top of page
BLOG
TECH
Search
First Technology Western Cape
Sep 8, 20211 min read
Use the Cyber Kill Chain Model to Spot and Stop Hackers
Understanding the cyber kill chain model can help you keep your organization more secure. In the military, a kill chain refers to a...
15 views0 comments
First Technology Western Cape
Jul 28, 20211 min read
Cloud security in 2021: A business guide to essential tools and best practices
Cloud computing services have become a vital tool for most businesses. It's a trend that has accelerated recently, with cloud-based...
19 views0 comments
First Technology Western Cape
Jul 28, 20212 min read
Cyber threats on the rise in these industries in South Africa
Increasingly, companies are looking to adopt smart technologies to optimise production and decision-making in order to create businesses...
16 views0 comments
First Technology Western Cape
May 26, 20211 min read
Ransomware just got very real. And it's likely to get worse
There's just been another ransomware attack, but this one could have more significant consequences than the many that have come before....
17 views0 comments
First Technology Western Cape
May 26, 20212 min read
What Should You Do During a Cyber Attack Event?
Here’s what you can do to mitigate the damage caused by a cyber attack event by slowing or even stopping its progress. While...
33 views0 comments
First Technology Western Cape
Feb 24, 20211 min read
ZACR warns of global cyber criminals targeting SA
The administrator of SA's .za domain name, the ZA Central Registry (ZACR), is warning of an increase in the number of international cyber...
9 views0 comments
First Technology Western Cape
Feb 10, 20211 min read
Microsoft warns enterprises of new 'dependency confusion' attack technique
Microsoft has published a white paper on Tuesday about a new type of attack technique called a "dependency confusion" or a "substitution...
24 views0 comments
First Technology Western Cape
Oct 28, 20201 min read
AI security: This project aims to spot attacks against critical systems before they happen
Microsoft has unveiled a new open-source "matrix" that hopes to identify all the existing attacks that threaten the security of machine-lear
4 views0 comments
First Technology Western Cape
Sep 28, 20201 min read
Global pandemic opening up can of security worms
Caught by the sudden onslaught of COVID-19, most businesses lack or have inadequate security systems.
15 views0 comments
First Technology Western Cape
Sep 9, 20201 min read
A Cyber Pandemic May Be Next: How Secure are you in the Cloud?
The Coronavirus pandemic has influenced us in a more global way than the Cold War.
5 views0 comments
First Technology Western Cape
Sep 8, 20201 min read
Why Security Systems are Only as Successful as the People Who are Behind Them
In May 2020, the personal records of more than 24 million South Africans and nearly 794,000 companies were handed over.
14 views0 comments
bottom of page