PCI Compliance Myths and Reality, PCI, PCI-DSS

PCI Compliance Myths and Reality

April 12th, 2018 / Prime Research Team / 0 comments

Before proceeding further, we need to know about PCI. PCI stands for Payment Card Industry. Since cards are used extensively in different forms for execution of various types of transactions therefore there is the dire need to assure safety and security of personal information of the card users. There is a set of specific security… View Article

general data protection regulation, general data protection regulation india, VAPT, general data protection regulation 2018, Vulnerability Assessment and Penetration Testing, vulnerability assessment and penetration testing services

GDPR and VAPT

March 29th, 2018 / Prime Research Team / 0 comments

Introduction Data Protection has become a major consciousness across the Globe. We the latest controversy between Cambridge Analytica and Facebook, it became an eye opener for Citizens, Enterprises and all different stake holders in the community. With the present context “General Data Protection Regulation (GDPR)” from European Union stands more relevant as the cut off… View Article

CIO Dine and Discourse, 23rd March at JW Marriott, Kolkata

March 27th, 2018 / Prime Research Team / 0 comments

Enterprise IT World kicked off this year’s CIO engagement with 7 City CIO Dine and Discourse Event Series. Events are envisioned as Open Networking Forum for CIOs and IT Leaders to come together and discuss their IT related issues with peers in a stress free environment. Kolkata event was organized by Enterprise IT World in collaboration with… View Article

Data Privacy, Facebook and Cambridge Analytica

March 26th, 2018 / Sushobhan Mukherjee / 0 comments

Introduction In the latest in the data leak controversy, Cambridge Analytica has been accused of breach of data with inappropriate usage of Facebook data, privacy breaches and psychological manipulation. Cambridge Analytica systematically and knowingly ran campaigns based on psychological and personality profiles mined from the Facebook data in 2017. The firm has been accused of… View Article

gdpr overview, gdpr, gdpr compliance, gdpr regulation, GDPR Checklist

GDPR – The Essentials

March 10th, 2018 / Sushobhan Mukherjee / 0 comments

Preface Data Privacy and protection are gaining attention wordwide. In line of the same trend, the European Union, has introduces a new framework to safeguard data and privacy for its citizens. The same is termed as General Data Protection Regulation (GDPR). It supersedes the UK Data Protection Act 1998 and will be applicable form 25th May,… View Article

Vulnerability Assessment and Penetration Testing

January 30th, 2018 / Prime Research Team / 0 comments

Introduction In these days of widespread Internet usage, security is of prime importance. The almost universal use of mobile and Web applications makes systems vulnerable to cyber-attacks. Vulnerability assessment can help identify the loopholes in a system while penetration testing is a proof-of-concept approach to actually explore and exploit a vulnerability. Cyber-attacks are increasing every… View Article

Myths Vs Reality for ISO 27001:2013

December 16th, 2017 / admin / 0 comments

The common misconception about BS ISO/IEC 27001:2013 (ISO 27001) is that it is a standard focused on the IT function of an organisation.  Another myth, is that Information Security is just about preventing lost/stolen data, when in fact the three main principles of ISO 27001 are confidentiality, integrity and availability (CIA) of both vital corporate… View Article

Increasing Trends of Cyber Security Breaches in India

December 6th, 2017 / Suman Mondal / 0 comments

With multiple, recent occurrences of high-profile cyber attacks globally, India finally seems to be catching up to its global peers when it comes to securing its cyber systems, albeit at a slow pace. Almost half of IT decision makers around the world, including India, still believe that business executives are not making cybersecurity a significant… View Article

Mobile Security Demystified

December 6th, 2017 / admin / 0 comments

1.  Preface As per the report by the Internet and Mobile Association of India (IAMAI) and IMRB, there has been a year-on-year growth of 15 per cent in mobile internet users between October 2015-2016. It is said that the number of mobile internet users in India was estimated to reach around 420 million by June… View Article

Why Your Organization Needs To Do Network Auditing

December 5th, 2017 / Suman Mondal / 0 comments

  Network auditing is a must for any organization. Networks are dynamic entities; they grow, shrink, change and divide themselves continuously. Network administrators cannot even assume this process is entirely under their control. Users add devices and sometimes even new hardware to the network infrastructure. Even worse, it is not the first time a user would… View Article