A BRIEF ANALYSIS OF THE DIGITAL SERVICES PACKAGES DSA&DMA  

Definition of the digital package’s target   The DSA target «The new rules are proportionate, promote innovation, growth and competitiveness and facilitate the expansion of smaller platforms, SMEs and start-ups. The responsibilities of users, platforms and public authorities are rebalanced according to European values, placing citizens at the center. Rules better protect consumers, and their fundamental... Continue Reading →

WHAT IS THE “CIA TRIAD”?

Confidentiality, Integrity, and Availability are the main goals to protect the cyberspace. These three are summarized in a single paradigm called the "CIA Triad" and allow the IT expert to give the right priorities to the actions they need to perform while protecting the systems. Each of them is defined as follows: Confidentiality prevents the disclosure... Continue Reading →

5 STEPS OF A CYBER ATTACK

Most cyber attacks follow a common scheme made of the following 5 steps: Let’s go through each of them. 1.   Reconnaissance This is the first step of a cyber attack where the attacker collects information about the target; it consists in getting crucial data such as names, credentials, IP addresses, etc. The data are... Continue Reading →

NFT

What do a video of flying cherubs, a burned $95.000 Banksy artwork and digital kittens have in common? A three-letter acronym: NFT.  NFT stands for non-fungible-tokens and it’s the latest phenomenon that it’s taking over the Internet. Non-fungible means one-of-a-kind, unique, that cannot be replaced. Some people say that NFT can be considered as “digital... Continue Reading →

Proxy 101

What is a proxy? A proxy is an entity that is located in between the client (you) and the server (the website you want to access) and allows you to safely surf the web. It connects on your behalf to a given website. How does it work?  For example, when you want to access a... Continue Reading →

Create a website or blog at WordPress.com

Up ↑