The database is valuable to researchers for various reasons, but its most valuable use would be knowledge of the most vulnerable companies to attacks. The data provides information on which companies were breached, a description of the breach, their location, and various other facts about breaches. By analyzing the data, researchers can figure out which companies are most vulnerable to attack as well as the other factors that influence attacks. They can study how location, company type, and information available affect which companies are chosen for attacks. They can also correlate which breach types are most common with which company types and use this information to inform companies of which attacks they should expect more than others. While the database may not provide specifics on which exploits were used, knowing what types of attacks were initiated is invaluable knowledge for cybersecurity researchers.