Kacy Zurkus

Writer

Want to Join?

Kacy Zurkus is a freelance writer for CSO and has contributed to several other publications including The Parallax, Meetmindful.com and K12 Tech Decisions. She covers a variety of security and risk topics as well as technology in education, privacy and dating. She has also self-published a memoir, Finding My Way Home: A Memoir about Life, Love, and Family under the pseudonym "C.K. O'Neil."

Zurkus has nearly 20 years experience as a high school teacher on English and holds an MFA in Creative Writing from Lesley University (2011). She earned a Master's in Education from University of Massachusetts (1999) and a BA in English from Regis College (1996). Recently, The University of Southern California invited Zurkus to give a guest lecture on social engineering.

The opinions expressed in this blog are those of Kacy Zurkus and do not necessarily represent those of IDG Communications, Inc., its parent, subsidiary or affiliated companies.

Hunting for SOCs

What's new with encryption?

What's new with encryption?

What it means when you see the little open red lockbox in an email exchange

Bringing boards up to cyber speed

Bringing boards up to cyber speed

The exponential growth of cyber risk has impacted roles for the CISO and the CEO, among others, but it has also left board members a little in the dark when it comes to understanding the risks associated with cybersecurity.

Don't predict, protect

Don't predict, protect

How businesses can actually protect themselves against a variety of threats.

Dangerous assumptions that put enterprises at risk

Dangerous assumptions that put enterprises at risk

Trusting that the solutions won't fail and users won't click could lead to a breach

In hindsight, preparing for security in 2017

In hindsight, preparing for security in 2017

What experts learn from looking back at 2016

Best and worst online retailers for security

Best and worst online retailers for security

Now that the shopping is done, let's take a look at who made the naughty or nice list for security practices

Managing expectations for enhancing national cybersecurity

Managing expectations for enhancing national cybersecurity

Call for force multiplier won't solve the cybersecurity challenges

Protecting more than privacy in K-12 sector

Protecting more than privacy in K-12 sector

Vendors and researchers want more student data to improve curriculum, but who is thinking about governance and risk management in education?

Warning: SHA 1 deadline gets real in 2017

Warning: SHA 1 deadline gets real in 2017

There's not a lot of time left to migrate to SHA 2 certification.

Application whitelisting, the battles you can win

Application whitelisting, the battles you can win

Improved application whitelisting technologies that defend against malware

CISOs bridge communication gap between technology and risk

CISOs bridge communication gap between technology and risk

There's a new CISO in town, and that person is now bridging the gap between technology and risk. Toward that end, many CSOs and CISOs are starting to report to the chief risk officer rather than the CIO.

Load More