Kacy Zurkus

Writer

Want to Join?
Opinions expressed by ICN authors are their own.

Kacy Zurkus is a freelance writer for CSO and has contributed to several other publications including The Parallax, Meetmindful.com and K12 Tech Decisions. She covers a variety of security and risk topics as well as technology in education, privacy and dating. She has also self-published a memoir, Finding My Way Home: A Memoir about Life, Love, and Family under the pseudonym "C.K. O'Neil."

Zurkus has nearly 20 years experience as a high school teacher on English and holds an MFA in Creative Writing from Lesley University (2011). She earned a Master's in Education from University of Massachusetts (1999) and a BA in English from Regis College (1996). Recently, The University of Southern California invited Zurkus to give a guest lecture on social engineering.

The opinions expressed in this blog are those of Kacy Zurkus and do not necessarily represent those of IDG Communications, Inc., its parent, subsidiary or affiliated companies.

Can computer science education be fun?

Can computer science education be fun?

Games that focus on concepts over programming languages teach students to think like a computer while having a little fun.

New reality of ransomware attacks spikes FUD in cybersecurity

New reality of ransomware attacks spikes FUD in cybersecurity

Cyber attacks and ransomware are in the news, raising fear of a digital Pearl Harbor.

6 ways security pros unwittingly compromise enterprise security

6 ways security pros unwittingly compromise enterprise security

Overwhelmed and eager to please, security professionals sometimes cut corners and take risks, unwittingly compromising enterprise security.

Outside IT, few aware of projected skills gap to impact security by 2019

Outside IT, few aware of projected skills gap to impact security by 2019

Teaching computer science is a first step toward building the next cybersecurity workforce

Is cell phone spoofing a mobile security risk [or just annoying]?

Is cell phone spoofing a mobile security risk [or just annoying]?

Sprint responds to a customer's complaint of mobile phone calls and text messages from unknown callers. Here's what the carrier offers for advice.

Make better security buying decisions with use cases

Make better security buying decisions with use cases

Know your risk, then look to use cases to understand what a security product actually does before you invest in anything.

We can't accept election hacking as a new normal

We can't accept election hacking as a new normal

As the investigations into whether Russian hackers influenced the 2016 Presidential election in the US continue, the rest of the world prepares for the new normal of election hacking.

CEOs' risky behaviors compromise security

CEOs' risky behaviors compromise security

If shadow IT is a problem with business decision makers, that may be a sign your senior security person isn't engaged at a high enough level.

Be wary of vendors touting superior data science

Be wary of vendors touting superior data science

Security vendors are jumping on the data science, machine learning, AI bandwagon, but don't believe the hype. Here's how to make sure the vendor you're evaluating can make good on its promises of data science prowess.

Mining the Minecraft generation

Mining the Minecraft generation

New ways to approach and fill the jobs skills gap

Learning from the ROI of WannaCry

Learning from the ROI of WannaCry

What the earnings indicate about enterprise security practices and unknown future attacks.

Risks to the enterprise from the one-trick pony

Risks to the enterprise from the one-trick pony

Whether an adversary is highly skilled and targeting an organization or taking advantage of a black market service to make a few bucks, any threat is a threat.

Researchers and defenders needed in IIoT

Researchers and defenders needed in IIoT

Strategies to overcome the complexity of patching vulnerabilities in critical infrastructure

Women in cybersecurity need to take more risks

Women in cybersecurity need to take more risks

Projecting confidence and taking risk are keys to success for women in cyber

Resiliency, staying afloat in the face of cyber threats

Resiliency, staying afloat in the face of cyber threats

Today's reality is that if the enterprise uses networked computers, they will get hit at some point. Not having and practicing a recovery plan could be the doom of any organization.

Job seekers beware of recruiters

Job seekers beware of recruiters

Paying a recruiter to find you a job could leave you the victim of a scam. Trending scams that could leave N00bs paying to stay unemployed.

SMBs continue to be a target of cybercriminals

SMBs continue to be a target of cybercriminals

Believing that their security program is good enough means there's a good chance they’ll be breached. Here are some lessons from the bigs guys for the SMBs.

IT mistakes that could cost an organization millions

IT mistakes that could cost an organization millions

Here are some scenarios for N00bs to safeguard against costly mistakes for them and their company.

Are we ready to bid the SIEM farewell?

Are we ready to bid the SIEM farewell?

SIEM technology is old, and possibly not properly configured making it vulnerable to attacks.

National cyber competition reveals top security talent

National cyber competition reveals top security talent

University of Maryland, Baltimore County takes ranks first place in 2017 National Collegiate Cyber Defense Championship. Find out how they did it.

Load More