false
Mick Baccio

Mick Baccio

This one time, I read a book called "Neuromancer" and thought, "Computers are cool. I want to do that." Here we are.

Learn 5 Min Read

Scattered Spider Isn’t a Glitch, It’s a Warning

Scattered Spider uses social engineering to exploit identity systems and disrupt business operations. Boards must act urgently to close these gaps.
CISO Circle 6 Min Read

Cyber Regulations Are a Goldmine — If You Use Them Right

Leverage regulations for a business edge.
Industries 2 Min Read

Bridging the Cyber Confidence Gap: Digital Resilience in the Public Sector

Mick Baccio shares the findings of Splunk's report – conducted in collaboration with Foundry – on bridging the resilience gap across public and private sectors.
Security 3 Min Read

Cybersecurity Awareness Month Spotlight: Insights from the Cisco Talos & SURGe Teams

The Cisco Talos and SURGe by Splunk teams gathered for a special episode of Talos Takes filled with engaging cybersecurity discussions and candid opinions.
Security 3 Min Read

Macro ATT&CK for a TTP Snack

Splunk's Mick Baccio and Ryan Fetterman explore 2024's macro-level cyber incident trends through the lens of the MITRE ATT&CK framework.
Security 3 Min Read

Vulnerability Prioritization Is a Treat for Defenders

There have been numerous high-profile cybersecurity incidents where vulnerability management had an impact on severe breaches – here are some notable examples.