{"id":13238,"date":"2018-09-20T02:48:11","date_gmt":"2018-09-20T02:48:11","guid":{"rendered":"http:\/\/9c3e6805-4372-46e7-952f-4bcb9f85220e"},"modified":"2018-09-20T02:48:11","modified_gmt":"2018-09-20T02:48:11","slug":"clean-energy-regulator-signs-up-for-fujitsus-protected-cloud","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/clean-energy-regulator-signs-up-for-fujitsus-protected-cloud\/","title":{"rendered":"Clean Energy Regulator signs up for Fujitsu&#8217;s protected cloud"},"content":{"rendered":"<p>The Australian Clean Energy Regulator (CER) has announced moving workloads to the cloud, using ServiceNow&#8217;s software as a service (SaaS) offering managed by Fujitsu.<\/p>\n<div class=\"relatedContent alignRight\" readability=\"9.639175257732\">\n<h3 class=\"heading\"><span class=\"int\">Special Feature<\/span><\/h3>\n<div class=\"thumb\"><a href=\"http:\/\/www.zdnet.com\/topic-cloud-how-to-do-saas-right\/\" data-omniture-track=\"moduleClick\" data-omniture-track-data=\"{&quot;moduleInfo&quot;: &quot;pinbox&quot;, &quot;pageType&quot;: &quot;article&quot;}\"><span class=\"img\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/zdnet3.cbsistatic.com\/hub\/i\/r\/2016\/08\/04\/77b4b4f9-d548-4578-8996-deb96afdba89\/resize\/220x165\/f1fe88bcdd01dbee712aa091e1cc1252\/saas-intro-2016.jpg\" class=\"\" alt=\"Cloud: How to Do SaaS Right\" height=\"165\" width=\"220\"\/><\/span><\/a><\/div>\n<p class=\"title\"><a href=\"http:\/\/www.zdnet.com\/topic-cloud-how-to-do-saas-right\/\" data-omniture-track=\"moduleClick\" data-omniture-track-data=\"{&quot;moduleInfo&quot;: &quot;pinbox&quot;, &quot;pageType&quot;: &quot;article&quot;}\">Cloud: How to Do SaaS Right<\/a><\/p>\n<p class=\"dek\">Software as a Service offers irresistible benefits for organizations of all sizes \u2014 from cost savings to scalability to mobile accessibility. We offer guidance on avoiding the pitfalls of the cloud and choosing your SaaS partners well.<\/p>\n<p class=\"read-more\"><a href=\"http:\/\/www.zdnet.com\/topic-cloud-how-to-do-saas-right\/\" data-omniture-track=\"moduleClick\" data-omniture-track-data=\"{&quot;moduleInfo&quot;: &quot;pinbox&quot;, &quot;pageType&quot;: &quot;article&quot;}\">Read More<\/a><\/p>\n<\/div>\n<p>The CER is an Australian independent statutory authority that operates as a part of the Department of the Environment and Energy. It is responsible for administering legislation to reduce carbon emissions and increase the use of clean energy.<\/p>\n<p>Fujitsu&#8217;s industry cloud for government is built on the Vault Protected Cloud and under the CER arrangement, the platform will be fully-managed by Fujitsu.<\/p>\n<p>&#8220;Implementing ServiceNow IT Service Management will give us better visibility into the performance of CER&#8217;s IT services,&#8221; CER CIO Steven Stolk said on Thursday.<\/p>\n<p>&#8220;The Fujitsu Protected Cloud environment provides the flexibility to take advantage of commercially-available platforms such as ServiceNow with the confidence that the specific security needs for government are met.&#8221;<\/p>\n<p>The arrangement between the CER and Fujitsu is in addition to its existing managed services contract with Fujitsu.<\/p>\n<p>Fujitsu announced <a href=\"https:\/\/www.zdnet.com\/article\/fujitsu-teams-up-with-vault-systems-to-go-after-government-cloud\/\">partnering with secure cloud provider Vault<\/a> to pitch cloud services at Australian government agencies in June.<\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_ZD_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\">\n<\/section>\n<p>Built upon Vault&#8217;s <a href=\"https:\/\/www.zdnet.com\/article\/asd-hands-out-government-protected-cloud-certification-to-two-local-players\/\">protected-level ASD certified<\/a> infrastructure, Fujitsu is able to offer software-, infrastructure-, backup-, and desktop-as-a-service to government users.<\/p>\n<p>&#8220;Fujitsu will fully manage the platform in accordance with the relevant controls, software-as-a-service capability, service desk, and support for government customers,&#8221; the company said previously.<\/p>\n<p>The Australian Signals Directorate (ASD) and the Australian Cyber Security Centre (ACSC) is responsible for handing out certification to cloud providers that allows them to store classified data of government organisations.<\/p>\n<p>Currently, there are 18 secure clouds, from 11 vendors, on the ASD&#8217;s Certified Cloud Services List (CCSL).<\/p>\n<p>The CCSL is comprised of clouds certified at unclassified dissemination limiting marker (DLM) level, and also protected level, which is currently the highest security level approved by the ASD.<\/p>\n<p>Gaining protected status at the same time as Vault was <a href=\"https:\/\/www.zdnet.com\/article\/asd-hands-out-government-protected-cloud-certification-to-two-local-players\/\">fellow local player Sliced Tech<\/a>, which was <a href=\"https:\/\/www.zdnet.com\/article\/macquarie-government-claims-protected-level-cloud-accreditation-from-asd\/\">shortly followed by Macquarie Government<\/a>, part of the Macquarie Telecom Group.<\/p>\n<p>NTT-owned Dimension Data was then <a href=\"https:\/\/www.zdnet.com\/article\/asd-gives-dimension-data-protected-level-cloud-certification\/\">accredited to provide protected-level<\/a> cloud services to Australian government entities, despite being an international company and one with datacentres outside of the country.<\/p>\n<p>Microsoft was the fifth and final vendor to appear on the CCSL in a protected capacity, <a href=\"https:\/\/www.zdnet.com\/article\/canberra-gives-microsoft-protected-level-cloud-classification\/\">receiving accreditation in April<\/a> for its &#8220;government-configured&#8221; clouds to be used for Australian government data classified up to that level. But unlike all previous such certifications, Microsoft&#8217;s certifications were provisional, and came with what the ASD called &#8220;consumer guides&#8221;.<\/p>\n<p>The Digital Transformation Agency (DTA) was announced last month as the first department to <a href=\"https:\/\/www.zdnet.com\/article\/dta-shifts-to-microsofts-protected-cloud\/\">take up Microsoft&#8217;s secure cloud<\/a>.<\/p>\n<h3>RELATED COVERAGE<\/h3>\n<p><strong><a href=\"https:\/\/www.zdnet.com\/article\/fujitsu-teams-up-with-vault-systems-to-go-after-government-cloud\/\">Fujitsu teams up with Vault Systems to go after government cloud<\/a><\/strong><\/p>\n<p>The Protected Cloud product will offer software-, infrastructure-, backup-, and desktop-as-a-service to government users.<\/p>\n<p><strong><a href=\"https:\/\/www.zdnet.com\/article\/dta-shifts-to-microsofts-protected-cloud\/\">DTA shifts to Microsoft&#8217;s protected cloud<\/a><\/strong><\/p>\n<p>DTA is the first government entity to move to Microsoft&#8217;s secure cloud environment after it received accreditation in April.<\/p>\n<p><strong><a href=\"https:\/\/www.zdnet.com\/article\/commonwealth-pushes-public-cloud-by-default\/\">Commonwealth pushes public cloud by default<\/a><\/strong><\/p>\n<p>Spruiking a public cloud-first approach, the Australian government has lifted the lid off its new Secure Cloud Strategy.<\/p>\n<p><strong><a href=\"https:\/\/www.zdnet.com\/article\/seven-cloud-vendors-lining-up-for-government-security-clearance\/\">Seven cloud vendors lining up for government security clearance<\/a><\/strong><\/p>\n<p>After Microsoft&#8217;s contentious addition to the Certified Cloud Services List, the Australian Signals Directorate has revealed it is working with another seven companies interested in providing cloud services to government.<\/p>\n<p><strong><a href=\"https:\/\/www.techrepublic.com\/article\/why-people-are-the-biggest-barrier-to-public-cloud-success\/\" target=\"_blank\" rel=\"noopener noreferrer\">Why people are the biggest barrier to public cloud success<\/a><\/strong> (TechRepublic)<\/p>\n<p>Tech is the biggest blocker to autonomous cars, but there&#8217;s a very different blocker to public cloud adoption that&#8217;s driving hybrid infrastructure.<\/p>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/clean-energy-regulator-signs-up-for-fujitsus-protected-cloud\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Australian regulator becomes the third federal government agency to sign up to the SaaS solution hosted on the Vault Protected Cloud.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":13239,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-13238","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Clean Energy Regulator signs up for Fujitsu&#039;s protected cloud 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/clean-energy-regulator-signs-up-for-fujitsus-protected-cloud\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Clean Energy Regulator signs up for Fujitsu&#039;s protected cloud 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/clean-energy-regulator-signs-up-for-fujitsus-protected-cloud\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-09-20T02:48:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/09\/clean-energy-regulator-signs-up-for-fujitsus-protected-cloud.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"220\" \/>\n\t<meta property=\"og:image:height\" content=\"164\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/clean-energy-regulator-signs-up-for-fujitsus-protected-cloud\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/clean-energy-regulator-signs-up-for-fujitsus-protected-cloud\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Clean Energy Regulator signs up for Fujitsu&#8217;s protected cloud\",\"datePublished\":\"2018-09-20T02:48:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/clean-energy-regulator-signs-up-for-fujitsus-protected-cloud\\\/\"},\"wordCount\":644,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/clean-energy-regulator-signs-up-for-fujitsus-protected-cloud\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/09\\\/clean-energy-regulator-signs-up-for-fujitsus-protected-cloud.jpg\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/clean-energy-regulator-signs-up-for-fujitsus-protected-cloud\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/clean-energy-regulator-signs-up-for-fujitsus-protected-cloud\\\/\",\"name\":\"Clean Energy Regulator signs up for Fujitsu's protected cloud 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/clean-energy-regulator-signs-up-for-fujitsus-protected-cloud\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/clean-energy-regulator-signs-up-for-fujitsus-protected-cloud\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/09\\\/clean-energy-regulator-signs-up-for-fujitsus-protected-cloud.jpg\",\"datePublished\":\"2018-09-20T02:48:11+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/clean-energy-regulator-signs-up-for-fujitsus-protected-cloud\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/clean-energy-regulator-signs-up-for-fujitsus-protected-cloud\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/clean-energy-regulator-signs-up-for-fujitsus-protected-cloud\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/09\\\/clean-energy-regulator-signs-up-for-fujitsus-protected-cloud.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/09\\\/clean-energy-regulator-signs-up-for-fujitsus-protected-cloud.jpg\",\"width\":220,\"height\":164},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/clean-energy-regulator-signs-up-for-fujitsus-protected-cloud\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Clean Energy Regulator signs up for Fujitsu&#8217;s protected cloud\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Clean Energy Regulator signs up for Fujitsu's protected cloud 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/clean-energy-regulator-signs-up-for-fujitsus-protected-cloud\/","og_locale":"en_US","og_type":"article","og_title":"Clean Energy Regulator signs up for Fujitsu's protected cloud 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/clean-energy-regulator-signs-up-for-fujitsus-protected-cloud\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-09-20T02:48:11+00:00","og_image":[{"width":220,"height":164,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/09\/clean-energy-regulator-signs-up-for-fujitsus-protected-cloud.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/clean-energy-regulator-signs-up-for-fujitsus-protected-cloud\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/clean-energy-regulator-signs-up-for-fujitsus-protected-cloud\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Clean Energy Regulator signs up for Fujitsu&#8217;s protected cloud","datePublished":"2018-09-20T02:48:11+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/clean-energy-regulator-signs-up-for-fujitsus-protected-cloud\/"},"wordCount":644,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/clean-energy-regulator-signs-up-for-fujitsus-protected-cloud\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/09\/clean-energy-regulator-signs-up-for-fujitsus-protected-cloud.jpg","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/clean-energy-regulator-signs-up-for-fujitsus-protected-cloud\/","url":"https:\/\/www.threatshub.org\/blog\/clean-energy-regulator-signs-up-for-fujitsus-protected-cloud\/","name":"Clean Energy Regulator signs up for Fujitsu's protected cloud 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/clean-energy-regulator-signs-up-for-fujitsus-protected-cloud\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/clean-energy-regulator-signs-up-for-fujitsus-protected-cloud\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/09\/clean-energy-regulator-signs-up-for-fujitsus-protected-cloud.jpg","datePublished":"2018-09-20T02:48:11+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/clean-energy-regulator-signs-up-for-fujitsus-protected-cloud\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/clean-energy-regulator-signs-up-for-fujitsus-protected-cloud\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/clean-energy-regulator-signs-up-for-fujitsus-protected-cloud\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/09\/clean-energy-regulator-signs-up-for-fujitsus-protected-cloud.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/09\/clean-energy-regulator-signs-up-for-fujitsus-protected-cloud.jpg","width":220,"height":164},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/clean-energy-regulator-signs-up-for-fujitsus-protected-cloud\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Clean Energy Regulator signs up for Fujitsu&#8217;s protected cloud"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/13238","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=13238"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/13238\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/13239"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=13238"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=13238"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=13238"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}