Cybersecurity
Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks. These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information, extorting money from users, or interrupting normal business processes. Key Components of Cybersecurity Network Security Protecting the integrity, confidentiality, and accessibility of computer...
Business Continuity Management Asia Summit 2019
In these turbulent times when the business environment is uncertain & fraught with risks, companies have to plan for contingencies & emergencies. The disaster preparedness that companies exhibit goes a long way in making them adjust to the changing circumstances when disaster strikes. Around the world, different countries have different...
APAC Most Sought After Risk Management Solution Providers to Watch in the Year-2019
Hong Kong ( May, 2019) : APAC Business Headlines, a magazine that brings together CIOs, CXOs, and other technology decisions makers to speak on the evolution of technology and industry trends, has announced the release of their new edition: “10 Most Sought After Risk Management Solution Providers to...
Risk management & low probability-high impact events
Risk management is process for controlling exposure to security & safety risks. It is an important function in organizations as corporations undertake increasingly complex & ambitious projects in uncertain & often risky environment. It can be challenging for those in authority to use the best available...
Tailgating is a very common security breach.
Tailgating is one of the most common security breaches. It starts out innocently with an employee opening a door & holding it open for others, visitors without badges or the acceptance of a uniformed worker. The problem with this situation is that they open the premises...
Situational Awareness
In humans, the 5 traditionally recognized senses are: Sight, Hearing, Taste, Smell & Touch. Nowadays, we see many people walking around with in ear earphones stuck in their ears & more often than not, with their eyes glued to their smartphone screens. This is particularly evident in trains....
United Nations Security Council Counter Terrorism Committee Executive Directorate
Transportation sector Transportation facilities and vehicles are attractive targets for terrorist attacks because of the high concentration of potential victims. They also offer the possibility of turning vehicles into weapons, with a potentially significant increase in victims (e.g., aeroplanes). The difficulty of protecting the many potential targets...
Terrorism in Sri Lanka
Islamic State’s leadership had long prepared for this new phase of its existence. Before he was killed in a drone strike, IS spokesman Abu Mohammed al-Adnani said the loss of territory would not spell the group’s end. Having lost its physical caliphate, IS has made it...
The Business APAC Security Guardians of 2019
AIP Risk Consulting: Designing Resiliency And Reliability At present, new technologies are surfacing the security industry. However, in most of the developing nations, security is still a labor intensive task. Therefore, human errors like lower effectiveness, ignorance, complacency etc. are common. Such mistakes can be reduced...
Top 10 Enterprise Security Consulting/Services Companies in APAC – 2018
Our Managing Director, Mr Isaach Choong is featured in “Enterprise Security – Enterprise Security APAC Special” and AIP is proud to be awarded TOP 10 ENTERPRISE SECURITY CONSULTING/SERVICES COMPANIES IN APAC – 2018. ...