Researchers can utilize publicly available information to study breaches in many different ways. Some ways are more effective than others, the first way could be just through data analysis they can identify patterns and trends. They can also look for factors such as what industries were affected by the method of breach, could be the size of the organization and what data was composed. Researchers can also conduct in-depth case studies on specific breaches, explaining when the event happened, what strategies the attackers used, the response from the organizations that were attacked, and the impact on individuals and businesses. Another way could be by simulating an attack, researchers could simulate how an attack was made and from that use it to understand how the organization can better protect that information. These are just some ways researchers can study breaches.