1 ..., monetization after exploitation, and publicly shaming organizations after a breach. New, innovative, and useful...

2 ..., monetization after exploitation, and publicly shaming organizations after a breach. New, innovative, and useful...