Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementPhysicalCyber Tactics ColumnSecurity Enterprise ServicesSecurity Leadership and ManagementSecurity & Business Resilience

Cyber Tactics

A cybersecurity year in review

By John McClurg
cyber tactics year in review

Martin Barraud / OJO Images via Getty Images

SEC-1221-CyberTactics-Slide2-1170x658.jpg
cyber tactics year in review
SEC-1221-CyberTactics-Slide2-1170x658.jpg
December 8, 2021

In retrospect, 2021 passed as a whirlwind for those of us in cybersecurity. We experienced an accelerated shift toward a world in which its distinctions, definitions and categorical identities grew ever more porous.

The physical and digital worlds continued to merge, so much so that any barrier that had existed between them is now nearly gone. The growth of this porosity and its associated increase in attack vectors was exacerbated by expansion of the Internet of Things (IoT) and the more intertwined and connected environment it creates.

This brings us to what we might consider the core of this year’s challenges, as reflected in the SolarWinds and Colonial Pipeline compromises: the continued growth of successful ransomware attacks and the promulgation of the Executive Order regarding software bill of materials (SBOM). These events stand out as a reflection of what I consider most significant when it comes to what we saw in 2021 and are the basis of what we might expect to see in the year to come.


SolarWinds

Adding to the complexity evidenced in this compromise was the growth and acceptance of Continuous Introduction/Continuous Delivery (CI/CD) over the years as the backbone of modern-day DevOps operations. CI/CD represents an approach to software development that seeks to leverage shorter development cycles in delivering a steady stream of potentially disruptive innovations to customers who incessantly clamor for “more… faster.”

SolarWinds forced upon us an unsettling realization of the implications of a foundational system whose updates were compromised and propagated in the manner revealed. The contextual battlespace in which that propagation occurred was further exacerbated by the growing porosity mentioned above that makes up the modern supply chain, giving an adversary an almost unlimited number of “weakest leaks” through which to explore the options and realize the fruits of their efforts.


Colonial Pipeline

The lessons heralded by last May’s Colonial Pipeline compromise were recently punctuated by the Iranian Gas Pumps affair. These taken-for-granted aspects of daily living don’t have to be denied us for very long before an unacceptable pain settles in. The Colonial Pipeline, which supplies 45% of the East Coast’s supply of various fuels, was taken offline after it was impacted by a ransomware attack. Now, on the other side of the world, another cyberattack has left drivers in Iran with virtually no fuel. The online attack reportedly crippled essentially every gas station across Iran — ironic, as that nation is a leading exporter of oil.


Ransomware on the Rise

The Colonial Pipeline affair was just one instance of how ransomware attacks took the headlines by storm in 2021 — notwithstanding the existence of validated, AI-supported math models whose prowess against such attacks continues to be well-documented. That an inertia seems to yet hold major Fortune 500 companies and infrastructures of nations prisoner and doggedly committed to outdated models of defense staggers rational comprehension. That modern ransomware attacks appear to easily circumvent the established pillars of traditional cyber protection punctuates the need to find new ways to solve this problem. Advancing the same old solutions while expecting different outcomes is the classic definition of “insanity.”


Executive Order

Proving that the supply chain implications of these standout events did not go unappreciated, the U.S. presidential administration issued an Executive Order, the heart of which requires those who manufacture and distribute software a new awareness of their supply chain to detail what is actually in their products — particularly open-source software — and the ability to reflect that awareness in an accurate SBOM. With announced vulnerabilities growing ever more prevalent, these SBOMs will provide purchasers with a means of determining how relevant any announcement may be to their interests.


Where to Go From Here

Although predicting the future is a challenging business under the best of circumstances, it is perhaps made easier by the fact that we, as humans, so often refuse to learn from the past and are, therefore, condemned to repeat it, as George Santayana is often quoted as saying. Predicting the future thus becomes, in part, the practice of isolating those lessons we should have learned but did not and translating that into what we are then likely to experience again. Heraclitus of Ephesus opined that you can’t step in the same river twice, but these repeat experiences should be similar enough to afford insights into what mitigating actions might be open to us.

We’ve learned that, apparently, our math models can predict and continue to do so at least in the limited sphere of malware. They actually do know what attack will come next — oftentimes years in advance. In other spheres, we’re not so fortunate. What we can do, however, is use the available information at hand to best prepare ourselves for every possible scenario. We know what technology is being developed and we know the potential risks that come with it. We’ve seen how adversaries can harness the power of good to do harm. It’s up to everyone in the cybersecurity community to ensure smart, strong defenses are in place in the coming year to protect against those threats.

Check back in next month for 2022’s inaugural column where we will explore predictions for the coming year.

KEYWORDS: cyber security information security risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

John mcclurg

John McClurg served as Sr. Vice President, CISO and Ambassador-At-Large in BlackBerry's/Cylance’s Office of Security & Trust. McClurg previously was CSO at Dell; Vice President of Global Security at Honeywell International, Lucent Technologies/Bell Laboratories; and in the U.S. Intelligence Community, as a twice-decorated member of the Federal Bureau of Investigation.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Cyber tactics

    2023: The year for contextual cyber threat intelligence

    See More
  • cyber security

    Reflections on 35 years in the trenches

    See More
  • Cyber

    Have we declared “open season” on CISOs?

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • Physical Security and Safety: A Field Guide for the Practitioner

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing