Kacy Zurkus

Writer

Want to Join?

Kacy Zurkus is a freelance writer for CSO and has contributed to several other publications including The Parallax, Meetmindful.com and K12 Tech Decisions. She covers a variety of security and risk topics as well as technology in education, privacy and dating. She has also self-published a memoir, Finding My Way Home: A Memoir about Life, Love, and Family under the pseudonym "C.K. O'Neil."

Zurkus has nearly 20 years experience as a high school teacher on English and holds an MFA in Creative Writing from Lesley University (2011). She earned a Master's in Education from University of Massachusetts (1999) and a BA in English from Regis College (1996). Recently, The University of Southern California invited Zurkus to give a guest lecture on social engineering.

The opinions expressed in this blog are those of Kacy Zurkus and do not necessarily represent those of IDG Communications, Inc., its parent, subsidiary or affiliated companies.

Securing the modern day castle: defense in depth

Despite the gender barriers, women must persist in cyber

Despite the gender barriers, women must persist in cyber

Overcoming obstacles that challenge women from entering and staying in the security industry

All aboard the blockchain train

All aboard the blockchain train

Blockchain gains attention as its uses are tested across payment platforms.

Online cybersecurity course targets business professionals

Online cybersecurity course targets business professionals

As tech folks adapt to the language of business risk, business professionals learn the language of cyber

Protecting the enterprise against mobile threats

Protecting the enterprise against mobile threats

Mobile devices have transformed the digital enterprise allowing employees to access the information they need to be most productive from virtually anywhere. Has that convenience come at a cost to enterprise security, though?

New ways to think and speak risk

New ways to think and speak risk

Taking a step back and finding new ways to look at the age old problem of risk

What's the value in attack attribution?

What's the value in attack attribution?

Does attack attribution and knowing your adversaries really matter when it comes to securing the enterprise?

Updates that simplify NIST certifications

Updates that simplify NIST certifications

A road map that reduces time and resources required across multiple frameworks and regulations.

Skills of the sophisticated hacker

Skills of the sophisticated hacker

While many cybercriminals today don't need technical skills, many of today's successful hackers are entrepreneurs

Understanding the attack surface to better allocate funds

Understanding the attack surface to better allocate funds

How CISOs can be better informed and get ahead of attacks

Personalized privacy app manages smartphone permission settings

Personalized privacy app manages smartphone permission settings

New app designed to manage privacy settings helps consolidate and tailor user permissions.

Rise of as-a-service lowers bar for cybercriminals

Rise of as-a-service lowers bar for cybercriminals

Widespread availability of RaaS and botnet rentals for DDoS attacks make it easy for those without technical skills to enter into cyber crime

Load More