A vulnerability scan has identified a critical flaw in a company's legacy web application. The company is unable to update the application due to dependencies on outdated technologies. What is the BEST action to mitigate the risk posed by this vulnerability?
Raise awareness and provide training about the vulnerability
Isolate the application on its own network segment
Implement a web application firewall (WAF)
Change business requirements to discontinue the use of the application