Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register
Home » How Cybersecurity Standards Protect the Innovative Tech That’s Driving Sustainability
Cybersecurity

How Cybersecurity Standards Protect the Innovative Tech That’s Driving Sustainability

Chris HughesBy Chris HughesMarch 30, 20233 Mins Read
Facebook Twitter LinkedIn Email
sustainability cybersecurity
Share
Facebook Twitter LinkedIn Email
Acceleration Economy Cybersecurity

We continue to see a push for sustainability in the technology sector. It’s receiving greater attention due to political and social discourse on climate change and the growth of massive cloud computing facilities and their environmental footprint.

Innovative technologies including digital sensors, Internet of Things (IoT) devices, and others support the push for sustainability but they need to be safeguarded — along with the data they process, store, and utilize — in ways that don’t apply to the legacy technologies they are replacing.

Perils of Integrating Sustainable Technologies

As these “smart” devices get integrated into our operational technology (OT) footprint and critical infrastructure, they increase the attack surface that malicious actors can target. Massive growth in IoT and connected devices creates a need for modernized data security standards that takes these innovative technologies, and their expanding usage, into consideration

Additionally, sustainable technologies, much like the broader IT and OT ecosystem, rely heavily on open-source software (OSS), which requires its own unique cybersecurity safeguards. This includes understanding your OSS component inventory, the provenance of those OSS components, and being prepared to “virtually patch” components if project maintainers don’t respond to vulnerabilities in the timelines you require.

Which companies are the most important vendors in cybersecurity? Check out
the Acceleration Economy Cybersecurity
Top 10 Shortlist
.

Attacks and the Need for Modernized Data Standards

Sustainable technologies play a key role in critical infrastructure and citizen services upon which our society relies. We know that critical infrastructure is regularly under attack, not just from run-of-the-mill malicious actors, but also national state-sponsored attackers, as we saw in the case of the Colonial Pipeline ransomware attack.

That attack impacted millions of Americans and cost a significant amount to both the organization and citizens due to panic buying and other responses to the pipeline’s shutdown. It also sparked a response from the Transportation Security Agency, which issued new guidance and requirements to pipeline operators.

This is where secure data standards for sustainable technology and efforts come into play. Organizations should be deliberate in their efforts to examine their sustainability efforts, the technologies involved and, most importantly, the data involved.

From there, they can create secure data standards that leverage existing frameworks such as the National Institute of Standards and Technologies (NIST) Cybersecurity Framework (CSF), which is currently undergoing its largest-ever update. As an indicator of the breadth of this work, NIST has even gone as far as producing a “Manufacturing Profile,” which is tailored for managing risk associated with manufacturers.

Insights into the Why & How to Secure SaaS Applications_featured
Guidebook: Secure SaaS Applications

Continue the Conversation

NIST isn’t the only organization discussing cybersecurity and its relationship to sustainability and associated technologies. The World Economic Forum (WEF) states that cybersecurity should also be a part of environmental, social, and governance (ESG) efforts, saying that cyber threats pose risks to corporate value and to society, and that insurance cannot mitigate risk indefinitely.

Leaders from some of the world’s largest technology organizations, such as Julie Sweet, CEO of Accenture, are echoing this sentiment, noting that sustainability is driving business objectives and that corporate leadership must also consider cybersecurity in its conversations around sustainability.

Final Thoughts

While organizations are integrating sustainability considerations and goals into their key business objectives and strategies, they are faced with cyber threats that continue to evolve and a threat landscape that remains dynamic. This requires a comprehensive approach that considers cybersecurity as part of broader sustainability goals tied to business objectives. If we neglect to incorporate cybersecurity into emerging sustainability initiatives, we risk ending up with an approach that is “bolted-on” rather than “built-in.”


Want more cybersecurity insights? Visit the Cybersecurity channel:

Acceleration Economy Cybersecurity

Cloud Compliance featured governance Internet of Things IoT Open-Source Software Sustainability sustainability-archive vulnerability
Share. Facebook Twitter LinkedIn Email
Analystuser

Chris Hughes

CEO and Co-Founder
Aquia

Areas of Expertise
  • Cloud
  • Cybersecurity
  • LinkedIn

Chris Hughes is a Cloud Wars Analyst focusing on the critical intersection of cloud technology and cybersecurity. As co-founder and CEO of Aquia, Chris draws on nearly 20 years of IT and cybersecurity experience across both public and private sectors, including service with the U.S. Air Force and leadership roles within FedRAMP. In addition to his work in the field, Chris is an adjunct professor in cybersecurity and actively contributes to industry groups like the Cloud Security Alliance. His expertise and certifications in cloud security for AWS and Azure help organizations navigate secure cloud migrations and transformations.

  Contact Chris Hughes ...

Related Posts

Microsoft MCP Server Gives Broad AI Access to Corporate Assets Stored in Dataverse

July 18, 2025

Oracle’s $30B Cloud Deal Marks Historic Growth Shift

July 18, 2025

Google Cloud U.K. Moonshots Aim to Save $50 Billion and Engineer Time 

July 17, 2025

Google Cloud: U.K. Customers Showcase Power of AI and Cloud

July 17, 2025
Add A Comment

Comments are closed.

Recent Posts
  • Microsoft MCP Server Gives Broad AI Access to Corporate Assets Stored in Dataverse
  • Oracle’s $30B Cloud Deal Marks Historic Growth Shift
  • Google Cloud U.K. Moonshots Aim to Save $50 Billion and Engineer Time 
  • Google Cloud: U.K. Customers Showcase Power of AI and Cloud
  • SAP Partners with JA Worldwide to Equip 85,000+ Youth for Future Careers

  • Ask Cloud Wars AI Agent
  • Tech Guidebooks
  • Industry Reports
  • Newsletters

Join Today

Most Popular Guidebooks and Reports

SAP Business Network: A B2B Trading Partner Platform for Resilient Supply Chains

July 10, 2025

Using Agents and Copilots In M365 Modern Work

March 11, 2025

AI Data Readiness and Modernization: Tech and Organizational Strategies to Optimize Data For AI Use Cases

February 21, 2025

Special Report: Cloud Wars 2025 CEO Outlook

February 12, 2025

Advertisement
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.
body::-webkit-scrollbar { width: 7px; } body::-webkit-scrollbar-track { border-radius: 10px; background: #f0f0f0; } body::-webkit-scrollbar-thumb { border-radius: 50px; background: #dfdbdb }