40 Posts

Kacy Zurkus

Zurkus is an influential writer covering a range of security topics with a focus on mitigating risks to businesses. Her work has been published in a variety of industry publications, most notably in CSO Online, where she also penned her own blog, Security Newb. She currently writes about cybersecurity for Medium and has contributed to CyberDB, Cybersecurity Ventures, K12 Tech Decisions, CIO Magazine, and The Parallax. In addition, she is a ghost writer and author of a memoir.

Written By Kacy Zurkus

Getting Your Organization Up to Speed With SAP GRC

There's a growing disparity between IT professionals and the C-suite regarding SAP GRC concerns. Bridging this gap of understanding is the first step toward an effective compliance strategy.

How Gaming Prepares Youth for Careers in Cybersecurity

The time kids spend playing video games online may provide opportunities for learning cybersecurity basics. Experts believe the post-millennial generation could be primed for careers in cybersecurity.

Don’t Wait for Regulations to Transform Cryptocurrency Securities

As bitcoin theft increases and the crypto market remains volatile, the question emerging around cryptocurrency securities is whether government regulation will help stabilize the digital economy.

IBM Veteran Training: Service Members Shine in Cyber Crisis Management Training

As the cybersecurity industry is challenged with a growing skills gap, IBM and CASY are offering cybersecurity training for veterans through the Veterans Accelerator program.

5 Ways to Improve Collaboration Among Security Professionals

Security professionals are not sharing intelligence as effectively as threat actors. The community can build a safer digital future for everyone by adopting more collaborative strategies.

How to Achieve Ransomware Recovery — Without Paying Ransom

Ransomware recovery can be costly for companies with no defense strategy in place. Here's what your organization can do to protect itself from these ever-evolving threats.

How to Navigate Business Ethics in a Data-Hungry Digital World

Data monetization and the digital transformation have forced organizations to navigate the new world of business ethics and security practices.

72 Hours: How a Data Breach Response Plan Can Help You Meet the GDPR Notification Deadline

Without a data breach response plan, companies will find it difficult to disclose security incidents within 72 hours as required by the General Data Protection Regulation (GDPR).

Hiring IT Professionals? Here’s Why Your Recruitment Process Is All Wrong

As companies grow, the process of hiring IT professionals becomes increasingly tedious, putting them at risk of missing out on top talent.

Humans vs. Machines: Will Adversarial AI Become the Better Hacker?

The advent of artificial intelligence (AI) brought with it a new set of attacks using adversarial AI. How can organizations fight an unknown enemy that's not even human?