Breakfast Bytes
In today's edition of the October 5th BREAKFAST BYTES, host Felicia King delves into the complex world of cloud computing, exploring the intricacies of public cloud, private cloud, self-hosting, and premise s
In this riveting episode of Breakfast Bytes, host Felicia sits down with Crystal Redmann, the inquisitive Operations Director from Redmann Farms, to dive into the intricacies of network security.
Good morning and welcome to another episode of Breakfast Bytes. I'm your host, Felicia King, and today, I'm joined by my colleague, Jeff Birner, hailing from Florida.
Today's episode takes a deep dive into the world of artificial intelligence, offering a perspective that challenges the mainstream narrative.
Breakfast Bytes: Host Felicia King discusses Understand implications of IT procurement using cabinets as an example |
In this episode of Breakfast Bytes, Felicia King of QPC Security uses an example of dark web data and how it can be leveraged.
Felicia shares insights on the pitfalls of changing IT service providers or MSPs for both clients and the IT service providers themselves.
Felicia shares insights on the pitfalls of changing IT service providers or MSPs for both clients and the IT service providers themselves.
Felicia is joined by fellow CISO Dawn Montemayor, partner at PureCyber, which is a security minded business consulting firm.
Felicia's guest is Tobias Musser of MNS Group generously shares with the Breakfast Bytes audience his wisdom and insight into what is a challenging and nuanced regulatory landscape that has far reaching business im
The IRS regulations for tax preparers being compliant with the FTC Safeguards rule is specified to be enforced starting in June 2023.
Part 2 of a series on threats to mobile devices and through mobile devices. Tactics and techniques to deal with those threats.
Cohost: Tom Dean – Consulting Ventures
Part 1 of a two-part series on threats to mobile devices and through mobile devices. Tactics and techniques to deal with those threats.
Today's Theme: The process of determining how workloads should be hosted is very complex and not a decision that should be abdicated to the IT service provider.
Kyle Wentworth of Wentworth Consulting Group joins Felicia today to compare/contrast three C-suite level IT/IS related roles.
Breakfast Bytes for Saturday, February 4, 2023 with Felicia King.
Google and how they do their technology
Things that make security hard.
BREAKFAST BYTES with your host, Felicia King. November 5, 2022.
Information Security, Cybersecurity, and Everyone’s Responsibility.
Felicia King's guest today is Ken Dwight.
Felicia King's guest today on Breakfast Bytes is Greg Cloon who works at QPC Security as an Enterprise Security Architect.
Cybersecurity insurance requires MFA for all internal and external administrative access. How do you accomplish this?
Check out dark patterns for scam awareness.
- Problems with and limitations in many assessments
- Many assessment report results from automated tools can be incomplete, incorrect, or pretzel talk
Exchange HAFNIUM attack
· Pretty much every Exchange server on the planet got hacked that was internet accessible without protections in front of it
Challenges with having baseline 101 level quality IT services
Beware of outsourced help desks
Items to use to assess your IT services provider
Counterparty Risk
Solarwinds hack and how it related Dominion voting machines
Juice jacking - don't use public charging stations
Zero trust cybersecurity posture concepts. How many agents should be on an endpoint? Examples of some good products we should use and why Concepts of the technology security stack
Pagination
- Page 1
- Next page