Despite the best efforts of software developers, we continue to discover mistakes in IT products. Often these mistakes are security vulnerabilities that, unfortunately, attackers can exploit to steal information or to disrupt operations. What should we do when these mistakes are found?

Ideally, we could keep these mistakes secret until they are corrected and all the users have installed the […]