Kacy Zurkus

Writer

Want to Join?
Opinions expressed by ICN authors are their own.

Kacy Zurkus is a freelance writer for CSO and has contributed to several other publications including The Parallax, Meetmindful.com and K12 Tech Decisions. She covers a variety of security and risk topics as well as technology in education, privacy and dating. She has also self-published a memoir, Finding My Way Home: A Memoir about Life, Love, and Family under the pseudonym "C.K. O'Neil."

Zurkus has nearly 20 years experience as a high school teacher on English and holds an MFA in Creative Writing from Lesley University (2011). She earned a Master's in Education from University of Massachusetts (1999) and a BA in English from Regis College (1996). Recently, The University of Southern California invited Zurkus to give a guest lecture on social engineering.

The opinions expressed in this blog are those of Kacy Zurkus and do not necessarily represent those of IDG Communications, Inc., its parent, subsidiary or affiliated companies.

Searching for unicorns: Managing expectations to find cybersecurity talent

Vulnerability vs. risk: Knowing the difference improves security

Vulnerability vs. risk: Knowing the difference improves security

Conflating security terms evokes fear but doesn't help security newbs understand the difference between vulnerabilities and actual risks.

What the Equifax breach means to me — an end user perspective

What the Equifax breach means to me — an end user perspective

Recovery and resiliency or apathy. Which will prevail now that most everyone's PII has been exposed in the Equifax data breach?

Abandoned mobile apps, domain names raise information security risks

Abandoned mobile apps, domain names raise information security risks

When app creators abandon domains for bigger, better deals, what happens to all the app-specific data?

Security chatbot empowers junior analysts, helps fill cybersecurity gap

Security chatbot empowers junior analysts, helps fill cybersecurity gap

Endgame's Artemis eliminate syntax or query language, allowing junior analysts to communicate with the network more intuitively to find security issues.

Enterprise security needs a Mother of Dragons to keep attackers out

Enterprise security needs a Mother of Dragons to keep attackers out

Some Game of Thrones defense strategies you can apply to your organization's cybersecurity strategy

Women in security: Stand your ground against harmful gender stereotypes

Women in security: Stand your ground against harmful gender stereotypes

Words and actions matter as much as technical skills in confronting diversity issues and gender stereotypes in the workplace.

Top 5 container mistakes that cause security problems

Top 5 container mistakes that cause security problems

As enterprises increase their adoption of containers, they are also increasing the number of security mistakes they make with the technology.

What's the ROI on attribute-based access control?

What's the ROI on attribute-based access control?

Despite the predicted growth of attribute-based access control (ABAC), misconceptions about it leave decision makers concerned about ROI

Closing the IT and cybersecurity skills gap with programming games

Closing the IT and cybersecurity skills gap with programming games

New board games that teach code through concepts may help narrow the skills gap by making coding fun for all ages.

Red team versus blue team: How to run an effective simulation

Red team versus blue team: How to run an effective simulation

Playing the role of an attacker can make your team better at defense. Learn how in our step-by-step guide to war gaming your security infrastructure — from involving the right people to weighing a hypothetical vs. live event.

Security and education in the wake of WannaCry, Petya

Security and education in the wake of WannaCry, Petya

To prevent from becoming victims of cyber attacks like WannaCry, enterprises should regularly back up data, patch software and use automated security services.

Load More