Felicia King featured in article about EdTech solutions
Felicia King, president and CEO of QPC Security and member of The ASCII Group, was featured in an article published XaaS Journal covering opportunities ...
Felicia King, president and CEO of QPC Security and member of The ASCII Group, was featured in an article published XaaS Journal covering opportunities ...
Felicia King, president and CEO of QPC Security and member of The ASCII Group, says that access control solutions can be integrated with surveillance, ...
Felicia King, QPC Security’s President and Virtual CISO, was invited to discuss the intricate realm of legacy security systems in a webinar event hosted by Senteon exploring MSS (Legacy). In the webinar, Felicia takes a deep dive into legacy security ...
Lockdowns on campus are a reality that we must address. But it's not just about reacting; it's about being prepared and proactive. In today's world, having a solid technology strategy plan is ...
Zero trust is not a new cybersecurity concept, yet it seems everywhere lately. In case you're unfamiliar with zero trust, it is defined as an approach to security that assumes no implicit ...
Watch the video above for the compilation of Felicia’s takes on this topic. Over the past few years, the paradigm shift in cyber insurance has been significant. As cyber threats continue to evolve and become more sophisticated, the traditional approach ...
Last week, Felicia attended the WatchGuard Partner Conference (QPC Security is one of the top 10 WatchGuard Network Architects in the Western Hemisphere, and a Gold Partner). ...
In commenting on an ASCII article about Firewall Management, Felicia King, QPC Security's President & vCISO, recommends a regimented approach to understanding firewall needs and selecting the right pieces to fit into the overall paradigm. The key starting point as ...
Some clients decline security services. When they do, it’s natural for us to feel some disappointment. However, we also have a responsibility to ourselves and our clients. My first step is to try to educate the client about why I’m providing ...
Controlling access to facilities and data in today’s landscape requires new strategies and technologies. Technological advancements, the ever-changing threat landscape, and the need for more efficient processes are driving new access control trends, both to protect physical and digital assets. ...