Cyber Frontlines: Claire Nuñez

28 July 2025

 

 

In this edition of Cyber Frontlines, meet Claire Nuñez, also known by her hacker handle, Onion Baby, Creative Director at IBM X-Force Cyber Range. She draws from experience in privacy, consumer advocacy, marketing and production to create immersive scenarios. We caught up with Claire to learn more about her work and recommendations for those looking to start a career in security.

Stay up to date on Claire’s work on LinkedIn and Bluesky.

What do you do for IBM, and how long have you been with IBM X-Force?

I’ve been an IBMer for about six years, and a part of IBM X-Force for 3.5 of those years. I have a unique job, which is – quite literally - to scare C-suite executive teams. I lead all the creative strategy for the X-Force Cyber Range, which provides clients with an immersive cyber crisis experience. Part of my job is to make clients feel the pressure of a cyber crisis without actually living through one first. My team and I craft scenarios for clients based on threat intelligence and case studies, but my job is specifically to use psychology and theatrical elements to make the whole engagement as life-like as possible.

What got you into security research/hacking?

I’ve always had a knack for finding information on people with a very tiny breadcrumb as a starting point. This brought me into the world of privacy, which eventually took me to security. I’ve always been fascinated by the science of decision-making as well. I studied political psychology, and a lot of the same theories apply to day-to-day human decisioning, especially in security.

What is your security research focus?

Even though I am not a part of the social engineering practice in X-Force, I am often social engineering client emotions in our Cyber Range experiences. I am really trying to get our audiences to feel a certain way, so they understand the importance of security.

Have you received any awards or recognition for your security research work?

In 2024, my colleague Marco Simioni and I won an award from IBM Consulting leadership for our work on developing a deepfake offering for our clients.

What’s your favorite vulnerability to explore?

I think deepfakes and AI-generated content are fascinating. I work with one of my teammates on deepfakes for our clients, and it is so interesting to see how different audio or video inputs work. Sometimes the output content is good, other times, not so good. We have such short attention spans these days that often, a reasonable quality deepfake can trick people who aren’t fully alert or paying attention. It is scary to see, but part of my job is to help people understand the tools they need to recognize these threats.

Who are your favorite security experts to follow and learn from?

My answer is corny, but true: my colleagues.

Name one cybersecurity resource that all security professionals should follow.

Since I mostly focus on the business impact of cyber crises, I generally just keep up to date on what companies are being attacked via different news outlets.

Do you have a favorite security conference to attend and why?

I am not a huge conference attender! I’ve been working on the backend of conferences since I’ve been a part of the Cyber Range team. I really enjoy developing activations, thinking about attendee journeys and telling the IBM story.

What’s one recommendation you would give to help organizations protect their people, data or infrastructure?

I get this question a lot, even from just friends asking. My recommendation is always the same: change your passwords, please. No one actually does it, so that is why I am constantly recommending it. It is annoying to have a bunch of passwords or a password manager— until someone hacks all of your accounts.

What advice do you have for starting a career in cybersecurity?

No matter what industry or role you are in, respect and listening are paramount. It is also key to be able to fail and learn quickly. It is important to get back up and keep moving.

What potential threat vectors are you watching in 2025 and beyond?

A lot of people have a similar response, but I am curious to see how the quantum story evolves. It will be interesting to see when and how encryption is broken in the near future. It may not be 2025, but it is coming.

Related solutions
Threat management services

Predict, prevent and respond to modern threats, increasing business resilience.

 

Explore threat management services
Threat detection and response solutions

Use IBM threat detection and response solutions to strengthen your security and accelerate threat detection.

Explore threat detection solutions
Mobile threat defense (MTD) solutions

Protect your mobile environment with IBM MaaS360’s comprehensive mobile threat defense solutions.

Explore mobile threat defense solutions
Take the next step

Gain comprehensive threat management solutions, expertly protecting your business from cyberattacks.

Explore threat management services Book a threat-centric briefing