Kacy Zurkus

Writer

Want to Join?

Kacy Zurkus is a freelance writer for CSO and has contributed to several other publications including The Parallax, Meetmindful.com and K12 Tech Decisions. She covers a variety of security and risk topics as well as technology in education, privacy and dating. She has also self-published a memoir, Finding My Way Home: A Memoir about Life, Love, and Family under the pseudonym "C.K. O'Neil."

Zurkus has nearly 20 years experience as a high school teacher on English and holds an MFA in Creative Writing from Lesley University (2011). She earned a Master's in Education from University of Massachusetts (1999) and a BA in English from Regis College (1996). Recently, The University of Southern California invited Zurkus to give a guest lecture on social engineering.

The opinions expressed in this blog are those of Kacy Zurkus and do not necessarily represent those of IDG Communications, Inc., its parent, subsidiary or affiliated companies.

Understanding the attack surface to better allocate funds

Personalized privacy app manages smartphone permission settings

Personalized privacy app manages smartphone permission settings

New app designed to manage privacy settings helps consolidate and tailor user permissions.

Rise of as-a-service lowers bar for cybercriminals

Rise of as-a-service lowers bar for cybercriminals

Widespread availability of RaaS and botnet rentals for DDoS attacks make it easy for those without technical skills to enter into cyber crime

Counterterrorism analyst explains the dark web

Counterterrorism analyst explains the dark web

Tips for the security news hoping to someday develop an intimate understanding of terrrorists and criminals

What company execs can learn from Trump’s tweeting

What company execs can learn from Trump’s tweeting

Being judicious about social media use and staying away from WiFi protects executives and the enterprise.

Have you seen her resume? 12 amazing women in security

Have you seen her resume? 12 amazing women in security

A look at some impressive women who've advanced in security roles.

Top cybersecurity leaders connect with young security newbs

Top cybersecurity leaders connect with young security newbs

Leaders in the security industry make friends with high school students, introduce cyber careers.

Are Apple-specific threats on the rise?

Are Apple-specific threats on the rise?

Macs are really no more secure than a PC, but for many years there just weren’t as many out there because of the expense of the hardware and other issues. They've historically been a much less popular choice among both consumers,...

Blockchain secures e-voting, eliminates concerns of voter fraud

Blockchain secures e-voting, eliminates concerns of voter fraud

College teams compete to develop blockchain-compliant systems and security challenges including voter privacy, undecided voters, and voter fraud.

New trends in zero-day vulnerabilities

New trends in zero-day vulnerabilities

Best practices to mitigate the risks of zero day vulnerabilities

Machine behaviors that threaten enterprise security

Machine behaviors that threaten enterprise security

Machine learning has moved enterprise security forward, allowing for visibility inside the network in order to better understand user behavior. However, malicious actors are using what is done with machine learning on the inside in...

Hunting for SOCs

Hunting for SOCs

New report looks at the trends, capabilities, and maturity levels of organizations’ security operations centers.

Load More