What is it?

where information that highlights a probable exploitable vulnerability, has processes in place to help ensure action is taken to deal with it.

This information can also be exchanged to help improve the security posture of other organisations

Why is it mentioned?

similar reasons to assessing threat intelligence