ISSP joins the ATHENA project to fight against information manipulation and interference
- Jan 11
- 4 min
Main Cybersecurity Trends in 2024: Imperatives for Business Resilience
- Dec 27, 2023
- 1 min
Cybersecurity Tips for Small and Medium-sized Businesses: 10 Essential Practices
- Nov 27, 2023
- 3 min
"Cybersecurity and Energy Resilience" project has been launched to protect Ukrainian energy sector
- Oct 20, 2023
- 2 min
AI in Cybersecurity: Enhancing Defense with Artificial Intelligence
- Oct 18, 2023
- 2 min
Innovations in Antifraud Solutions: A Glimpse into SOC Day with ISSP and D8 Corporation
- Sep 22, 2023
- 2 min
Choosing the Right Managed Security Service: Threat Hunting vs Incident Detection
- Sep 7, 2023
- 2 min
Combatting Payment Fraud Challenges: ISSP Facilitates Discussion Among Financial Leaders
- Aug 22, 2023
- 2 min
Re/start in Cyber Pilot Project: Strong Participant Motivation and Interest from Leading Employers
- Aug 16, 2023
- 7 min
Penetration test: All you need to know to strengthen your cybersecurity defences
- Jul 20, 2023
- 2 min
AI-based Security: AIRA is a Finalist of the Prestigious European Project SecurIT
- Jul 17, 2023
- 3 min
Top 5 Cybersecurity Mistakes of Small Businesses and Startups
- Jul 14, 2023
- 2 min
ISSP and EMA Partner to Protect Ukraine's Financial Institutions
- Jun 27, 2023
- 6 min
Navigating the Cybersecurity Battlefield: Best Practices for Cyber Awareness and Incident Response
- Jun 1, 2023
- 1 min
Building Bridges for Cybersecurity: Oleh Derevianko's Keynote at TMU IT Conference
- May 12, 2023
- 2 min
ISSP empowers SMEs with Cybersecurity Hub
- May 3, 2023
- 3 min
Decrypting the code: a deep dive into Frida's traffic interception capabilities
- Apr 27, 2023
- 2 min
From zero to cyber hero: re/start in cyber program doubles the number of students
- Apr 13, 2023
- 4 min
Threat Hunting & Anomaly Detection solution: Protecting your business from cyber threats
- Apr 5, 2023
- 4 min
How to mitigate cyber risks in your organizations. 4 Dos and 1 Don’ts