What security folks need to learn from RIM's stunning downfall

Mike Rothman, Analyst & President, Securosis

January 25, 2012

4 Min Read

If you've been too focused on fighting fires all week, you may have missed the big news in the mobile space. No, not that Apple sold 37 million iPhones and 15 million iPads. Founders and co-CEOs of RIM (Research in Motion) stepped down. Even better, they went all the way down the hall to find their successor. COO Thorsten Heins was named to the CEO post, and his first public statement was: "I Don’t Think There Is a Drastic Change Needed."

Really? RIM has been executing so well that vultures have been circling around its carcass for almost two years. We don't track market share or anything, but you know it's hard to restrain that chuckle when you see some poor sap pull out a BlackBerry nowadays. You probably ask whether his new iPhone or Android is on order. If not, he grumbles something about still being on Windows XP and how his IT group isn't quite on the cutting edge.

To be clear, this isn't about RIM --in my Ivan Drago voice, "If they die, they die" -- it's just sad to see a company that was a true innovator with huge momentum refuse to acknowledge market realities, refuse to change, and then move so slowly once it decided it had problems. HP basically gave up, as it couldn't rescue WebOS. This game is over, and RIM lost. Oh, well. But there are a couple of very instructive lessons that we security folks need to pay attention to, or face a similar fate.

The first is the need to evolve with the times. For a long time, the fairly rudimentary defenses we had were good enough. You know: keeping your devices patched, your AV up to date, and your network ops team from screwing with the firewall and IDS too often. But then things started to change, and far too many security folks have been too resistant to change with them.

The attackers aren't going through the front door anymore. They use your people against you through novel social-engineering attacks. They use your developers against you by taking advantage of holes in your code. They attack your security vendors to be able to bypass the products you buy from them. Yet far too many security folks get excited by that firewall upgrade, or getting their hands on the newest version of the endpoint suite, which sucks less than the last one. What worked in the past won't work in the future.

Not that we can turn away from these traditional security controls. Due to both compliance mandates and script kiddies, we're still forced to keep these products in use and will for the foreseeable future. But those controls aren't enough. You have to roll with the tides and understand your controls are insufficient. You need to look at new technologies (like network-based malware detection), address the soft spots (database and application security), and focus on detection and response. You already are compromised -- the question is whether you know it yet.

Second, sometimes you need new blood. RIM seemed to take the easy path and just promote someone who was involved in the fiasco that company has become. Sometimes that has worked out, but there are very few examples of that. Be brutally honest about your situation. Do your IT and security leaders continue to be tone deaf to what's going on around them? Are they more concerned with their fiefdoms than in asking the tough questions that need to be asked? If so, then maybe it's time to figure out whether you can be successful in your job. We've all seen that movie before, and it is usually someone other than the senior folks to take the fall, at least the first couple of times.

There will be another job, just like there was another smartphone to step in when RIM couldn't evolve fast enough. The best thing you can do as a practitioner is to stay focused on what you need to do and make an assessment regarding whether you can be successful. When it's clear you are destined for failure, pack up and move on. The last thing you want is to still be on the ship as it runs aground. Falling into the lifeboat doesn't sound very good during your next interview.

Mike Rothman is President of Securosis and author of the Pragmatic CSO.

About the Author(s)

Mike Rothman

Analyst & President, Securosis

Mike's bold perspectives and irreverent style are invaluable as companies determine effective strategies to grapple with the dynamic security threatscape. Mike specializes in the sexy aspects of security, like protecting networks and endpoints, security management, and compliance. Mike is one of the most sought after speakers and commentators in the security business and brings a deep background in information security. After 20 years in and around security, he's one of the guys who "knows where the bodies are buried" in the space.

Starting his career as a programmer and a networking consultant, Mike joined META Group in 1993 and spearheaded META's initial foray into information security research. Mike left META in 1998 to found SHYM Technology, a pioneer in the PKI software market, and then held VP Marketing roles at CipherTrust and TruSecure - providing experience in marketing, business development, and channel operations for both product and services companies.

After getting fed up with vendor life, he started Security Incite in 2006 to provide the voice of reason in an over-hyped yet underwhelming security industry. After taking a short detour as Senior VP, Strategy and CMO at eIQnetworks to chase shiny objects in security and compliance management, Mike joins Securosis with a rejuvenated cynicism about the state of security and what it takes to survive as a security professional.Mike published "The Pragmatic CSO" in 2007 to introduce technically oriented security professionals to the nuances of what is required to be a senior security professional. He also possesses a very expensive engineering degree in Operations Research and Industrial Engineering from Cornell University. His folks are overjoyed that he uses literally zero percent of his education on a daily basis.

He can be reached at [email protected]. Follow him on Twitter @securityincite

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights