One Article Review

Accueil - L'article:
Source AlienVault.webp AlienVault Lab Blog
Identifiant 8382200
Date de publication 2023-09-13 10:00:00 (vue: 2023-09-13 10:06:41)
Titre Eco-Hacks: l'intersection de la durabilité et des cyber-menaces
Eco-hacks: The intersection of sustainability and cyber threats
Texte The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  Environmental sustainability is more important than ever before for organizations across all sectors. Sustainability concerns including geopolitics, future-focused developments, advanced ESG reporting, and building sustainability into supply chains going forward are all significant trends shaping businesses in 2023 and beyond.  While the shift towards environmental sustainability is a worthy pursuit no matter the industry, the trend towards adopting new technologies that provide more sustainability and eco-friendliness can have some unintended consequences on the realm of cybersecurity.  Today we can see many hybrid endeavors that combine both cutting-edge technology and green, eco-friendly initiatives to create long-term ecologically sustainable solutions for businesses in all fields. But since these collaborations tend to utilize new technology, they may not provide the kind of advanced-level cybersecurity protocols needed to secure these endeavors against cyberattacks, resulting in unintended consequences: an increase in cyber vulnerabilities.  In this article, we will take an in-depth look at the enhanced cybersecurity risks presented by certain sustainability and tech initiatives. Then we will explore best practices intended to keep businesses cyber secure as they transition to new, more environmentally friendly modes of operation and production.  1. The unexpected cybersecurity risks of going green While new green technology rollouts provide highly visible, obvious benefits, contributing to the important global cause of sustainability, the cybersecurity underpinnings that run in the background are easy to ignore but no less significant. There is a subtle interdependence between new green tech and expanded cybersecurity risks. 2. New developments in green technology New developments in green technology are vast and wide-ranging, offering revolutionary potential to cut down on harmful greenhouse gas emissions. By some estimates, Green IT can contribute to reducing greenhouse gas emissions by ten times more than it emits. Green coding focuses on creating more energy efficient modes of engaging computational power that can be applied to everything from virtual reality gaming devices in development to cloud computing.  Sustainable data collection centers aim to reduce carbon and greenhouse gas emissions by finding alternative methods of collecting data that require less energy.  Smart city technology, such as IoT-enabled power grids, smart parking meters, and smart traffic controls, can utilize predictive capabilities to ensure that urban infrastructures are running at optimal energy levels, reducing resource and energy waste and improving city living experiences. Similarly, smart HVAC systems can respond to global climate change issues by managing the internal temperature of buildings using smart regulators that reduce energy waste and carbon emissions, while still heating or cooling buildings.  All of these innovations are building towards a more sustainable future by reducing our need for harmful fossil fuel consumption, managing power usage across the energy grid, and creating more sustainable alternatives to existing technologies for transportation, waste management, entertainment, and more. But each of these new technologies also presents a broader risk level
Envoyé Oui
Condensat 2023 800 able abundant access according across actions activity actors addition additional addresses adjustments adopt adopting advanced against aim all already also alternative alternatives ample anomalous another any applied appropriate are area around article assess assets associated assumes at&t attack attackers attacks attempt attempts authentication author aware background bad base based battery because becoming been before behavior behaviors being benefits best between beyond block board both breach broad broader building buildings businesses but can capabilities carbon cause centers centralized certain chains change changes chaos city citywide clean clear client climate cloud code coding collaborations collaborative collecting collection combination combine combined communicate communication communications companies company complex compliance compliant comprehensive computational computing concerns conducting consequences consequences: consistent consistently consolidated consumption content continue continuously contribute contributing control controls convincing cooling cores could coverage create creating cut cutting cyber cyberattack cyberattacks cybersecurity damages damaging dark data deal decentralized denial deploy deploying depth details detect detection developers developing development developments device devices disabling distributing does down draw each ease easily easy eco ecologically edge effective effects efficient emissions emits employee employees enabled enabling enacted enacting encryption endeavors endorse enercon energy engaging engineering enhanced ensure ensures ensuring entertainment environmental environmentally equal errors esg especially estimates europe’s ever every everything example existing expanded experiences exploitation exploited explore external facing factor factors features field fields final financial finding floating focused focuses follow forward fossil foundations friendliness friendly from fuel future gadgets gaming gaps gas general geopolitics german global going good government greatest green greenhouse grid grids grip hacking hacks: hands hard hardware harmful has have heating help high highly host hubs huge humans hvac hybrid hydro identifying ignore immediate impact impending implementing important improving incident include includes including increase individual industry inextricably infiltrating information infrastructure infrastructures inherent initiatives innovations input ins insight installation intended interconnected interdependence interdependent internal intersection intrinsic introduced iot issues its itself keep keeps key kind knowledge largest latest lead leaked learning less level levels lights like likely lines linked living log long look machine main makes making malware management managing manipulation many matter may meanwhile measures meters method methodologies methods might mitigate mitigating mitigation mode modes monitor monitoring monitors more multi national necessary need needed network networks new norwegian not notice observed obvious off offering often older one operate operating operation operatives opportunities opportunity optimal optimized order organization organizations organizations’ other otherwise out over own parking party patches phishing place plan plans plots poorly positions post potential potentially power powerful practices predictive presented presents prevent preventing prevention proactive proactively production proof protect protected protection protections protective protocols proven provide provided provides providing provisions pursuit radical ranging ransomware reality realm receive recent reduce reducing regarding region regular regulate regulations regulators regulatory rely remain remote reporting require requirements rerouting resilience resilient resource respond response responsibility restricted resulting reuters revealing revolutionary risk risks roll rollouts rules run running russian satellite sectors secure security see seeking sensitive serious service shaping shift should shut shutd
Tags Vulnerability Threat Prediction Cloud
Stories
Notes ★★★
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: