> Unfortunately, what seemed like a done deal turned out to be quite the unprofessional ride. Any organization knows that fixing breach-worthy vulnerabilities is extremely time sensitive. Once threat actors catch wind of major vulnerabilities against an organization they begin poking on their own, looking for more vectors of attack.
Do you expect them to tell everybody exactly which systems are vulnerable? What is it you're suggesting they do?
Do you expect them to tell everybody exactly which systems are vulnerable? What is it you're suggesting they do?