Latest blog articles
-
“The SolarWinds Attack is, to date, the most visible, widespread, and intrusive information technology (‘IT’) software supply chain attack – i.e., a cyber attack that corrupts IT software and uses that software as an attack vector. Supply chain attacks are dangerous because the malware is embedded...
-
Current developments in the area of cross-country joint audits could reduce administrative burdens and enhance legal certainty. But, what are joint audits? This contribution shortly elaborates on the concept and the current developments of joint audits that could facilitate a cross-country concept...
-
The increased flow of asylum applicants and migrants to the EU in recent years has not only put considerable pressure on the reception systems of Member States, but at the same time raises challenges regarding the integration of newcomers at the national and local level.
-
In a short memo, published on 22 March, the Dutch Liberal Party (VVD) expressed its view on how to handle the increasing number of asylum claims in the Netherlands, and more broadly in the EU, as well as the continuously tragic events concerning refugees that occur at the external borders of the EU...