Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ColumnsManagementPhysicalCyber Tactics ColumnSecurity Enterprise ServicesSecurity Leadership and ManagementSecurity & Business ResilienceFire & Life SafetyPhysical Security

Cyber Tactics

Christmas came early — Log4Shell & mitigating open-source vulnerabilities

By John McClurg
cyber

Raunamaxtor / iStock / Getty Images Plus via Getty Images

cyber tactics
cyber
cyber tactics
February 4, 2022

Christmas came early this past December! By that I mean, the attacks that we’ve come to expect from our “frenemies” — the Chinese nation-state attackers who historically strike on this holiday — made themselves felt the week before. They weren’t the only ones reputedly attempting to capitalize on the Log4j vulnerability. The associated numbers were so great that the peal of “The internet is on fire!” rang out from around the globe. It wasn’t long until the words of the poet Rudyard Kipling came to mind: “If you can keep your head when all about you are losing theirs...” 

In addition to being touted by many as perhaps the greatest security challenge this generation will have known, the Log4j vulnerability punctuated an awareness already brought to the forefront by the recent cybersecurity executive order that declares, in an ever-more-connected world, the growing importance that must be ascribed to supply chain security and the criticality of open-source software resident in that chain.  

In many ways, the sharing reflected in that kind of software has lain at the heart of the internet’s development. The free and open sharing of packet theory by Leonard Kleinrock allowed for the development of the ARPANET. Bob Kahn, having developed the first widescale demonstration of ARPANET infrastructure, made an unprecedented agreement with internet rival David Farber allowing for CSNET traffic to share all his existing infrastructure. And finally, global government agencies shared the cost for much of the initial physical infrastructure needed for widespread accessibility and formed the Coordinating Committee on Intercontinental Research Networking — as a means by which to continue fostering that collective spirit. 

It's said, however, that every rose has its thorn — in this instance, it’s apparently a vulnerability that resides at the heart of today’s version of internet collectivism: open-source software. 

Quickly dubbed Log4Shell, the flaw results are what could be characterized as improper input validation. This allows for remote code execution, meaning attackers can have sole command of affected machines. While the technical details of the vulnerability don’t immediately seem worthy of the front-page concern that it has engendered, the sting lies in the widespread use of the base software, utilized in the programming language Java — the language that underpins coding for Apple, Microsoft and Amazon’s entire digital offerings. The collectivist mentality, which has allowed the internet to scale to a level incomprehensible 30 years ago, also presents cybercriminals with a golden ticket opportunity. 

The Log4j vulnerability shows that cybercriminals are continuing their string of successes, picking holes at the connective tissue holding the internet together. And why wouldn’t they? As I’ve pointed out in a past column, 99% of all codebases contain some elements of open-source code. 

This ability to control and command a server can inflict untold havoc. It can start (and keep) the dominoes falling in a massive ransomware attack. It can impact people’s ability to work or allow for the quick formation of significantly sized botnets. It can shake people’s confidence in the ability to mine, store and use new digital currencies. Any of these outcomes could be catastrophic to a business, employee or individual. And they constitute only the tip of the iceberg when considering the types of threats possible when vulnerabilities are found in coding used so ubiquitously by companies.

As security professionals, it’s impracticable to imagine a world in which we eliminate all risk from our software stacks — that would likely cripple productivity and send customers straight to the complaint boards. We can, however, enable complete software visibility so that organizations can more readily identify and mitigate any future instances of discovered vulnerabilities. It was toward that end that we created an Open-Source Software Program Office at Blackberry. It allows us to track and categorize our entire product portfolio’s open-source software contents and to quickly identify where, in each of our products, aspects of a particular library reside. That information enables us to then expeditiously file fixes for announced vulnerabilities into the appropriate software engineering teams and, in turn, their mitigations to any potentially impacted customers.

The ability to rapidly inspect all elements of application codes at an enterprise-wide level with software composition analysis tools is an indispensable aspect going forward for any organization’s effort to build secure software. In circumstances where we are frantically searching to understand how much of our software infrastructure might be impacted by an unfolding breach, this AI-powered visibility can be invaluable. 

The internet was predicated on sharing. It’s up to us as security professionals to continue sharing our knowledge and innovations in fighting today’s unscrupulous adversaries. It’s also up to us to ensure organizations are aware of the extent to which their enterprise is reliant on open-source software, as well as the practical steps we can take to mitigate attacks against this bedrock software. 

KEYWORDS: cyber security information security security vulnerabilities

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

John mcclurg

John McClurg served as Sr. Vice President, CISO and Ambassador-At-Large in BlackBerry's/Cylance’s Office of Security & Trust. McClurg previously was CSO at Dell; Vice President of Global Security at Honeywell International, Lucent Technologies/Bell Laboratories; and in the U.S. Intelligence Community, as a twice-decorated member of the Federal Bureau of Investigation.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Cyber

    Have we declared “open season” on CISOs?

    See More
  • Cyber tactics

    2023: The year for contextual cyber threat intelligence

    See More
  • cyber security

    Reflections on 35 years in the trenches

    See More

Related Products

See More Products
  • Photonic Sensing: Principles and Applications for Safety and Security Monitoring

  • High-Rise Security and Fire Life Safety, 3rd edition

See More Products

Events

View AllSubmit An Event
  • September 23, 2025

    From Signal to Action in Seconds: How Nutrien Translates Early Warnings into Operational Confidence

    ON DEMAND: When a threat emerges — how fast can your team respond? The ability to detect, validate and act with confidence can be the difference between a contained incident and a costly crisis.
  • February 20, 2025

    Ideological Tensions in the Workplace: Understanding and Mitigating Risks of Violence

    ON DEMAND: Organizations face evolving threats, including workplace violence stemming from ideological tensions, political polarization, economic disparities, and other factors.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing