ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

The Indiana University Public Policy Institute produces high-quality applied research and data analysis for leaders to effect positive change in their communities. Our faculty, researchers, and analysts partner with community leaders and organizations to deliver unbiased policy guidance and data-driven, expert analysis to help public, private and nonprofit sectors in Indiana and throughout the nation make important decisions that directly impact quality of life. Our expert team can address a wide range of issues and deliver the data and insights needed to make informed decisions. A multidisciplinary institute within the Paul H. O'Neill School of Public and Environmental Affairs that includes the Center for Health and Justice Research and the Center for Research on Inclusion and Social Policy, our efforts also support the Indiana Advisory Commission on Intergovernmental Relations (IACIR).

Indiana University Public Policy Institute A.I CyberSecurity Scoring

IUPPI

Company Details

Linkedin ID:

iu-public-policy-institute

Employees number:

16

Number of followers:

856

NAICS:

921

Industry Type:

Public Policy Offices

Homepage:

iu.edu

IP Addresses:

0

Company ID:

IND_3316198

Scan Status:

In-progress

AI scoreIUPPI Risk Score (AI oriented)

Between 700 and 749

https://images.rankiteo.com/companyimages/iu-public-policy-institute.jpeg
IUPPI Public Policy Offices
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreIUPPI Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/iu-public-policy-institute.jpeg
IUPPI Public Policy Offices
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

IUPPI Company CyberSecurity News & History

Past Incidents
0
Attack Types
0
No data available
Ailogo

IUPPI Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for IUPPI

Incidents vs Public Policy Offices Industry Average (This Year)

No incidents recorded for Indiana University Public Policy Institute in 2025.

Incidents vs All-Companies Average (This Year)

No incidents recorded for Indiana University Public Policy Institute in 2025.

Incident Types IUPPI vs Public Policy Offices Industry Avg (This Year)

No incidents recorded for Indiana University Public Policy Institute in 2025.

Incident History — IUPPI (X = Date, Y = Severity)

IUPPI cyber incidents detection timeline including parent company and subsidiaries

IUPPI Company Subsidiaries

SubsidiaryImage

The Indiana University Public Policy Institute produces high-quality applied research and data analysis for leaders to effect positive change in their communities. Our faculty, researchers, and analysts partner with community leaders and organizations to deliver unbiased policy guidance and data-driven, expert analysis to help public, private and nonprofit sectors in Indiana and throughout the nation make important decisions that directly impact quality of life. Our expert team can address a wide range of issues and deliver the data and insights needed to make informed decisions. A multidisciplinary institute within the Paul H. O'Neill School of Public and Environmental Affairs that includes the Center for Health and Justice Research and the Center for Research on Inclusion and Social Policy, our efforts also support the Indiana Advisory Commission on Intergovernmental Relations (IACIR).

Loading...
similarCompanies

IUPPI Similar Companies

Pennsylvania Pro-Life Federation

The Pennsylvania Pro-Life Federation is a grassroots right-to-life organization with members statewide. As the state affiliate of National Right to Life, the Pennsylvania Pro-Life Federation is committed to promoting the dignity and value of human life from conception to natural death and to restor

Texas Public Charter Schools Association

The Texas Public Charter Schools Association (TPCSA) is committed to making sure every child in Texas has access to a high-quality public school that will set them on the path to success. Working toward this vision of the future, our mission is to support and advocate for a policy and regulatory cli

Noviter srl

Elaboriamo progetti strategici e operativi, forniamo assistenza e supporto tecnico ai processi di governo e d’innovazione. I nostri servizi di consulenza sono adattati al contesto in cui devono operare. Sulla base della nostra esperienza, del metodo utilizzato e delle specifiche esigenze dei client

Instituto Federal de Gobierno

El Instituto Federal de Gobierno (IFG) pertenece a la Facultad de Ciencia Política y Relaciones Internacionales de la Universidad Católica de Córdoba (UCC). Tiene por objetivo contribuir a la mejora de la gestión de lo público a través de la formación de equipos de gestión, asistencia técnica y el d

Metropolitan Planning Council

Since 1934, the Metropolitan Planning Council (MPC) has been dedicated to shaping a more sustainable and prosperous greater Chicago region. As an independent, nonprofit, nonpartisan organization, MPC serves communities and residents by developing, promoting and implementing solutions for sound regio

American Constitution Society

ACS believes that the Constitution is “of the people, by the people, and for the people.” We interpret the Constitution based on its text and against the backdrop of history and lived experience. Through a diverse nationwide network of progressive lawyers, law students, judges, scholars and many oth

newsone

IUPPI CyberSecurity News

October 07, 2025 07:00 AM
Unsealed documents reveal details behind FBI raid of fired Indiana University professor

A shroud of secrecy has surrounded the motive behind the FBI raid and firing of a Chinese professor at Indiana University earlier this year.

September 22, 2025 07:00 AM
A big picture look at data centers as big tech is eyeing the Hoosier state

Isak Nti Asare, Co-Director of the Cybersecurity and Global Policy Program, Indiana University, said local communities have leverage over...

July 22, 2025 07:00 AM
IN overhauls school rules, eyes student success

Indiana is rolling out a series of new education laws aimed at helping students succeed in and beyond the classroom.

June 24, 2025 07:00 AM
Indiana’s New Cybersecurity Requirements Effective July 1, 2025

It requires public entities to adopt specific policies regarding technology resource use and cybersecurity and to meet certain compliance requirements.

June 05, 2025 07:00 AM
Cyberattacks are hurting US businesses. Here’s how Congress can upgrade cybersecurity information sharing.

Cybersecurity is a team sport, yet small and medium-sized businesses (SMBs) have spent years on the sidelines, despite being the targets of...

April 16, 2025 07:00 AM
The mysterious firing of a Chinese professor has Asian students on edge: ‘Brings chills to our spines’

Xiaofeng Wang was fired by Indiana University on the same day as an FBI raid – but he hasn't been charged with a crime.

April 03, 2025 07:00 AM
IU professor Xiaofeng Wang investigated for academic misconduct before FBI search

Weeks before the FBI searched his homes and mentions of his name were wiped from Indiana University websites, IU cybersecurity professor...

April 02, 2025 07:00 AM
Fired prof accused of research misconduct, FBI involvement unclear

XiaoFeng Wang, the tenured cybersecurity professor fired by Indiana University the same day as mysterious FBI raids on his homes, stood accused of academic...

April 02, 2025 07:00 AM
Cybersecurity professor targeted by FBI has not been detained, lawyer says

A prominent Indiana University cybersecurity professor who was abruptly fired and disappeared from public view has not been detained and...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

IUPPI CyberSecurity History Information

Official Website of Indiana University Public Policy Institute

The official website of Indiana University Public Policy Institute is http://policyinstitute.iu.edu/.

Indiana University Public Policy Institute’s AI-Generated Cybersecurity Score

According to Rankiteo, Indiana University Public Policy Institute’s AI-generated cybersecurity score is 743, reflecting their Moderate security posture.

How many security badges does Indiana University Public Policy Institute’ have ?

According to Rankiteo, Indiana University Public Policy Institute currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does Indiana University Public Policy Institute have SOC 2 Type 1 certification ?

According to Rankiteo, Indiana University Public Policy Institute is not certified under SOC 2 Type 1.

Does Indiana University Public Policy Institute have SOC 2 Type 2 certification ?

According to Rankiteo, Indiana University Public Policy Institute does not hold a SOC 2 Type 2 certification.

Does Indiana University Public Policy Institute comply with GDPR ?

According to Rankiteo, Indiana University Public Policy Institute is not listed as GDPR compliant.

Does Indiana University Public Policy Institute have PCI DSS certification ?

According to Rankiteo, Indiana University Public Policy Institute does not currently maintain PCI DSS compliance.

Does Indiana University Public Policy Institute comply with HIPAA ?

According to Rankiteo, Indiana University Public Policy Institute is not compliant with HIPAA regulations.

Does Indiana University Public Policy Institute have ISO 27001 certification ?

According to Rankiteo,Indiana University Public Policy Institute is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Indiana University Public Policy Institute

Indiana University Public Policy Institute operates primarily in the Public Policy Offices industry.

Number of Employees at Indiana University Public Policy Institute

Indiana University Public Policy Institute employs approximately 16 people worldwide.

Subsidiaries Owned by Indiana University Public Policy Institute

Indiana University Public Policy Institute presently has no subsidiaries across any sectors.

Indiana University Public Policy Institute’s LinkedIn Followers

Indiana University Public Policy Institute’s official LinkedIn profile has approximately 856 followers.

NAICS Classification of Indiana University Public Policy Institute

Indiana University Public Policy Institute is classified under the NAICS code 921, which corresponds to Executive, Legislative, and Other General Government Support.

Indiana University Public Policy Institute’s Presence on Crunchbase

No, Indiana University Public Policy Institute does not have a profile on Crunchbase.

Indiana University Public Policy Institute’s Presence on LinkedIn

Yes, Indiana University Public Policy Institute maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/iu-public-policy-institute.

Cybersecurity Incidents Involving Indiana University Public Policy Institute

As of November 27, 2025, Rankiteo reports that Indiana University Public Policy Institute has not experienced any cybersecurity incidents.

Number of Peer and Competitor Companies

Indiana University Public Policy Institute has an estimated 1,026 peer or competitor companies worldwide.

Indiana University Public Policy Institute CyberSecurity History Information

How many cyber incidents has Indiana University Public Policy Institute faced ?

Total Incidents: According to Rankiteo, Indiana University Public Policy Institute has faced 0 incidents in the past.

What types of cybersecurity incidents have occurred at Indiana University Public Policy Institute ?

Incident Types: The types of cybersecurity incidents that have occurred include .

Incident Details

What are the most common types of attacks the company has faced ?

Additional Questions

cve

Latest Global CVEs (Not Company-Specific)

Description

Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to versions 19.2.16, 20.3.14, and 21.0.1, there is a XSRF token leakage via protocol-relative URLs in angular HTTP clients. The vulnerability is a Credential Leak by App Logic that leads to the unauthorized disclosure of the Cross-Site Request Forgery (XSRF) token to an attacker-controlled domain. Angular's HttpClient has a built-in XSRF protection mechanism that works by checking if a request URL starts with a protocol (http:// or https://) to determine if it is cross-origin. If the URL starts with protocol-relative URL (//), it is incorrectly treated as a same-origin request, and the XSRF token is automatically added to the X-XSRF-TOKEN header. This issue has been patched in versions 19.2.16, 20.3.14, and 21.0.1. A workaround for this issue involves avoiding using protocol-relative URLs (URLs starting with //) in HttpClient requests. All backend communication URLs should be hardcoded as relative paths (starting with a single /) or fully qualified, trusted absolute URLs.

Risk Information
cvss4
Base: 7.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Uncontrolled Recursion vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs. This issue has been patched in version 1.3.2.

Risk Information
cvss4
Base: 8.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Integer Overflow vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures containing OIDs with oversized arcs. These arcs may be decoded as smaller, trusted OIDs due to 32-bit bitwise truncation, enabling the bypass of downstream OID-based security decisions. This issue has been patched in version 1.3.2.

Risk Information
cvss4
Base: 6.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, working with large buffers in Lua scripts can lead to a stack overflow. Users of Lua rules and output scripts may be affected when working with large buffers. This includes a rule passing a large buffer to a Lua script. This issue has been patched in versions 7.0.13 and 8.0.2. A workaround for this issue involves disabling Lua rules and output scripts, or making sure limits, such as stream.depth.reassembly and HTTP response body limits (response-body-limit), are set to less than half the stack size.

Risk Information
cvss3
Base: 7.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Description

Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. In versions from 8.0.0 to before 8.0.2, a NULL dereference can occur when the entropy keyword is used in conjunction with base64_data. This issue has been patched in version 8.0.2. A workaround involves disabling rules that use entropy in conjunction with base64_data.

Risk Information
cvss3
Base: 7.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=iu-public-policy-institute' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge