Latest blog articles

  • I am very pleased that today we will start teaching the EU and Global Cybersecurity Fundamentals course within the Advanced Master in Privacy, Cybersecurity and Data Management LLM we created at ECPC. Today we will kick off the course with Brian Honan, who will lecture on the concept of...

  • When we think of cybersecurity we are generally concerned with the code, algorithms and systems that are responsible for the functioning of out digital technologies and the safety of our sensitive data. What has become increasingly apparent is the role of humans in ensuring the security of our...

  • SMECC stands for School, Minimum standard, Education, Child-friendly policy and care-Continuum. Imagine SMECC as a flat drawing of a house. The regulatory backstop is the minimum standard in family litigation for competent parenthood – far on the horizon, however, a necessary fundament of human...

  • Asylum seekers usually do not cross borders with a bag of documents. They have lost their personal belongings or have been confiscated by smugglers. Oral statements are therefore the only proof of origin. (Dutch only) 

  • Published on LBM. As the attack on the Twin Towers on 9/11 has shown, terrorism can lead to large-scale damage, massive property damage, thousands of cases of personal injury, pain and suffering and enormous consequential damage, including billions in lost profits. Can the security industry be...