Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register
Home » How Critical Infrastructure Highlights the Link Between Sustainability and Cybersecurity 
Cybersecurity

How Critical Infrastructure Highlights the Link Between Sustainability and Cybersecurity 

Chris HughesBy Chris HughesFebruary 4, 2023Updated:February 6, 20234 Mins Read
Facebook Twitter LinkedIn Email
cybersecurity sustainability
Share
Facebook Twitter LinkedIn Email
Acceleration Economy Cybersecurity

It may not be apparent at first glance, but cybersecurity and sustainability are inextricably linked. Today, sustainability goals — the shift to renewable energy sources, more efficient energy usage, and integration of connected sensors to maximize resource productivity — are pursued against the backdrop of increased malicious activity from threat actors targeting critical infrastructure including oil, gas, and electrical grids. 

In this analysis, we will explore this intersection of cybersecurity and sustainability with a spotlight on ransomware, the Internet of Things (IoT), and open-source software (OSS).

Ransomware and the Colonial Pipeline

One notable example of the cybersecurity and sustainability intersection is the Colonial Pipeline ransomware incident that sent many panicking due to its potential impact on oil prices. The incident served as a wake-up call to just how brittle our current ecosystem is when it comes to existing energy providers’ vulnerabilities and their supporting infrastructure.

The Colonial Pipeline incident saw malicious actors steal 100 gigabytes of data within a couple of hours and then go on to infect the organization’s information technology (IT) network as well, causing Colonial to shut down its systems to prevent further spread, which would have had a negative impact on the sustainability of the pipeline and its associated infrastructure. In this case, the malicious actors demanded and received more than $4 million in ransom, although the Department of Justice (DoJ) was able to recover more than $2 million in the end.

IoT Expands Attack Surface

We’re also seeing a rise in IoT and connected devices such as AI-enabled sensors and computer vision-powered cameras. These devices bring digital connectivity to traditional industrial infrastructure, which traditionally hasn’t been considered part of the broader digital environment. While increased connectivity brings benefits and capabilities that weren’t possible previously — including monitoring energy use, analyzing air quality, optimizing farming — it also brings an increased attack surface.

See the Cybersecurity Top 10 shortlist

Many IoT devices lack even basic cybersecurity functionality, such as encryption and robust passwords. As we connect more devices, we open new pathways for malicious actors to compromise connected systems or leverage IoT devices for attacks themselves, such as in the case of Distributed Denial of Service (DDoS) attacks, which can impact the efficiency of systems by deggrading them or, in some cases, taking them offline entirely.

With IoT devices projected to grow into the tens of billions in the coming years, sustainability needs to be a key consideration for this increasingly ubiquitous technology.

Open-Source and Software Supply Chains

Another key challenge is the widespread growth and use of open-source software, even among critical infrastructure sectors. OSS usage contributes to sustainability by maximizing the use of existing software and code and eliminating inefficiencies. It also introduces standardization across the ecosystem and leads to a robust community of contributors and maintainers.

Research shows that OSS usage is pervasive across critical infrastructure (oil, gas, electrical grids) and that most OSS components contain at least one or more critical or high vulnerabilities. This rapid growth of OSS usage has left the industry struggling to figure out how to secure the software supply chain, with guidance coming from sources such as NIST, OpenSSF, the National Security Agency (NSA), and others as it relates to secure OSS usage.

Which companies are the most important vendors in cybersecurity? Click here to see the Acceleration Economy Top 10 Cybersecurity Shortlist, as selected by our expert team of practitioner analysts.

Final Thoughts

Malicious actors have realized how potentially profitable it can be to target critical infrastructure, through methods such as ransomware, as well as how vulnerable and antiquated many legacy infrastructure systems are. They will be looking for the same or similar flaws in emerging critical infrastructure such as energy and industrial systems.

Emphasizing security’s role in these modern systems as they are developed can usher in an era of more stable and resilient critical infrastructure. That will require more work upfront to ensure that is the case. It also involves ensuring that key security requirements and best practices are considered throughout the development lifecycle of modern renewable and sustainable energy sources. Failing to do so will inevitably lead to us repeating the mistakes of the past rather than building on painful lessons learned.


Want more cybersecurity insights? Visit the Cybersecurity channel:

Acceleration Economy Cybersecurity

infrastructure Internet of Things IoT Open-Source Software Ransomware software Sustainability sustainability-archive
Share. Facebook Twitter LinkedIn Email
Analystuser

Chris Hughes

CEO and Co-Founder
Aquia

Areas of Expertise
  • Cloud
  • Cybersecurity
  • LinkedIn

Chris Hughes is a Cloud Wars Analyst focusing on the critical intersection of cloud technology and cybersecurity. As co-founder and CEO of Aquia, Chris draws on nearly 20 years of IT and cybersecurity experience across both public and private sectors, including service with the U.S. Air Force and leadership roles within FedRAMP. In addition to his work in the field, Chris is an adjunct professor in cybersecurity and actively contributes to industry groups like the Cloud Security Alliance. His expertise and certifications in cloud security for AWS and Azure help organizations navigate secure cloud migrations and transformations.

  Contact Chris Hughes ...

Related Posts

IBM Research Sheds New Light on AI Agents’ Impact Across Org Structures, Business Functions

May 22, 2025

SAP Says Reports of Applications’ Death Are Greatly Exaggerated!

May 22, 2025

How SAP Is Redefining Enterprise AI with Unified Data and Strategic Partnerships | Tinder on Customers

May 22, 2025

Cprime’s Strategy for AI-Native Transformation: Operating Models, Agents, and ServiceNow

May 22, 2025
Add A Comment

Comments are closed.

Recent Posts
  • IBM Research Sheds New Light on AI Agents’ Impact Across Org Structures, Business Functions
  • SAP Says Reports of Applications’ Death Are Greatly Exaggerated!
  • How SAP Is Redefining Enterprise AI with Unified Data and Strategic Partnerships | Tinder on Customers
  • Cprime’s Strategy for AI-Native Transformation: Operating Models, Agents, and ServiceNow
  • SAP: Agents Will Enhance Apps, Not Turn to CRUD

  • Ask Cloud Wars AI Agent
  • Tech Guidebooks
  • Industry Reports
  • Newsletters

Join Today

Most Popular Guidebooks

Accelerating GenAI Impact: From POC to Production Success

November 1, 2024

ExFlow from SignUp Software: Streamlining Dynamics 365 Finance & Operations and Business Central with AP Automation

September 10, 2024

Delivering on the Promise of Multicloud | How to Realize Multicloud’s Full Potential While Addressing Challenges

July 19, 2024

Zero Trust Network Access | A CISO Guidebook

February 1, 2024

Advertisement
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.