Zero Trust model: Main implementation challenges
russian state-sponsored actors may test new types of ransomware. What businesses should do?
Top five benefits of effective threat and vulnerability management
AI and cybersecurity: What are the main issues of building your own virtual AI CISO?
Quantum computing concern: what businesses need to know
Five trends in cybersecurity that your organization needs to care of in 2023
BYOD: What are the main risks of using employees’ personal devices in the workplace?
ISSP in partnership with the EBRD support Moldovan SMEs in increasing their cyber resilience
ISSP Georgia is among the winners of GITI 2022 competition
Oleh Derevianko participated in the largest professional cybersecurity conference in Poland
Oleh Derevianko has joined the Global Cyber Security Group launched by the Aspen Institute
The common types of phishing attacks. How to protect business assets from cyber criminals?
On the Cyber angle of the war in Europe: Oleh Derevianko at the Cybertech NYC Conference
RetDec and LLVM for native code deobfuscation, or how to read unreadable code
ISSP Canada supports Canada-Ukraine business cooperation in cybersecurity
ISSP co-organizes "Cybersecurity Challenges in Ukraine & Globally" roundtable in Washington
Addressing cybersecurity in a holistic manner with ISSP Cybersecurity Preparedness Framework
3 Reasons You Can’t Fully Trust Your Security Tools And What You Can Do About It
A Cybersecure Way to Return to the Office after Lockdown
ISSP Continues Operations in Face of COVID-19 Epidemic