1 year later: How the Colonial Pipeline attack has changed cybersecurity

Reference