An information security manager reads a media report of a new type of malware attack. Who should be notified FIRST?
A. Application owners
B. Communications department
C. Data owners
D. Security operations team
A. Application owners
B. Communications department
C. Data owners
D. Security operations team