Recommendations Following the Colonial Pipeline Cyber Attack

13.5.21
This blog is intended to share what is known about this event, offer a perspective of what subsystems can be found and what operations occur within pipelines to those unfamiliar, and offer recommendations to asset owners based on similar ransomware.