A BRIEF ANALYSIS OF THE DIGITAL SERVICES PACKAGES DSA&DMA

Historical excursus The Digital Services Act (DSA) and the Digital Markets Act (DMA) are two European legislative proposals, and they are two complementary parts of the same project regarding the European digital market.  The main goal of the DSA is to provide new obligations and responsibilities for digital intermediaries and online platforms, with a particular focus... Continue Reading →

A BRIEF ANALYSIS OF THE DIGITAL SERVICES PACKAGES DSA&DMA 

Google’s abuse of dominant position In 2010 and 2015 three separate antitrust investigations were launched by the European Commission against Google, due to its alleged violation of EU’s competition laws, made possible due to its dominant position in the market. These three cases regarded three different services provided by Google: GoogleAdSense, Google Shopping and the... Continue Reading →

A BRIEF ANALYSIS OF THE DIGITAL SERVICES PACKAGES DSA&DMA  

Definition of the digital package’s target   The DSA target «The new rules are proportionate, promote innovation, growth and competitiveness and facilitate the expansion of smaller platforms, SMEs and start-ups. The responsibilities of users, platforms and public authorities are rebalanced according to European values, placing citizens at the center. Rules better protect consumers, and their fundamental... Continue Reading →

WHAT IS THE “CIA TRIAD”?

Confidentiality, Integrity, and Availability are the main goals to protect the cyberspace. These three are summarized in a single paradigm called the "CIA Triad" and allow the IT expert to give the right priorities to the actions they need to perform while protecting the systems. Each of them is defined as follows: Confidentiality prevents the disclosure... Continue Reading →

5 STEPS OF A CYBER ATTACK

Most cyber attacks follow a common scheme made of the following 5 steps: Let’s go through each of them. 1.   Reconnaissance This is the first step of a cyber attack where the attacker collects information about the target; it consists in getting crucial data such as names, credentials, IP addresses, etc. The data are... Continue Reading →

NFT

What do a video of flying cherubs, a burned $95.000 Banksy artwork and digital kittens have in common? A three-letter acronym: NFT.  NFT stands for non-fungible-tokens and it’s the latest phenomenon that it’s taking over the Internet. Non-fungible means one-of-a-kind, unique, that cannot be replaced. Some people say that NFT can be considered as “digital... Continue Reading →

Proxy 101

What is a proxy? A proxy is an entity that is located in between the client (you) and the server (the website you want to access) and allows you to safely surf the web. It connects on your behalf to a given website. How does it work?  For example, when you want to access a... Continue Reading →

Create a website or blog at WordPress.com

Up ↑