circulated within the university. Teams of the UM-wide Green Impact programme were trying to steal the stuffed animal from one another whereby they...