Image for post
Image for post

There is a ton of data points generated from each of your business activities today. A simple email blast to a few thousand recipients generates data pertaining to the open rates, click-through rates and conversion. These data points can further be distilled to infer specific information about the audience demographics that find your message appealing, the subject lines that trigger the user to open your emails, the CTAs that work, and so on.

Such data analysis can be performed for every component of business activity and all of these campaigns can be perfected with the help of data science.

Structuring…


Image for post
Image for post

After working with crypto and blockchain startups from all over the world, I noticed the huge gap between ICO marketing and IEO marketing. In this article, I would like to share my experience and insights working at
Guerrilla Buzz with some of the most interesting and innovative blockchain companies to help you plan and execute the best marketing campaign for your IEO.

Intro From the proverbial ashes of Initial Coin Offerings (ICOs), which whilst still popular amongst the crypto community, are beginning to fall out of favor with newer crypto investors and certain skeptics of the blockchain community in general…


Image for post
Image for post
Photo by Rubén Bagüés on Unsplash

In my latest article about “The Rise Of Zero Trust Architecture”, I wrote about the broad and rapid adoption of this relatively new concept in the world of cybersecurity. However, there are still several other security architectures which are in use today:

Traditional Network Perimeter Security

Traditional network perimeter security is made up of many different parts, all of which work together to provide a security solution for the network.

Traditionally, network security will begin with the authentication of the user, generally by using a username and password. This method is also referred to as one-factor authentication, with two-factor authentication there will be another…


What is Zero-Trust Architecture and why is it Relevant Today?

Image for post
Image for post

Breaking Down Zero Trust Architecture:

Zero Trust architecture is an option to be considered by organizations who want a more reliable way of preventing leaks of confidential data and lowering the risk of modern cyber-attacks against their network. Zero Trust was initially developed by the analytics firm, Forrester Research and it is marketed as an alternative to traditional security architectures.

The majority of businesses use traditional security architecture, which functions using the now incorrect theory that anything which is contained within their own network can be considered trustworthy. In the modern day, security threats can arise internally and with even more intelligence than ever before.


Image for post
Image for post

One of the biggest challenges that are faced by startups in their early life, is related to inspiration. In 2019, the startup market has thrived, but with this comes more intense competition. In this kind of climate, it can be hard to foster more original ideas, even after initial success.

Because of this, we have decided to create this guide for you. In this guide, we will show you the best websites and resources to help you with your professional inspiration in this new year. …


“If you’re starting a business and you take out a loan, you’re a moron,” said firebrand entrepreneur Mark Cuban in an interview with Bloomberg.

Image for post
Image for post

However, if you’re a budding entrepreneur, hearing or reading such things from sharks can be disheartening, especially if you’re looking to start with little to no capital. To be fair to Cuban, he did go at length saying that businesses can be launched through sheer effort. Nevertheless, it takes money to make money, even just to make it through the day.

There are, however, key instances where additional significant funding may be needed, for example, when…


Image for post
Image for post

Your founder may have some great leadership qualities that really help to drive forward your startup, however, if he or she wants to take their skills in leadership to the next level, they will need to be able to develop the characteristics and skills of a thought leader.

Once your founder manages to do this, they will be able to take your startup to the next level as it’s a known fact that a thought leader tends to be the individual that experiences the most success and occupies the highest esteem in their field.

With this in mind, we are…


Image for post
Image for post

When you create your own startup, one of the most important things to consider is where you will get your early funding from. When you begin your project, revenue is likely to be scarce or merely stable, rather than abundant and the success of your business may be centered around whether or not you can secure external investment to jumpstart your venture.

With this in mind, we will be exploring seven European venture capital firms that are experts in their selected industries, who may be able to help you secure the funding that is necessary for your sustained success.

SNÖ Ventures


Image for post
Image for post

2019 is going to be an exciting year for the blockchain community. After a very volatile 2018, we are all looking for a brighter future for our cutting-edge blockchain technology and wide community to emerge back.

The events listed below are sorted by dates, from the beginning of 2019, all the way to the end of the year.

If you would like to add your event, please feel free to contact me:

Telegram: https://t.me/fybish
Email: asaf@guerrillabuzz.com
Linkedin:
https://www.linkedin.com/in/asafybish/

Blockchain Connect Conference: Academic 2019

The event will gather the most authoritative Blockchain professors around the world, the public chain projects with the most advanced technology, and technical experts, to discuss the most cutting-edge Blockchain academic research, problems, and solutions. …


Image for post
Image for post

After working with several STOs, I noticed that many STOs are failing to understand how a proper KYC should look like and how to execute it properly.
In this article, I would like to share my experience working at Guerrilla Buzz with some of the most interesting and innovative blockchain projects and help you plan and execute your KYC and AML process.

Know your customer, also commonly referred to as “know your client” or KYC for short, is the name given to the process of a company confirming their customer’s identity and making an assessment as to whether the business…

Asaf Fybish

I write about Startups, Marketing, Tech and Blockchain. Co-Founder of GuerrillaBuzz (https://guerrillabuzz.com) Owner Of Startupstash (https://startupstash.com)

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store