colonial pipeline

Colonial Pipeline Attack: Getting to the Root Cause

A recent article provides an excellent analysis of the Colonial Pipeline ransomware attack. Underlying the analysis is that, absent the use of public-key infrastructure (PKI), none of these attacks would have happened. More worrisome is that virtually every recently breached entity (and virtually every enterprise [...]

Colonial Pipeline Attack: Getting to the Root Cause2022-04-28T14:15:06+00:00

Colonial Pipeline Hack Highlights PKI Vulnerabilities

The successful cyberattack on the Colonial Pipeline underscores the vulnerability of our critical infrastructure. Most probably, the pipeline was as well protected from cyberattack as it could have been.  Nevertheless, the current state-of-the-art still favors the attacker over the defender.  Even the most conscientious CISO [...]

Colonial Pipeline Hack Highlights PKI Vulnerabilities2022-04-28T14:37:20+00:00
Go to Top