Colonial Pipeline Attack: Getting to the Root Cause
A recent article provides an excellent analysis of the Colonial Pipeline ransomware attack. Underlying the analysis is that, absent the use of public-key infrastructure (PKI), none of these attacks would have happened. More worrisome is that virtually every recently breached entity (and virtually every enterprise [...]