Kacy Zurkus

Writer

Want to Join?
Opinions expressed by ICN authors are their own.

Kacy Zurkus is a freelance writer for CSO and has contributed to several other publications including The Parallax, Meetmindful.com and K12 Tech Decisions. She covers a variety of security and risk topics as well as technology in education, privacy and dating. She has also self-published a memoir, Finding My Way Home: A Memoir about Life, Love, and Family under the pseudonym "C.K. O'Neil."

Zurkus has nearly 20 years experience as a high school teacher on English and holds an MFA in Creative Writing from Lesley University (2011). She earned a Master's in Education from University of Massachusetts (1999) and a BA in English from Regis College (1996). Recently, The University of Southern California invited Zurkus to give a guest lecture on social engineering.

The opinions expressed in this blog are those of Kacy Zurkus and do not necessarily represent those of IDG Communications, Inc., its parent, subsidiary or affiliated companies.

Security and education in the wake of WannaCry, Petya

Can computer science education be fun?

Can computer science education be fun?

Games that focus on concepts over programming languages teach students to think like a computer while having a little fun.

New reality of ransomware attacks spikes FUD in cybersecurity

New reality of ransomware attacks spikes FUD in cybersecurity

Cyber attacks and ransomware are in the news, raising fear of a digital Pearl Harbor.

6 ways security pros unwittingly compromise enterprise security

6 ways security pros unwittingly compromise enterprise security

Overwhelmed and eager to please, security professionals sometimes cut corners and take risks, unwittingly compromising enterprise security.

Outside IT, few aware of projected skills gap to impact security by 2019

Outside IT, few aware of projected skills gap to impact security by 2019

Teaching computer science is a first step toward building the next cybersecurity workforce

Cell phone spoofing: Security risk or just annoying?

Cell phone spoofing: Security risk or just annoying?

Phone calls and text messages from unknown callers—cell phone spoofing is becoming more prevalent and raises security concerns.

Make better security buying decisions with use cases

Make better security buying decisions with use cases

Know your risk, then look to use cases to understand what a security product actually does before you invest in anything.

We can't accept election hacking as a new normal

We can't accept election hacking as a new normal

As the investigations into whether Russian hackers influenced the 2016 Presidential election in the US continue, the rest of the world prepares for the new normal of election hacking.

CEOs' risky behaviors compromise security

CEOs' risky behaviors compromise security

If shadow IT is a problem with business decision makers, that may be a sign your senior security person isn't engaged at a high enough level.

Be wary of vendors touting superior data science

Be wary of vendors touting superior data science

Security vendors are jumping on the data science, machine learning, AI bandwagon, but don't believe the hype. Here's how to make sure the vendor you're evaluating can make good on its promises of data science prowess.

Mining the Minecraft generation

Mining the Minecraft generation

New ways to approach and fill the jobs skills gap

Learning from the ROI of WannaCry

Learning from the ROI of WannaCry

What the earnings indicate about enterprise security practices and unknown future attacks.

Load More