Background: Critical Sector organisations uses a number of IT and OT equipment (e.g. Networking and hardware device, Operating Systems, Applications, Firmware etc.). These devices/application come with vulnerabilities from time to time.
There should be timely information sharing mechanism by which the concerned equipment users at critical sector ...
|