A software development company identifies that one of their third-party libraries has a known vulnerability that cannot be patched immediately. To continue operations without accepting the risk as it is, which strategy should they apply?
Mitigate
Accept
Avoid
Transfer