top of page



Apr 3, 20234 min read
Zero Trust model: Main implementation challenges
The world is facing an increasing number of cyber threats. With the emergence of new online services and digital products, new payment...


Mar 22, 20231 min read
russian state-sponsored actors may test new types of ransomware. What businesses should do?
russian state-sponsored actors may increase the number and intensity of destructive cyberattacks and influence operations in Ukraine,...


Feb 17, 20233 min read
Top five benefits of effective threat and vulnerability management
Vladimir Boianji, ISSP Enterprise Solutions Director discusses why your organization should establish effective threat and vulnerability...


Feb 13, 20234 min read
AI and cybersecurity: What are the main issues of building your own virtual AI CISO?
Artificial Intelligence (AI) is quickly becoming a cornerstone of modern cybersecurity. Artem Mykhailov, ISSP Enterprise Solutions...


Feb 6, 20232 min read
Quantum computing concern: what businesses need to know
The risk of quantum-powered password decryption is increasing dramatically. Organizations need to submit an inventory of potentially...


Jan 31, 20233 min read
Five trends in cybersecurity that your organization needs to care of in 2023
As the cybersecurity landscape continues to evolve, it's important for organizations and businesses to keep up with the latest trends in...


Jan 9, 20235 min read
BYOD: What are the main risks of using employees’ personal devices in the workplace?
Nowadays, the use of personal devices for work purposes is more than logical. Especially given the increasingly common practice of...


Dec 19, 20223 min read
ISSP in partnership with the EBRD support Moldovan SMEs in increasing their cyber resilience
ISSP, a global cybersecurity company founded in Ukraine, and the European Bank for Reconstruction and Development (EBRD) conducted a...


Dec 5, 20221 min read
ISSP Georgia is among the winners of GITI 2022 competition
ISSP Georgia, a part of the international ISSP - Information Systems Security Partners, has been recognized as a winner of the GITI...


Nov 25, 20221 min read
Oleh Derevianko participated in the largest professional cybersecurity conference in Poland
Oleh Derevianko, ISSP Co-Founder and Chief Vision Officer, took part at the Advanced Threat Summit - one of the largest cybersecurity...


Nov 19, 20222 min read
Oleh Derevianko has joined the Global Cyber Security Group launched by the Aspen Institute
ISSP Co-founder & Chairman Oleh Derevianko has joined the Global Cyber Security Group as a founding member. This initiative was launched...


Nov 18, 20226 min read
The common types of phishing attacks. How to protect business assets from cyber criminals?
Phishing attacks are one of the most common cybercrimes. According to the Tessian, in average in 2021 users at workplaces received 14...


Nov 17, 20221 min read
On the Cyber angle of the war in Europe: Oleh Derevianko at the Cybertech NYC Conference
Oleh Derevianko, Chairman and Co-founder at ISSP participated in the Cybertech NYC conference, an international gathering of leaders who...


Sep 1, 20224 min read
RetDec and LLVM for native code deobfuscation, or how to read unreadable code
We discuss LLVM as a reverse engineering tool for native code deobfuscation.


Jun 19, 20221 min read
ISSP Canada supports Canada-Ukraine business cooperation in cybersecurity
ISSP Canada supports Canada-Ukraine business cooperation in cybersecurity


Oct 13, 20213 min read
ISSP co-organizes "Cybersecurity Challenges in Ukraine & Globally" roundtable in Washington
ISSP co-organizes "Cybersecurity Challenges in Ukraine & Globally" roundtable in Washington


Sep 9, 20212 min read
Addressing cybersecurity in a holistic manner with ISSP Cybersecurity Preparedness Framework
ISSP Cybersecurity Preparedness Framework in the Polish-Ukrainian webinar on security, hybrid threats and human rights


May 3, 20213 min read
3 Reasons You Can’t Fully Trust Your Security Tools And What You Can Do About It
3 Reasons You Can’t Fully Trust Your Security Tools And What You Can Do About It


Jun 25, 20204 min read
A Cybersecure Way to Return to the Office after Lockdown
A Cybersecure Way to Return to the Office after Lockdown


Mar 19, 20202 min read
ISSP Continues Operations in Face of COVID-19 Epidemic
ISSP Continues Operations in Face of COVID-19 Epidemic
bottom of page