|
|
: This is the first of hopefully several drafts and we are looking at the : comments to see in which ways we need to modify in order to satisfy the : needs for vulnerability management. I am curious what perceived 'gap' in vulnerability management this is designed to fill. Can you elaborate on the origins of this initiative? Brian