11 Posts

Kacy Zurkus

Zurkus is an influential writer covering a range of security topics with a focus on mitigating risks to businesses. Her work has been published in a variety of industry publications, most notably in CSO Online, where she also penned her own blog, Security Newb. She currently writes about cybersecurity for Medium and has contributed to CyberDB, Cybersecurity Ventures, K12 Tech Decisions, CIO Magazine, and The Parallax. In addition, she is a ghost writer and author of a memoir.

Written By Kacy Zurkus

Humans vs. Machines: Will Adversarial AI Become the Better Hacker?

The advent of artificial intelligence (AI) brought with it a new set of attacks using adversarial AI. How can organizations fight an unknown enemy that's not even human?

A Proposed Solution to the Password Reuse Problem

A group of researchers proposed a new framework that would enable web services to share users' password hash data in an effort to reduce password reuse.

How to Transform Data Into Actionable Threat Intelligence

Threat intelligence should be translated into business-speak to help decision-makers understand the impact of potential threats and incorporate TI into their business strategies.

Achieving Cloud Security Through Gray Skies

When it comes to cloud security challenges, the issue is one of complexity. Many organizations lack a centralized view of all workloads across all of their environments.

If Video Killed the Radio, Will Malvertising Kill Your Website?

Malvertising isn't just a nuisance for internet users — it puts businesses and their customers at risk and compromises the integrity of the online advertising ecosystem.

How to Build a Corporate Culture of Cyber Awareness

The key to creating a culture of cyber awareness is to start small, set achievable goals and help employees understand how enterprise security affects their own privacy.

Is End-to-End IoT Security Financially Feasible — or Even Possible?

Organizations can build toward end-to-end IoT security by understanding the risks connected devices pose to their networks and analyzing how they interact with corporate data.

What Is the Dark Web and Why Would Businesses Use It?

What is the Dark Web, besides an underground haven for cybercriminals to exchange ideas and illicit data anonymously? It can also be a valuable tool for security teams looking to share threat data.

Clearing the Hurdles: Why Companies Have Not Implemented Basic Best Practices for Mobile Security

Recent research has shown that companies are sacrificing mobile security for expediency and business performance.

A W-2 Nor’easter: Digging SOC Analysts Out From Under Tax Fraud False Positives

SOC analysts face blizzardlike conditions during tax season as false positives pile up and legitimate tax fraud alerts are liable to fly under the radar.