39 Posts

Kacy Zurkus

Zurkus is an influential writer covering a range of security topics with a focus on mitigating risks to businesses. Her work has been published in a variety of industry publications, most notably in CSO Online, where she also penned her own blog, Security Newb. She currently writes about cybersecurity for Medium and has contributed to CyberDB, Cybersecurity Ventures, K12 Tech Decisions, CIO Magazine, and The Parallax. In addition, she is a ghost writer and author of a memoir.

Written By Kacy Zurkus

Everything Is Best When It Comes to Cybersecurity Best Practices

How can security professionals keep up with cybersecurity best practices without taking too much time away from other responsibilities?

Is Cloud Business Moving too Fast for Cloud Security?

Businesses that want to advance cloud security at scale need to invest in both the people and the technology that will reduce risks.

Let’s Make 2019 the Year of Fewer Records Compromised in Data Breaches

A notable takeaway from the report was that despite fewer reported data breaches, 2018 witnessed a 126 percent uptick in the number of records breached containing personally identifiable information.

Are Your Employees Really Engaging With Security Awareness Training?

Without security awareness training, security will not be front of mind for your end users — but that doesn't mean that companies with formal programs are effectively engaging their employees.

To Improve Critical Infrastructure Security, Bring IT and OT Together

Strong collaboration between IT and OT is a critical step in improving the security of critical infrastructure systems.

What Does Healthcare Cybersecurity Look Like in a Future of Connected Medical Devices?

What can health care companies do to mitigate the risks inherent in the future of health care cybersecurity?

3 Urgent Areas of Action to Address National Cybersecurity Risks

The U.S. is not where it needs to be in terms of managing cybersecurity risks as a national effort, according to the Aspen Cybersecurity Group.

Is It Time for Enterprises to Bid Farewell to BYOD?

As BYOD practices blur the boundary of the enterprise perimeter, how can security leaders ensure corporate data is safe?

From Naughty to NICE: Best Practices for K–12 Cybersecurity Education

The National Institute for Cybersecurity Education is leading the charge in K–12 security awareness training.

How Can Government Security Teams Overcome Obstacles in IT Automation Deployment?

IT automation is the future of security programs, but it's not simply plug-and-play. SOC leaders must implement this technology thoughtfully to unlock the full range of benefits.