Identify a case where a company had to prepare a public response to a security incident.
Identify a case where a company had to prepare a public response to a security incident. Examine and assess what happened, what vulnerability was exploited, and how the company handled the response publicly.