Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ColumnsCybersecurityManagementCyber Tactics ColumnSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceCybersecurity News

Cyber Tactics

A transformative journey

By John McClurg
cyber tactics

piranka / E+ via Getty Images

cyber tactics author
cyber tactics
cyber tactics author
March 4, 2022

For many of us, this last month marked the end of an era — and the beginning of a new one.

Like me, you might vividly remember when you got your first BlackBerry device. How it looked. How it felt in your hand. The feeling of connection it afforded to your work, your family and your community. It seemed like more than just an object made of hard black or blue plastic. It was also a rite of passage. It was something we had earned, that spoke not just of our importance to the organization that had bestowed it upon us, but also to our status as a valued professional, whose knowledge and opinions were relied upon even when we were not at our desks.

Millions of people had a very similar experience with those early, pioneering devices. As the mobile and cellular device market began to grow, BlackBerry continued to lead with devices designed to be the most advanced, the most user-friendly, and the most secure that money could buy. For many of us, those devices earned a permanent place in our hearts, making it particularly sad to see them go.

The fierce commitment of our customers to their BlackBerry devices still fills us with pride, though we stopped manufacturing them years ago. We have been holding off on decommissioning the BlackBerry service out of loyalty to our customers for a long time. So it is, with mixed emotions, that I reflect on the closing of that era.  

As was announced, BlackBerry has decommissioned the infrastructure and services used by our legacy software and phone operating systems, which were over 20 years old. That ending, however, marked the beginning of a new era. The independence, mobility, security and privacy that so many of us came to associate with those ground-breaking BlackBerry devices remains alive and strong, as does the spirit of invention and innovation that got us here.

The company ushered in the mobile workforce and messaging revolutions that changed the world. The grandeur of our mission, to make the world a better place, has not diminished.

Five years ago, our Chairman John Chen initiated the reinvention of BlackBerry as a software company, allowing us to stay 100% focused on providing enabling technologies to ensure the safety and security of all the devices and systems we rely on. We invested and invented our way to leadership positions in cybersecurity, encrypted voice and digital communications, automotive safety, and innumerable connected and IoT (Internet of Things) systems and devices in fields such as medical, industrial, avionics and more — all with an underlying, common thread of AI-supported intelligent security.

Today, we secure 96% of the threat landscape, preventing more than 165 million cyberattacks in 2021 alone. We securely connect more than 500 million mobile, desktop and IoT endpoint devices. Our safety-certified software is used in over 195 million vehicles — including those from 24 of the top 25 electric vehicle (EV) manufacturers, and we continue to expand into new markets with new capabilities and innovation. This includes the 2,000 patents awarded to us in the last year.

Chances are, we are more a part of your life today than we ever were as just a handset company, though you may not realize it.

Letting go of the past is always bittersweet, even when a brighter future awaits. At BlackBerry, that brighter future is based on a commitment to solving the world’s most pressing problems with industry-leading technologies in artificial intelligence and machine learning, safety-certified real-time operating systems, critical event management, secure communications and more. We’re expanding and applying that portfolio of capabilities every day to help more customers create a safer, smarter and infinitely more secure way to live and do business.

I’d like to take this opportunity to thank our loyal customers and partners for supporting us throughout this journey. You are an important part of our story, and we are proud to have played a part in yours. After more than three years of offerings in this column, I look forward to that continued journey and to sharing with you insights regarding the threats posed against us and the cybersecurity industry and how we continue to set the bar for delivering intelligent security, everywhere.

KEYWORDS: cyber security information security risk management security vulnerabilities

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

John mcclurg

John McClurg served as Sr. Vice President, CISO and Ambassador-At-Large in BlackBerry's/Cylance’s Office of Security & Trust. McClurg previously was CSO at Dell; Vice President of Global Security at Honeywell International, Lucent Technologies/Bell Laboratories; and in the U.S. Intelligence Community, as a twice-decorated member of the Federal Bureau of Investigation.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Man in mask by LED light

A Real-Life Horror Story: When AI Ghouls Move Faster Than Defenses Can React

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

University lecture

1.2M Individuals’ Data Stolen In University Hacking

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 19, 2025

From Chaos to Clarity: How Real-Time, Location-Aware Intelligence Strengthens Security Programs

When disruptive events hit, security teams must move fast to protect people, executives, and assets. Every minute of delay can mean operational losses, safety risks, and reputational impact. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Cyber tactics

    2023: The year for contextual cyber threat intelligence

    See More
  • cyber security

    Reflections on 35 years in the trenches

    See More
  • Cyber

    Have we declared “open season” on CISOs?

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • Physical Security and Safety: A Field Guide for the Practitioner

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing