Kacy Zurkus

Writer

Want to Join?
Opinions expressed by ICN authors are their own.

Kacy Zurkus is a freelance writer for CSO and has contributed to several other publications including The Parallax, Meetmindful.com and K12 Tech Decisions. She covers a variety of security and risk topics as well as technology in education, privacy and dating. She has also self-published a memoir, Finding My Way Home: A Memoir about Life, Love, and Family under the pseudonym "C.K. O'Neil."

Zurkus has nearly 20 years experience as a high school teacher on English and holds an MFA in Creative Writing from Lesley University (2011). She earned a Master's in Education from University of Massachusetts (1999) and a BA in English from Regis College (1996). Recently, The University of Southern California invited Zurkus to give a guest lecture on social engineering.

The opinions expressed in this blog are those of Kacy Zurkus and do not necessarily represent those of IDG Communications, Inc., its parent, subsidiary or affiliated companies.

Who has the most impact in driving security advancement?

Who has the most impact in driving security advancement?

Advancing security in the enterprise doesn't happen without the right people getting on board

Cyber after Snowden

Cyber after Snowden

How the Snowden leaks have contributed to the larger conversation about privacy and security.

Turn data from risk liability into an asset

Turn data from risk liability into an asset

Data is an instrumental element to a corporations’ success or an enormous security risk

What to think about when moving to the cloud

What to think about when moving to the cloud

Thinking about making the idea of cloud a reality for today's enterprise

Is your security awareness training program working?

Is your security awareness training program working?

The metrics to use to determine where to make improvements in security awareness training

How to stop social media from being the gateway for malware

How to stop social media from being the gateway for malware

Social media sites, largely outside of enterprise control, are rich with personal information for malicious actors

When will car manufacturers secure your vehicle?

When will car manufacturers secure your vehicle?

Security as an afterthought is still the cause of most common vulnerabilities in connected cars.

Why you shouldn't pay the ransomware fee

Why you shouldn't pay the ransomware fee

While most of the decision makers would likely prefer to hear a simple yes or no when asking if they should pay, nothing in security is simple. By and large, the position of many leaders in the industry is that the ideal situation is...

Do third-party vendors have a bullseye on their backs?

Do third-party vendors have a bullseye on their backs?

Because there are so many different kinds of third parties, identifying whether they do or don’t have the right infrastructure or security protocols can be a challenge.

Security blindspots: websites, network architects, and third-party code

Security blindspots: websites, network architects, and third-party code

How much do network architects take security into account when building websites, and does testing extend out to third-party code?

The sport of threat hunting, and who should be in the game

The sport of threat hunting, and who should be in the game

"Hunting is not a sport. In a sport, both sides should know they're in the game." - According to Field and Stream magazine, this is an oft quoted hunting expression. I couldn’t resist the irony of applying this quote to the cyber...

The expanding landscape of exploit kits

The expanding landscape of exploit kits

Angler, Magnitude, and Nuclear are a few of the most commonly used exploit kits criminals are using to deliver a variety of payloads from botnets to ransomware.

Political statements largely behind DDoS attacks

Political statements largely behind DDoS attacks

The Q1 report from Nexusguard found that Hurricane was the top DDoS source used, and attacks were most frequently launched on Tuesdays. The recent results of Nexusguard's Q1 2016 research show that attackers have reverted back to...

Hospitals hacks put patient health at risk

Hospitals hacks put patient health at risk

A report that highlights the vulnerabilities in medical devices and the risks they pose to patient health issued by Independent Security Evaluators comes at an opportune time as the past month has shown that hospitals are becoming...

Defense in depth: Stop spending, start consolidating

Defense in depth: Stop spending, start consolidating

When it comes to layered defense and security tools, less is often more just as more can sometimes be less. The average enterprise uses 75 security products to secure their network. That's a lot of noise and a lot of monitoring and...

Hard-coded passwords remain a key security flaw

Hard-coded passwords remain a key security flaw

Many vendors still allow hard-coded passwords to ship out with their products

Current p2p trends threatening enterprise security

Current p2p trends threatening enterprise security

Security threats from peer to peer communication are nothing new, but they're becoming more sophisticated, and if professionals aren’t looking for these threats, they may go undetected.

Decrypt SSL traffic to detect hidden threats

Decrypt SSL traffic to detect hidden threats

As more enterprises increase the amount of SSL traffic, more criminals are able to hide.

Network security vs. app security: What's the difference, and why does it matter?

Network security vs. app security: What's the difference, and why does it matter?

The idea that time and resources should be invested in either network security or application security is misguided as both are equally as important to securing the enterprise.

Why thinking like a criminal is good for security

Why thinking like a criminal is good for security

Focusing too much on protecting only the crown jewels of the enterprise might leave gaps in security for criminals who are seeking other valuable assets.

Load More