Comparison Overview

University of Calgary

VS

Stanford University

University of Calgary

2500 University Dr NW Calgary, T2N 1N4, Calgary, Alberta, CA, T2N1N4
Last Update: 2026-04-02
Between 750 and 799

The University of Calgary is a leading Canadian university located in the nation's most enterprising city. Self-discovery starts at UCalgary. Focus your potential through innovative learning experiences, bold discoveries and lifelong connections. Find your starting line. Start something.

NAICS: 6113
NAICS Definition: Colleges, Universities, and Professional Schools
Employees: 14,600
Subsidiaries: 19
12-month incidents
0
Known data breaches
0
Attack type number
1

Stanford University

450 Jane Stanford Way, Stanford, CA, US, 94305
Last Update: 2026-04-02
Between 800 and 849

Stanford is a place of discovery, creativity and innovation located in the San Francisco Bay Area on the ancestral land of the Muwekma Ohlone Tribe. Dedicated to our founding mission—benefitting society through research and education—we are working toward a sustainable future, accelerating the impact of research with external partners, catalyzing discoveries about ourselves and our world, and educating students as global citizens. Our main campus, which welcomed its first class in 1891, is now home to 650+ student organizations, 36 varsity athletic teams, 20 libraries, 21 living Nobel laureates, 18 interdisciplinary research institutes, seven schools, and a vibrant arts scene. More than 9,000 graduate students and 7,000 undergraduates pursue studies at Stanford each year. Our financial aid program, one of the most generous in the nation, makes it possible for any admitted undergraduate to attend without taking on student debt.

NAICS: 6113
NAICS Definition: Colleges, Universities, and Professional Schools
Employees: 27,864
Subsidiaries: 19
12-month incidents
0
Known data breaches
2
Attack type number
1

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/ucalgary.jpeg
University of Calgary
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/stanford-university.jpeg
Stanford University
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
University of Calgary
100%
Compliance Rate
0/4 Standards Verified
Stanford University
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Higher Education Industry Average (This Year)

No incidents recorded for University of Calgary in 2026.

Incidents vs Higher Education Industry Average (This Year)

No incidents recorded for Stanford University in 2026.

Incident History — University of Calgary (X = Date, Y = Severity)

University of Calgary cyber incidents detection timeline including parent company and subsidiaries

Incident History — Stanford University (X = Date, Y = Severity)

Stanford University cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/ucalgary.jpeg
University of Calgary
Incidents

Date Detected: 07/2016
Type:Ransomware
Motivation: Financial
Blog: Blog
https://images.rankiteo.com/companyimages/stanford-university.jpeg
Stanford University
Incidents

Date Detected: 02/2019
Type:Breach
Attack Vector: URL Manipulation
Motivation: Unauthorized Access to Sensitive Information
Blog: Blog

Date Detected: 6/2017
Type:Breach
Blog: Blog

FAQ

Stanford University company demonstrates a stronger AI Cybersecurity Score compared to University of Calgary company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Stanford University company has faced a higher number of disclosed cyber incidents historically compared to University of Calgary company.

In the current year, Stanford University company and University of Calgary company have not reported any cyber incidents.

University of Calgary company has confirmed experiencing a ransomware attack, while Stanford University company has not reported such incidents publicly.

Stanford University company has disclosed at least one data breach, while University of Calgary company has not reported such incidents publicly.

Neither Stanford University company nor University of Calgary company has reported experiencing targeted cyberattacks publicly.

Neither University of Calgary company nor Stanford University company has reported experiencing or disclosing vulnerabilities publicly.

Neither University of Calgary nor Stanford University holds any compliance certifications.

Neither company holds any compliance certifications.

Both Stanford University company and University of Calgary company have a similar number of subsidiaries worldwide.

Stanford University company employs more people globally than University of Calgary company, reflecting its scale as a Higher Education.

Neither University of Calgary nor Stanford University holds SOC 2 Type 1 certification.

Neither University of Calgary nor Stanford University holds SOC 2 Type 2 certification.

Neither University of Calgary nor Stanford University holds ISO 27001 certification.

Neither University of Calgary nor Stanford University holds PCI DSS certification.

Neither University of Calgary nor Stanford University holds HIPAA certification.

Neither University of Calgary nor Stanford University holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

A vulnerability was found in Nothings stb up to 1.26. Impacted is the function stbtt_InitFont_internal in the library stb_truetype.h of the component TTF File Handler. Performing a manipulation results in out-of-bounds read. Remote exploitation of the attack is possible. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 5.0
Severity: LOW
AV:N/AC:L/Au:N/C:N/I:N/A:P
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read in VS6ComFile!get_macro_mem_COM. Opening a crafted V7 file may lead to information disclosure from the affected product.

Risk Information
cvss3
Base: 7.8
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
cvss4
Base: 8.4
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

V-SFT versions 6.2.10.0 and prior contain a stack-based buffer overflow in VS6ComFile!CSaveData::_conv_AnimationItem. Opening a crafted V7 file may lead to arbitrary code execution on the affected product.

Risk Information
cvss3
Base: 7.8
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
cvss4
Base: 8.4
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read vulnerability in VS6MemInIF!set_temp_type_default. Opening a crafted V7 file may lead to information disclosure from the affected product.

Risk Information
cvss3
Base: 7.8
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
cvss4
Base: 8.4
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read vulnerability in VS6ComFile!load_link_inf. Opening a crafted V7 file may lead to information disclosure from the affected product.

Risk Information
cvss3
Base: 7.8
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
cvss4
Base: 8.4
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X