Kacy Zurkus

Writer

Want to Join?
Opinions expressed by ICN authors are their own.

Kacy Zurkus is a freelance writer for CSO and has contributed to several other publications including The Parallax, Meetmindful.com and K12 Tech Decisions. She covers a variety of security and risk topics as well as technology in education, privacy and dating. She has also self-published a memoir, Finding My Way Home: A Memoir about Life, Love, and Family under the pseudonym "C.K. O'Neil."

Zurkus has nearly 20 years experience as a high school teacher on English and holds an MFA in Creative Writing from Lesley University (2011). She earned a Master's in Education from University of Massachusetts (1999) and a BA in English from Regis College (1996). Recently, The University of Southern California invited Zurkus to give a guest lecture on social engineering.

The opinions expressed in this blog are those of Kacy Zurkus and do not necessarily represent those of IDG Communications, Inc., its parent, subsidiary or affiliated companies.

SMBs continue to be a target of cybercriminals

Are we ready to bid the SIEM farewell?

Are we ready to bid the SIEM farewell?

SIEM technology is old, and possibly not properly configured making it vulnerable to attacks.

Prevent or detect? What to do about vulnerabilities

Prevent or detect? What to do about vulnerabilities

A good security program includes prevention, detection, and response, so security practitioners need to focus on the vulnerabilities that matter.

SDN solves a lot of network problems, but security isn't one of them

SDN solves a lot of network problems, but security isn't one of them

As the digital enterprise struggles to find the best security solutions to defend their ever-expanding networks, many are looking to next generation tools that offer interoperability capabilities.

Protecting the enterprise against mobile threats

Protecting the enterprise against mobile threats

Mobile devices have transformed the digital enterprise allowing employees to access the information they need to be most productive from virtually anywhere. Has that convenience come at a cost to enterprise security, though?

What's the value in attack attribution?

What's the value in attack attribution?

Does attack attribution and knowing your adversaries really matter when it comes to securing the enterprise?

Understanding the attack surface to better allocate funds

Understanding the attack surface to better allocate funds

How CISOs can be better informed and get ahead of attacks

Rise of as-a-service lowers bar for cybercriminals

Rise of as-a-service lowers bar for cybercriminals

Widespread availability of RaaS and botnet rentals for DDoS attacks make it easy for those without technical skills to enter into cyber crime

What company execs can learn from Trump’s tweeting

What company execs can learn from Trump’s tweeting

Being judicious about social media use and staying away from WiFi protects executives and the enterprise.

Are Apple-specific threats on the rise?

Are Apple-specific threats on the rise?

Macs are really no more secure than a PC, but for many years there just weren’t as many out there because of the expense of the hardware and other issues. They've historically been a much less popular choice among both consumers,...

Protecting more than privacy in schools

Protecting more than privacy in schools

Vendors and researchers want more student data to improve curriculum, but who is thinking about governance and risk management in education?

Playing cyber defense is not enough to win

Playing cyber defense is not enough to win

Where to draw the line when it comes to offensive cyber attacks

Load More