top of page



Main Cybersecurity Trends in 2024: Imperatives for Business Resilience
Vladimir Boianji, ISSP Enterprise Solutions Director, adeptly delineates the primary cybersecurity trends that organizations should...
Jan 11, 20244 min read


Cybersecurity Tips for Small and Medium-sized Businesses: 10 Essential Practices
Artem Mykhailov, Enterprise Solutions Director at ISSP, provides 10 practical tips for organizations, primarily small and medium-sized...
Dec 27, 20231 min read


AI in Cybersecurity: Enhancing Defense with Artificial Intelligence
In recent years, the field of cybersecurity has seen significant advancements in leveraging artificial intelligence (AI) to bolster...
Oct 20, 20232 min read


Choosing the Right Managed Security Service: Threat Hunting vs Incident Detection
In today's rapidly evolving digital landscape, ensuring the security of your organization's data and assets is paramount. Managed...
Sep 22, 20232 min read


Penetration test: All you need to know to strengthen your cybersecurity defences
When it comes to cybersecurity, penetration testing is a critical component of any strategy. Unlike many think, pentest is almost never...
Aug 16, 20237 min read


Minimizing Data Leak Risks: Essential Recommendations for Every Company
Vladimir Boianji, ISSP Enterprise Solutions Director, expertly outlines the essential steps an organization must take during a data...
Jul 26, 20233 min read

Navigating the Cybersecurity Battlefield: Best Practices for Cyber Awareness and Incident Response
Artem Mykhailov, ISSP Enterprise Solutions Director, talked to SafetyDetectives media. From the interview, you’ll discover many exciting...
Jun 27, 20236 min read


Decrypting the code: a deep dive into Frida's traffic interception capabilities
We continue to introduce you to the practical applications of the Frida tool. Today, we will delve into how it can be utilized to...
May 3, 20233 min read


Threat Hunting & Anomaly Detection solution: Protecting your business from cyber threats
Threat Hunting & Anomaly Detection from ISSP offers comprehensive cybersecurity solutions, including continuous monitoring of your system...
Apr 13, 20234 min read


How to mitigate cyber risks in your organizations. 4 Dos and 1 Don’ts
Cybersecurity threats are becoming increasingly sophisticated, and organizations are at risk for a wide range of malicious attacks, from...
Apr 5, 20234 min read


Zero Trust model: Main implementation challenges
The world is facing an increasing number of cyber threats. With the emergence of new online services and digital products, new payment...
Apr 3, 20234 min read


russian state-sponsored actors may test new types of ransomware. What businesses should do?
russian state-sponsored actors may increase the number and intensity of destructive cyberattacks and influence operations in Ukraine,...
Mar 22, 20231 min read


Exploring the Benefits and Use of the Frida Toolkit
The Frida toolkit is a powerful dynamic instrumentation tool for developers, reverse engineers, and security researchers. This blog post...
Mar 17, 20234 min read


Top five benefits of effective threat and vulnerability management
Vladimir Boianji, ISSP Enterprise Solutions Director discusses why your organization should establish effective threat and vulnerability...
Feb 17, 20233 min read


AI and cybersecurity: What are the main issues of building your own virtual AI CISO?
Artificial Intelligence (AI) is quickly becoming a cornerstone of modern cybersecurity. Artem Mykhailov, ISSP Enterprise Solutions...
Feb 13, 20234 min read


Quantum computing concern: what businesses need to know
The risk of quantum-powered password decryption is increasing dramatically. Organizations need to submit an inventory of potentially...
Feb 6, 20232 min read


Five trends in cybersecurity that your organization needs to care of in 2023
As the cybersecurity landscape continues to evolve, it's important for organizations and businesses to keep up with the latest trends in...
Jan 31, 20233 min read


The common types of phishing attacks. How to protect business assets from cyber criminals?
Phishing attacks are one of the most common cybercrimes. According to the Tessian, in average in 2021 users at workplaces received 14...
Nov 18, 20226 min read


Social engineering attacks: practical tips to protect your networks and digital assets
Social engineering is, in a certain sense, the “hacking” of a person, as a result of which he/she reacts to manipulation
Oct 28, 20225 min read


When cybersecurity companies are being hacked
When cybersecurity companies are being hacked
Mar 25, 20214 min read
bottom of page