Skip to main content

Breakfast Bytes

In today's edition of the October  5th BREAKFAST BYTES, host Felicia King delves into the complex world of cloud computing, exploring the intricacies of public cloud, private cloud, self-hosting, and premise s

In this riveting episode of Breakfast Bytes, host Felicia sits down with Crystal Redmann, the inquisitive Operations Director from Redmann Farms, to dive into the intricacies of network security.

Good morning and welcome to another episode of Breakfast Bytes. I'm your host, Felicia King, and today, I'm joined by my colleague, Jeff Birner, hailing from Florida.

Today's episode takes a deep dive into the world of artificial intelligence, offering a perspective that challenges the mainstream narrative.

Breakfast Bytes: Host Felicia King discusses Understand implications of IT procurement using cabinets as an example

In this episode of Breakfast Bytes, Felicia King of QPC Security uses an example of dark web data and how it can be leveraged.

Felicia shares insights on the pitfalls of changing IT service providers or MSPs for both clients and the IT service providers themselves.

Felicia shares insights on the pitfalls of changing IT service providers or MSPs for both clients and the IT service providers themselves.

Felicia is joined by fellow CISO Dawn Montemayor, partner at PureCyber, which is a security minded business consulting firm.

Felicia's guest is Tobias Musser of MNS Group generously shares with the Breakfast Bytes audience his wisdom and insight into what is a challenging and nuanced regulatory landscape that has far reaching business im

The IRS regulations for tax preparers being compliant with the FTC Safeguards rule is specified to be enforced starting in June 2023.

Part 2 of a series on threats to mobile devices and through mobile devices. Tactics and techniques to deal with those threats.

Cohost: Tom Dean – Consulting Ventures

Part 1 of a two-part series on threats to mobile devices and through mobile devices. Tactics and techniques to deal with those threats.

Today's Theme:  The process of determining how workloads should be hosted is very complex and not a decision that should be abdicated to the IT service provider.

Saturday, September 2, 2023: Breakfast Bytes with Felicia King and her guest, Kyle Wentworth.

August 5, 2023: BREAKFAST BYTES with Felicia King.

 

Kyle Wentworth of Wentworth Consulting Group joins Felicia today to compare/contrast three C-suite level IT/IS related roles.

Breakfast Bytes with Felicia King for Saturday, 3 June 2023.

Saturday, May 6th Breakfast Bytes with Felicia King.

Methods to prevent business email compromise.

 

BREAKFAST BYTES with Felicia King

Saturday, March 4, 2023: 10:00 a.m.

Breakfast Bytes for Saturday, February 4, 2023 with Felicia King.

Google and how they do their technology

Things that make security hard.

The relationship between proper data handling and real risk reduction.

 

Felicia King:  "Here’s a Recent question I got:"

BREAKFAST BYTES with your host, Felicia King.  November 5, 2022.

Information Security, Cybersecurity, and Everyone’s Responsibility.

Felicia King's guest today is Ken Dwight.

https://qpcsecurity.podbean.com/

A Re-Broadcast:  The topic today is: Privileged Asset Management (PAM.)

Felicia King's guest today on Breakfast Bytes is Greg Cloon who works at QPC Security as an Enterprise Security Architect.

Breakfast Bytes with Felicia King.  

The topic today is: Privileged Asset Management (PAM.)

 

Cybersecurity insurance requires MFA for all internal and external administrative access. How do you accomplish this?

API Security and why every business should fund their IT Security or go out of business. 

 

Check out dark patterns for scam awareness.

https://www.darkpatterns.org

  • Problems with and limitations in many assessments
  • Many assessment report results from automated tools can be incomplete, incorrect, or pretzel talk

Identity theft via insecure credit APIs and Integrated IT risk management part 2

How to avoid cybersecurity insurance fraud.

Kaseya VSA Breach Analysis

Practical Usage of Cyber Liability Insurance

Location Services, Face Unlock on iPhone, Colonial Pipeline attack

Incident response and strategies for mitigating supply chain attacks

Exchange HAFNIUM attack

· Pretty much every Exchange server on the planet got hacked that was internet accessible without protections in front of it

Challenges with having baseline 101 level quality IT services

Beware of outsourced help desks

Items to use to assess your IT services provider

Dark web scanning, identity and access management, cybersecurity training for staff

Counterparty Risk

Solarwinds hack and how it related Dominion voting machines

Juice jacking - don't use public charging stations

Overview of the secure endpoint strategy you need to be using for 2021

Zero trust cybersecurity posture concepts. How many agents should be on an endpoint? Examples of some good products we should use and why Concepts of the technology security stack

Bluetooth BLUR attacks

https://hexhive.epfl.ch/BLURtooth/

Bluetooth range estimator

How easy is it to not get hacked?

 

Wireless troubleshooting transitive trust agreements and how they introduce risk to your organization.