Security Breaches and the “Crown Jewels” of Creativity and Research - Exabeam

Security Breaches and the “Crown Jewels” of Creativity and Research

May 26, 2015


Reading time
2 mins

The resent data breach at Penn State was a reminder to me of how much research and intellectual property is created at America’s universities. Research in quantum computing, materials science, and missile propulsion systems are a tiny fraction of the intellectual property and research being worked on by universities under contract with and a wide variety of defense agencies or waiting for commercialization.

This isn’t limited to the US. In the UK the Guardian reports, “…Students come and go, bringing laptops and mobile devices; visitors pass through from across the globe; researchers link up with organizations worldwide.” Collaboration across the globe and with governmental agencies comes with the territory. “There simply isn’t the ability to lock things down the way you could in a commercial organization.”

In the last 12 months Carnegie-Mellon, Stanford, University of Maryland, University of North Carolina at Chapel Hill, University of Delaware, and Virginia Tech University, and Marquette University have all been hit with data breaches with hackers looking to steal usernames and passwords of students and facility.

The intellectual property that many research institutions generate is similarly appealing to state-sponsored actors looking to capitalize on U.S. economic investments. As the New York Times has reported, at least one university has faced up to 100,000 daily penetration attempts from China alone.

According to Eric Vanderburg, Director of Information Systems and Security at JURINNOV, Ltd., “Malware is often seen as a nuisance or a productivity inhibitor but an infected computer can pose a much great risk to organizations and it should not be overlooked.  Malware gets behind the organization’s perimeter and it can act with the credentials of legitimate users including administrators.” 

Want to see a solution that can tell the difference between a legitimate user and malware using that user’s credentials?

The Demo Button


Similar Posts

What’s New in Exabeam Product Development – November 2022

Exabeam News Wrap-up – December 1, 2022

Exabeam Achieves ISO 27017 and ISO 27018 Certifications

Recent Posts

Understanding UEBA: From Scored Events to Stories

What’s New in Exabeam Product Development – November 2022

Exabeam News Wrap-up – December 1, 2022

See a world-class SIEM solution in action

Most reported breaches involved lost or stolen credentials. How can you keep pace?

Exabeam delivers SOC teams industry-leading analytics, patented anomaly detection, and Smart Timelines to help teams pinpoint the actions that lead to exploits.

Whether you need a SIEM replacement, a legacy SIEM modernization with XDR, Exabeam offers advanced, modular, and cloud-delivered TDIR.

Get a demo today!