Provide a summary of the current security weaknesses outlined in the attached Independent Security Report
A. Provide a summary of the current security weaknesses outlined in the attached Independent Security Report. B. Create mitigation plans...