Importance of Mobile Device Management (MDM)

May 9th, 2018 / Suman Mondal / 0 comments

In just a few short years, the way mobile devices are used by employees has shifted dramatically. Increasingly, employees are bringing their own devices to their workplaces and connecting to secure corporate networks. While employees enjoy the flexibility and ease this offers, employers also appreciate the added benefits of increased efficiency with lower equipment costs…. View Article

The Unexplained Puzzle Into Coursework Discovered

May 4th, 2018 / admin / Comments Off on The Unexplained Puzzle Into Coursework Discovered

The adequacy of coursework may often be rather tough to evaluate. Naturally, sometimes you don’t wish to get the coursework but instead do it all yourself. Coursework will change based on the degree of level and area of specialization selected. You may come across in depth coursework info in the professors’ syllabi. With the rising… View Article

dlp, data loss prevention,

An Approach for DLP Implementation

April 26th, 2018 / Prime Research Team / 0 comments

Myth: – DLP is for IT and it is an IT Project  | Truth: – DLP is for Business and it is a Business Project DLP Solution is implemented by IT for the business with the close association of various business departments; DLP implementation requires strong upper management commitment and support, in-depth involvement of middle management,… View Article

PCI Compliance Myths and Reality, PCI, PCI-DSS

PCI Compliance Myths and Reality

April 12th, 2018 / Prime Research Team / 0 comments

Before proceeding further, we need to know about PCI. PCI stands for Payment Card Industry. Since cards are used extensively in different forms for execution of various types of transactions therefore there is the dire need to assure safety and security of personal information of the card users. There is a set of specific security… View Article

general data protection regulation, general data protection regulation india, VAPT, general data protection regulation 2018, Vulnerability Assessment and Penetration Testing, vulnerability assessment and penetration testing services


March 29th, 2018 / Prime Research Team / 0 comments

Introduction Data Protection has become a major consciousness across the Globe. We the latest controversy between Cambridge Analytica and Facebook, it became an eye opener for Citizens, Enterprises and all different stake holders in the community. With the present context “General Data Protection Regulation (GDPR)” from European Union stands more relevant as the cut off… View Article

CIO Dine and Discourse, 23rd March at JW Marriott, Kolkata

March 27th, 2018 / Prime Research Team / 0 comments

Enterprise IT World kicked off this year’s CIO engagement with 7 City CIO Dine and Discourse Event Series. Events are envisioned as Open Networking Forum for CIOs and IT Leaders to come together and discuss their IT related issues with peers in a stress free environment. Kolkata event was organized by Enterprise IT World in collaboration with… View Article

Data Privacy, Facebook and Cambridge Analytica

March 26th, 2018 / Sushobhan Mukherjee / 0 comments

Introduction In the latest in the data leak controversy, Cambridge Analytica has been accused of breach of data with inappropriate usage of Facebook data, privacy breaches and psychological manipulation. Cambridge Analytica systematically and knowingly ran campaigns based on psychological and personality profiles mined from the Facebook data in 2017. The firm has been accused of… View Article

gdpr overview, gdpr, gdpr compliance, gdpr regulation, GDPR Checklist

GDPR – The Essentials

March 10th, 2018 / Sushobhan Mukherjee / 0 comments

Preface Data Privacy and protection are gaining attention wordwide. In line of the same trend, the European Union, has introduces a new framework to safeguard data and privacy for its citizens. The same is termed as General Data Protection Regulation (GDPR). It supersedes the UK Data Protection Act 1998 and will be applicable form 25th May,… View Article

Vulnerability Assessment and Penetration Testing

January 30th, 2018 / Prime Research Team / 0 comments

Introduction In these days of widespread Internet usage, security is of prime importance. The almost universal use of mobile and Web applications makes systems vulnerable to cyber-attacks. Vulnerability assessment can help identify the loopholes in a system while penetration testing is a proof-of-concept approach to actually explore and exploit a vulnerability. Cyber-attacks are increasing every… View Article

Myths Vs Reality for ISO 27001:2013

December 16th, 2017 / admin / 0 comments

The common misconception about BS ISO/IEC 27001:2013 (ISO 27001) is that it is a standard focused on the IT function of an organisation.  Another myth, is that Information Security is just about preventing lost/stolen data, when in fact the three main principles of ISO 27001 are confidentiality, integrity and availability (CIA) of both vital corporate… View Article