A critical vulnerability is found on a server hosting multiple applications owned by different business units. One of the business units finds its hosted application will not function with the patch applied and chooses to accept the risk. Which of the following should be the information security manager s NEXT course of action?
[Removed]
Highly Voted 1 year, 5 months agoSilverFox
1 year, 2 months agoManix
11 months, 3 weeks agoBroesweelies
Highly Voted 1 year, 11 months agomih
Most Recent 3 weeks, 4 days agoSHERLOCKAWS
3 months, 2 weeks agoHN2025
5 months, 2 weeks agoJosef4CISM
6 months, 1 week agorealmjmj
7 months agod7a2ba6
7 months agoyottabyte
9 months, 3 weeks agoPOWNED
1 year agoSoleandheel
1 year, 1 month agoAgamennore
1 year, 4 months agoHugo1717
1 year, 4 months agorichck102
1 year, 6 months agowello
1 year, 7 months agodark_3k03r
1 year, 9 months agoccKane
1 year, 11 months agoCarlLimps
1 year, 10 months agoMyKasala
2 years ago