Latest blog articles
-
“The SolarWinds Attack is, to date, the most visible, widespread, and intrusive information technology (‘IT’) software supply chain attack – i.e., a cyber attack that corrupts IT software and uses that software as an attack vector. Supply chain attacks are dangerous because the malware is embedded...
-
“Bartleby,” said I, “Ginger Nut is away; just step round to the Post Office, won’t you? (it was but a three minute walk,) and see if there is anything for me.” “I would prefer not to.” “You will not?” “I prefer not.”
-
On Tuesday, the Grand Chamber of the Court of Justice of the European Union declared the Commission’s US Safe Harbour Decision invalid. The Court’s ruling in Case C-362/14 of the Austrian Internet activist Maximillian Schrems v the Irish Data Protection Commissioner is a milestone in the...