ZeroGuard
Menu button
Blog cover image
dots

Blog

Hackers Running Amok in the New Normal

Hackers Running Amok in the New Normal

A direct result of increased remote working is a spike in cyber criminal activity. Here’s why.

John Turnbull | Creative ProductionApril 8, 2020
How Subscription Services Can Suffer the Startup

How Subscription Services Can Suffer the Startup

Although increasingly necessary, cloud subscription vendors should take steps towardsethical pricing models.

John Turnbull | Creative ProductionApril 7, 2020
Why 5G Isn’t The Retail Saviour

Why 5G Isn’t The Retail Saviour

While some claim the advent of 5G in mid 2020 may bring consumers back to physical stores, there is little to support this.

Cal Leeming | Founder & CEOFebruary 26, 2020
When to Release a New Tech Product

When to Release a New Tech Product

Learn about managing the balance between releasing a new product to market and waiting too long.

John Turnbull | Creative ProductionFebruary 7, 2020
How Will API Copywriting Impact The Tech Industry?

How Will API Copywriting Impact The Tech Industry?

The legal battles going on for copywriting API code could seriously impact the way API code is copied and used in the future.

John Turnbull | Creative ProductionJanuary 17, 2020
How To Use Organizational Calendars for Startups

How To Use Organizational Calendars for Startups

Learn tricks, techniques and sound advice on using an organizational calendar for your startup from top experts.

Cal Leeming | Founder & CEOJanuary 7, 2020
Top Cyber Breaches & Breakthroughs of 2019

Top Cyber Breaches & Breakthroughs of 2019

With cyber attacks continuing to be on the rise, here is a list of some of the biggest data breaches of 2019 and emerging technologies to combat them.

John Turnbull | Creative ProductionDecember 21, 2019
ZeroGuard Investigative Series: A Case of NatWest Phishing

ZeroGuard Investigative Series: A Case of NatWest Phishing

A step-by-step walkthrough of indentifying a hacker’s real phishing attempt on an online bank, complete with screenshots and explanations.

Darren Martyn | Security Researcher/EngineerDecember 4, 2019
Cyber Insurance 101 And Why You Need It

Cyber Insurance 101 And Why You Need It

Cyber Insurance covers businesses and individuals against Internet liability. Typical coverage includes identity theft, personal data theft and data breaches.

John Turnbull | Creative ProductionNovember 27, 2019
Explaining DNS And How To Prevent A Spoofing Attack

Explaining DNS And How To Prevent A Spoofing Attack

Learn the basics about DNS (Domain Name System), preventing DNS Spoofing security issues and simple ways to protect yourself from attacks online.

John Turnbull | Creative ProductionNovember 20, 2019
Coalfire Feels the Heat

Coalfire Feels the Heat

Two infosec pros are now political pawns in a fight seemingly caused by a breakdown in communication between Iowa state and county officials, and Coalfire themselves.

Cal Leeming | Founder & CEONovember 15, 2019
What is a Botnet and How Do I Protect Myself?

What is a Botnet and How Do I Protect Myself?

Protect yourself by preventing Botnet access that can perform DDoS attacks, data theft, and manipulative access to network devices and connections.

John Turnbull | Creative ProductionNovember 13, 2019
What is Domain Reputation?

What is Domain Reputation?

Learn what affects a domain’s risk score and why a proper security platform is essential to keeping you or your company safe.

John Turnbull | Creative ProductionNovember 5, 2019
Who or What is Whois?

Who or What is Whois?

WHOIS is an effective yet sometimes complicated tool for cyber forensics, but learn the basics here.

John Turnbull | Creative ProductionNovember 1, 2019
Cal Leeming Reimagines EDR with the Release of ZeroGuard

Cal Leeming Reimagines EDR with the Release of ZeroGuard

Cal Leeming re-enters the start-up sector with a next generation EDR cybersecurity solution, ZeroGuard. Event and log collection made simple and efficient.

John Turnbull | Creative ProductionOctober 25, 2019
Hacking Smart Devices And How To Protect Yourself

Hacking Smart Devices And How To Protect Yourself

IOT Devices are a popular target cyber attacks. Avoid hackers taking over your devices and wrecking havoc on your life by implementing these basic OPSEC rules.

Cal Leeming | Founder & CEOOctober 24, 2019
Should Public Shaming Be Used to Force Cyber Security Compliance

Should Public Shaming Be Used to Force Cyber Security Compliance

Should private companies be incentivized to help fight cyber crime while improving their defences by enforcing subscription to programs like the NCSC’s ACD?

Cal Leeming | Founder & CEOOctober 23, 2019
dots

Contact Us

Let’s get talking

SEND MESSAGE

Prefer to use email?

[email protected]

Got a security vulnerability to report?

[email protected]

Or you can call us:

UK
0330 053 3844
US
424 425 3613
facebooktwitterlinkedingithubinstagramglassdoorcrunchbase
By using this site you agree to the use of cookies for analytics
OK