A critical vulnerability is found on a server hosting multiple applications owned by different business units. One of the business units finds its hosted application will not function with the patch applied and chooses to accept the risk. Which of the following should be the information security manager s NEXT course of action?
[Removed]
Highly Voted 1 year, 3 months agoSilverFox
1 year agoManix
9 months, 3 weeks agoBroesweelies
Highly Voted 1 year, 9 months agoSHERLOCKAWS
Most Recent 1 month, 2 weeks agoHN2025
3 months, 2 weeks agoJosef4CISM
4 months, 1 week agorealmjmj
5 months agod7a2ba6
5 months agoyottabyte
7 months, 4 weeks agoPOWNED
10 months, 2 weeks agoSoleandheel
11 months, 4 weeks agoAgamennore
1 year, 2 months agoHugo1717
1 year, 2 months agorichck102
1 year, 4 months agowello
1 year, 5 months agodark_3k03r
1 year, 7 months agoccKane
1 year, 9 months agoCarlLimps
1 year, 8 months agoMyKasala
1 year, 10 months agoaokisan
1 year, 11 months ago