Kacy Zurkus

Writer

Want to Join?
Opinions expressed by ICN authors are their own.

Kacy Zurkus is a freelance writer for CSO and has contributed to several other publications including The Parallax, Meetmindful.com and K12 Tech Decisions. She covers a variety of security and risk topics as well as technology in education, privacy and dating. She has also self-published a memoir, Finding My Way Home: A Memoir about Life, Love, and Family under the pseudonym "C.K. O'Neil."

Zurkus has nearly 20 years experience as a high school teacher on English and holds an MFA in Creative Writing from Lesley University (2011). She earned a Master's in Education from University of Massachusetts (1999) and a BA in English from Regis College (1996). Recently, The University of Southern California invited Zurkus to give a guest lecture on social engineering.

The opinions expressed in this blog are those of Kacy Zurkus and do not necessarily represent those of IDG Communications, Inc., its parent, subsidiary or affiliated companies.


3 tips om een echte vakantie te kunnen vieren

Laat telefoon en e-mail van werk je rustperiode niet verpesten.

Minder beveiliging leidt tot betere beveiliging

Je securityteam wordt gek van al die rode vlaggen.

How emerging technology is changing K-12 classrooms

How emerging technology is changing K-12 classrooms

While students in K-12 classrooms are building robots in their makerspaces, IT professionals are building the infrastructure needed to keep up with the latest technologies in the 21st century classroom.

8 new threat intelligence products to make you bulletproof

Threat intelligence systems that deliver accurate and actionable information about cyberthreats can help IT end an attack before real damage is done.

The 6 best things at Campus Tech 2015

The 6 best things at Campus Tech 2015

From online platforms for collecting and assessing student data to user virtualization, here are some highlights of the products and workshops at the Campus Technology 2015 conference.

Have Bug bounties finally become mainstream?

Have Bug bounties finally become mainstream?

The laws of supply and demand have helped to bridge the gap between security hackers-for-hire and the CIO’s office

Why every CIO needs a cybersecurity attorney

Why every CIO needs a cybersecurity attorney

Distinguishing the technical experts from those responsible for legal obligations and risks will help companies develop better breach response plans. Understanding the role of an external cybersecurity firm will only help.

When to outsource tech training for employees

When to outsource tech training for employees

Developing, delivering and maintaining training programs can be time-consuming and costly. Knowing when to relinquish control and when not to can be an essential part of creating a skilled workforce.

CIOs share their secrets to unplugging on vacation

CIOs share their secrets to unplugging on vacation

IT executives have learned how to build strong, reliable and trustworthy teams so that no one person is the single point of contact. That not only allows for more efficiency, it lets CIOs unplug on summer vacations.

Load More