A critical vulnerability is found on a server hosting multiple applications owned by different business units. One of the business units finds its hosted application will not function with the patch applied and chooses to accept the risk. Which of the following should be the information security manager s NEXT course of action?
Broesweelies
Highly Voted 1 year, 7 months ago[Removed]
Highly Voted 1 year agoSilverFox
10 months, 1 week agoManix
7 months, 1 week agoHN2025
Most Recent 1 month agoJosef4CISM
1 month, 3 weeks agorealmjmj
2 months, 2 weeks agod7a2ba6
2 months, 2 weeks agoyottabyte
5 months, 1 week agoPOWNED
8 months agoSoleandheel
9 months, 1 week agoAgamennore
1 year agoHugo1717
1 year agorichck102
1 year, 2 months agowello
1 year, 2 months agodark_3k03r
1 year, 4 months agoccKane
1 year, 6 months agoCarlLimps
1 year, 5 months agoMyKasala
1 year, 7 months agoaokisan
1 year, 8 months ago