{"id":45249,"date":"2022-02-11T15:25:00","date_gmt":"2022-02-11T15:25:00","guid":{"rendered":"https:\/\/www.darkreading.com\/edge\/blackberry-seeks-to-restore-its-past-glory-with-services-push"},"modified":"2022-02-11T15:25:00","modified_gmt":"2022-02-11T15:25:00","slug":"blackberry-seeks-to-restore-its-past-glory-with-services-push","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/blackberry-seeks-to-restore-its-past-glory-with-services-push\/","title":{"rendered":"BlackBerry Seeks to Restore Its Past Glory With Services Push"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt54029d32a801d3bc\/60e3a2bbed354a206ee29dd5\/cybersecurity-shutterstock_434921974.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>BlackBerry was once king of the smartphone world, reaching more than 40% market share in the US in 2010. But those days are long past. At the beginning of this year, the Canadian company finally pulled the plug on its device business, ending support for its smartphone and tablet operating systems. <\/p>\n<p>CEO John Chen argued that this was not the end but &#8220;<a href=\"https:\/\/blogs.blackberry.com\/en\/2022\/01\/blackberrys-transformation-journey-and-our-smartphone-heritage\" target=\"_blank\" rel=\"noopener\">the beginning of a new era<\/a>&#8221; in which the company will focus on cybersecurity, which already generates <a href=\"https:\/\/www.blackberry.com\/us\/en\/pdfviewer?file=\/content\/dam\/bbcomv4\/blackberry-com\/en\/company\/investors\/financial-reports\/2022\/q3y2022\/Q3-FY22-Earnings-Press-Release-PDF.pdf\" target=\"_blank\" rel=\"noopener\">around 70%<\/a> of its revenue. This trajectory could offer plenty of opportunities. &#8220;It&#8217;s a high growth market for any vendor to address,&#8221; says Matthew Ball, chief analyst at Canalys.<\/p>\n<p>But there are also challenges specific to smaller players like BlackBerry that need to be worked around. &#8220;We have not seen the broad growth [with BlackBerry] that we see with other security vendors,&#8221; says Fernando Montenegro, senior principal analyst at Omdia.<\/p>\n<p>The Waterloo, Ontario-based company is a leader in cybersecurity for the automotive industry and plans to further develop the capabilities of its BlackBerry QNX embedded OS. According to CTO Charles Eagan, the company also aims to continue to improve its other products, including the Spark Suite, currently used by <a href=\"https:\/\/www.blackberry.com\/us\/en\/company\/newsroom\/press-releases\/2022\/blackberry-helps-us-government-vendors-comply-with-new-software-bill-of-materials-mandate\" target=\"_blank\" rel=\"noopener\">governments<\/a>, businesses, and financial institutions.<\/p>\n<p>&#8220;There&#8217;s still a lot that we&#8217;re offering, and we hope people can see us in the new light,&#8221; Eagan says.<\/p>\n<p><strong>Focusing on Cybersecurity<\/strong><br \/>BlackBerry&#8217;s plans of reinventing itself as a security company capitalize on one of the firm&#8217;s remaining strengths. &#8220;This focus allows them to husband their limited resources and focus those resources on the most significant opportunity for advancement,&#8221; says Enderle Group technology analyst Rob Enderle.<\/p>\n<p>At the beginning of 2022, BlackBerry secured more than 500 million mobile, desktop, and Internet of Things (IoT) endpoint devices. The number includes almost 200 million vehicles built by top manufacturers, such as Ford, GM, BMW, Honda, Mercedes-Benz, Toyota, and Volkswagen. These brands use BlackBerry QNX, which has a robust cybersecurity component and allows the control of a wide range of safety-related systems, such as cruise control, tire pressure, and automatic parking. On the electric vehicle market, QNX is used by 24 of the top 25 manufacturers, the only exception being Tesla.<\/p>\n<p>BlackBerry&#8217;s CTO says that QNX remains a strategic part of the business, and the company is investing in developing it further. Another product that will gain new capabilities is Spark Suite, which helps organizations secure and manage endpoints, whether employees are working in the office or remotely. Spark offers visibility covering people, devices, networks, apps, and automation and provides organizations with a zero-trust architecture and a zero-touch approach. <\/p>\n<p>Eagan is particularly proud of making the authentication processes easy for the user. &#8220;You shouldn&#8217;t need to be a Ph.D. in cybersecurity to be able to do your job well,&#8221; he says.<\/p>\n<p>The company&#8217;s experience in embedded systems and endpoint security can be a great starting point. Still, analysts argue that QNX and Spark might not be enough to create a bright future for BlackBerry. &#8220;They start to fall behind in scenarios where there are broader requirements for security overall, such as extended detection and response [XDR], cloud security,&#8221; Montenegro says.<\/p>\n<p>To keep pace with the competition, analysts say BlackBerry needs to strengthen its products through strategic acquisitions, such as that of Cylance a few years ago, that boosted its machine learning competencies.<\/p>\n<p>&#8220;Mergers allow a company to gain technical competencies in new areas without waiting for R&amp;D to provide them,&#8221; Enderle says. &#8220;It exchanges cash for time to market, and both security and automotive technology are moving too quickly to play catch-up with R&amp;D, so acquisitions become the more robust path and a better way to react to the market given BlackBerry is too small to drive the market in the way far larger firms can.&#8221;<\/p>\n<p><strong>Past vs. Future<\/strong><br \/>To succeed as a cybersecurity company, BlackBerry needs to learn from past mistakes, turning into a dynamic brand that&#8217;s quick to adapt to customers&#8217; needs. Eagan says that the experience of building the secure messaging platform BBM is a solid foundation to build on and that the company has many highly skilled employees.<\/p>\n<p>&#8220;There are people who have spent their whole careers in BlackBerry on how you boot a device securely,&#8221; he says. &#8220;The lessons on securing phones apply to securing cars, servers, cloud workload, network traffic. You learn a lot of subtle technologies and approaches that apply well.&#8221;<\/p>\n<p>But while looking at the past could provide valuable insights, BlackBerry needs to do much more than relive its glory days. &#8220;Given the massive strategic shifts that the market overall has taken, as well as changes to company strategy, I don&#8217;t see anchoring expectations to the past as being realistic,&#8221; Montenegro says. &#8220;The company has to look into what its current blockers are \u2013 Does it need to expand go-to-market? Is it a matter of product fit? Is it time for a broader expansion into an adjacency? \u2013 and go from there.<\/p>\n<p>If BlackBerry plays its cards well, it can shift its narrative. Ultimately, building cybersecurity products might prove more efficient than selling devices. &#8220;Software has a far higher potential of driving profit and revenue than hardware because you essentially eliminate the manufacturing problem tied to the hardware,&#8221; Enderle says. &#8220;Generally, software companies can outstrip hardware companies because of their ability to scale more quickly.&#8221;<\/p>\n<p>Read More <a href=\"https:\/\/www.darkreading.com\/edge\/blackberry-seeks-to-restore-its-past-glory-with-services-push\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Selling security software might prove easier than selling phones, but can BlackBerry outsmart its competition?Read More <a href=\"https:\/\/www.darkreading.com\/edge\/blackberry-seeks-to-restore-its-past-glory-with-services-push\">HERE<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[151],"tags":[],"class_list":["post-45249","post","type-post","status-publish","format-standard","hentry","category-darkreading-ti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>BlackBerry Seeks to Restore Its Past Glory With Services Push 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/blackberry-seeks-to-restore-its-past-glory-with-services-push\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"BlackBerry Seeks to Restore Its Past Glory With Services Push 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/blackberry-seeks-to-restore-its-past-glory-with-services-push\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-02-11T15:25:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt54029d32a801d3bc\/60e3a2bbed354a206ee29dd5\/cybersecurity-shutterstock_434921974.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/blackberry-seeks-to-restore-its-past-glory-with-services-push\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/blackberry-seeks-to-restore-its-past-glory-with-services-push\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"BlackBerry Seeks to Restore Its Past Glory With Services Push\",\"datePublished\":\"2022-02-11T15:25:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/blackberry-seeks-to-restore-its-past-glory-with-services-push\\\/\"},\"wordCount\":902,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/blackberry-seeks-to-restore-its-past-glory-with-services-push\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt54029d32a801d3bc\\\/60e3a2bbed354a206ee29dd5\\\/cybersecurity-shutterstock_434921974.jpg\",\"articleSection\":[\"DarkReading |TI\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/blackberry-seeks-to-restore-its-past-glory-with-services-push\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/blackberry-seeks-to-restore-its-past-glory-with-services-push\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/blackberry-seeks-to-restore-its-past-glory-with-services-push\\\/\",\"name\":\"BlackBerry Seeks to Restore Its Past Glory With Services Push 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/blackberry-seeks-to-restore-its-past-glory-with-services-push\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/blackberry-seeks-to-restore-its-past-glory-with-services-push\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt54029d32a801d3bc\\\/60e3a2bbed354a206ee29dd5\\\/cybersecurity-shutterstock_434921974.jpg\",\"datePublished\":\"2022-02-11T15:25:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/blackberry-seeks-to-restore-its-past-glory-with-services-push\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/blackberry-seeks-to-restore-its-past-glory-with-services-push\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/blackberry-seeks-to-restore-its-past-glory-with-services-push\\\/#primaryimage\",\"url\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt54029d32a801d3bc\\\/60e3a2bbed354a206ee29dd5\\\/cybersecurity-shutterstock_434921974.jpg\",\"contentUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt54029d32a801d3bc\\\/60e3a2bbed354a206ee29dd5\\\/cybersecurity-shutterstock_434921974.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/blackberry-seeks-to-restore-its-past-glory-with-services-push\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"BlackBerry Seeks to Restore Its Past Glory With Services Push\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"BlackBerry Seeks to Restore Its Past Glory With Services Push 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/blackberry-seeks-to-restore-its-past-glory-with-services-push\/","og_locale":"en_US","og_type":"article","og_title":"BlackBerry Seeks to Restore Its Past Glory With Services Push 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/blackberry-seeks-to-restore-its-past-glory-with-services-push\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-02-11T15:25:00+00:00","og_image":[{"url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt54029d32a801d3bc\/60e3a2bbed354a206ee29dd5\/cybersecurity-shutterstock_434921974.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/blackberry-seeks-to-restore-its-past-glory-with-services-push\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/blackberry-seeks-to-restore-its-past-glory-with-services-push\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"BlackBerry Seeks to Restore Its Past Glory With Services Push","datePublished":"2022-02-11T15:25:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/blackberry-seeks-to-restore-its-past-glory-with-services-push\/"},"wordCount":902,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/blackberry-seeks-to-restore-its-past-glory-with-services-push\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt54029d32a801d3bc\/60e3a2bbed354a206ee29dd5\/cybersecurity-shutterstock_434921974.jpg","articleSection":["DarkReading |TI"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/blackberry-seeks-to-restore-its-past-glory-with-services-push\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/blackberry-seeks-to-restore-its-past-glory-with-services-push\/","url":"https:\/\/www.threatshub.org\/blog\/blackberry-seeks-to-restore-its-past-glory-with-services-push\/","name":"BlackBerry Seeks to Restore Its Past Glory With Services Push 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/blackberry-seeks-to-restore-its-past-glory-with-services-push\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/blackberry-seeks-to-restore-its-past-glory-with-services-push\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt54029d32a801d3bc\/60e3a2bbed354a206ee29dd5\/cybersecurity-shutterstock_434921974.jpg","datePublished":"2022-02-11T15:25:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/blackberry-seeks-to-restore-its-past-glory-with-services-push\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/blackberry-seeks-to-restore-its-past-glory-with-services-push\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/blackberry-seeks-to-restore-its-past-glory-with-services-push\/#primaryimage","url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt54029d32a801d3bc\/60e3a2bbed354a206ee29dd5\/cybersecurity-shutterstock_434921974.jpg","contentUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt54029d32a801d3bc\/60e3a2bbed354a206ee29dd5\/cybersecurity-shutterstock_434921974.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/blackberry-seeks-to-restore-its-past-glory-with-services-push\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"BlackBerry Seeks to Restore Its Past Glory With Services Push"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/45249","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=45249"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/45249\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=45249"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=45249"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=45249"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}