top of page



Jan 11, 20244 min read
Main Cybersecurity Trends in 2024: Imperatives for Business Resilience
Vladimir Boianji, ISSP Enterprise Solutions Director, adeptly delineates the primary cybersecurity trends that organizations should...


Dec 27, 20231 min read
Cybersecurity Tips for Small and Medium-sized Businesses: 10 Essential Practices
Artem Mykhailov, Enterprise Solutions Director at ISSP, provides 10 practical tips for organizations, primarily small and medium-sized...


Oct 20, 20232 min read
AI in Cybersecurity: Enhancing Defense with Artificial Intelligence
In recent years, the field of cybersecurity has seen significant advancements in leveraging artificial intelligence (AI) to bolster...


Sep 22, 20232 min read
Choosing the Right Managed Security Service: Threat Hunting vs Incident Detection
In today's rapidly evolving digital landscape, ensuring the security of your organization's data and assets is paramount. Managed...


Aug 16, 20237 min read
Penetration test: All you need to know to strengthen your cybersecurity defences
When it comes to cybersecurity, penetration testing is a critical component of any strategy. Unlike many think, pentest is almost never...


Jul 26, 20233 min read
Minimizing Data Leak Risks: Essential Recommendations for Every Company
Vladimir Boianji, ISSP Enterprise Solutions Director, expertly outlines the essential steps an organization must take during a data...

Jun 27, 20236 min read
Navigating the Cybersecurity Battlefield: Best Practices for Cyber Awareness and Incident Response
Artem Mykhailov, ISSP Enterprise Solutions Director, talked to SafetyDetectives media. From the interview, you’ll discover many exciting...


May 3, 20233 min read
Decrypting the code: a deep dive into Frida's traffic interception capabilities
We continue to introduce you to the practical applications of the Frida tool. Today, we will delve into how it can be utilized to...


Apr 13, 20234 min read
Threat Hunting & Anomaly Detection solution: Protecting your business from cyber threats
Threat Hunting & Anomaly Detection from ISSP offers comprehensive cybersecurity solutions, including continuous monitoring of your system...


Apr 5, 20234 min read
How to mitigate cyber risks in your organizations. 4 Dos and 1 Don’ts
Cybersecurity threats are becoming increasingly sophisticated, and organizations are at risk for a wide range of malicious attacks, from...


Apr 3, 20234 min read
Zero Trust model: Main implementation challenges
The world is facing an increasing number of cyber threats. With the emergence of new online services and digital products, new payment...


Mar 22, 20231 min read
russian state-sponsored actors may test new types of ransomware. What businesses should do?
russian state-sponsored actors may increase the number and intensity of destructive cyberattacks and influence operations in Ukraine,...


Mar 17, 20234 min read
Exploring the Benefits and Use of the Frida Toolkit
The Frida toolkit is a powerful dynamic instrumentation tool for developers, reverse engineers, and security researchers. This blog post...


Feb 17, 20233 min read
Top five benefits of effective threat and vulnerability management
Vladimir Boianji, ISSP Enterprise Solutions Director discusses why your organization should establish effective threat and vulnerability...


Feb 13, 20234 min read
AI and cybersecurity: What are the main issues of building your own virtual AI CISO?
Artificial Intelligence (AI) is quickly becoming a cornerstone of modern cybersecurity. Artem Mykhailov, ISSP Enterprise Solutions...


Feb 6, 20232 min read
Quantum computing concern: what businesses need to know
The risk of quantum-powered password decryption is increasing dramatically. Organizations need to submit an inventory of potentially...


Jan 31, 20233 min read
Five trends in cybersecurity that your organization needs to care of in 2023
As the cybersecurity landscape continues to evolve, it's important for organizations and businesses to keep up with the latest trends in...


Nov 18, 20226 min read
The common types of phishing attacks. How to protect business assets from cyber criminals?
Phishing attacks are one of the most common cybercrimes. According to the Tessian, in average in 2021 users at workplaces received 14...


Oct 28, 20225 min read
Social engineering attacks: practical tips to protect your networks and digital assets
Social engineering is, in a certain sense, the “hacking” of a person, as a result of which he/she reacts to manipulation


Mar 25, 20214 min read
When cybersecurity companies are being hacked
When cybersecurity companies are being hacked
bottom of page