Company Details
10-31-inc.
15
115
712
10-31.com
0
10-_1449057
In-progress

10-31 Inc. Company CyberSecurity Posture
10-31.com10-31 Incorporated was created in 1985 by Bill Stender when he saw the need for custom mounts that had the ability to hold priceless items without taking away from their uniqueness. Five years later, Bill created 10-31 Cabinetry after being asked by many to design and build custom cabinetry. Creative excellence and quality workmanship were a given, but how to scale against individually focused creative executions became the bigger question. The answer came three years later in the form of Art Display Essentials. ADE focused on small to medium size display components that could be created in-house and manufactured in mass production. This business model, different than the first two divisions, produced volume sales at much lower price points. Opportunity again presented itself in 2012 when a vendor selling easels needed an exit strategy and sold his business to 10-31. This business fit nicely within the Art Display Essentials division under the Easels by Amron brand. 2013 brought a wonderful new product into the 10-31 fold. Designed and developed with son Evan, the Q-cord was introduced to the market and answered the need for an aesthetically pleasing retractable barrier system. Several other products such as MuseumRails, MuseumSigns, Q-Cord Art Stanchions, and Museum Display cases used by high-end collectors and museums fall under the 10-31 umbrella. 10-31 continues to grow from a simple shop in Wharton, NJ to a company where there are no boundaries either in the degree of a project’s difficulty or its geographical location.
Company Details
10-31-inc.
15
115
712
10-31.com
0
10-_1449057
In-progress
Between 750 and 799

10-31 Inc. Global Score (TPRM)XXXX



No incidents recorded for 10-31 Inc. in 2025.
No incidents recorded for 10-31 Inc. in 2025.
No incidents recorded for 10-31 Inc. in 2025.
10-31 Inc. cyber incidents detection timeline including parent company and subsidiaries

10-31 Incorporated was created in 1985 by Bill Stender when he saw the need for custom mounts that had the ability to hold priceless items without taking away from their uniqueness. Five years later, Bill created 10-31 Cabinetry after being asked by many to design and build custom cabinetry. Creative excellence and quality workmanship were a given, but how to scale against individually focused creative executions became the bigger question. The answer came three years later in the form of Art Display Essentials. ADE focused on small to medium size display components that could be created in-house and manufactured in mass production. This business model, different than the first two divisions, produced volume sales at much lower price points. Opportunity again presented itself in 2012 when a vendor selling easels needed an exit strategy and sold his business to 10-31. This business fit nicely within the Art Display Essentials division under the Easels by Amron brand. 2013 brought a wonderful new product into the 10-31 fold. Designed and developed with son Evan, the Q-cord was introduced to the market and answered the need for an aesthetically pleasing retractable barrier system. Several other products such as MuseumRails, MuseumSigns, Q-Cord Art Stanchions, and Museum Display cases used by high-end collectors and museums fall under the 10-31 umbrella. 10-31 continues to grow from a simple shop in Wharton, NJ to a company where there are no boundaries either in the degree of a project’s difficulty or its geographical location.


The Mission of the Gilmore Car Museum is to tell the history of America through the automobile. We foster experiences which connect people with the history, heritage, and social impact of the automobile through collecting, preserving, and interpreting its story. The Gilmore Car Museum is North Ame

As the Jewish people’s living memorial to the Holocaust, Yad Vashem safeguards the memory of the past and imparts its meaning for future generations. Established in 1953, as the world center for documentation, research, education and commemoration of the Holocaust, Yad Vashem is today a dynamic and

Catawba Science Center is a nonprofit science and technology museum serving NC’s western Piedmont region. Special attractions include traveling exhibits, a digital planetarium theater and a marine touch pool with live sharks and stingrays. A community asset and regional destination, Catawba Science

Golden Hinde Trust (GHT) is a charitable organisation whose aim is to restore and preserve Golden Hinde II for educational and public use, ensuring its history and legacy remain an important part of British heritage, and to promote the various services the Trust has to offer. Located in historic

Located on Market Street in downtown Harrisburg, Whitaker Center is Central PA’s premier destination for entertainment and education. From hands-on science in our Harsco Science Center, to a premium large format movie experience in Select Medical Digital Cinema, to live performances inside Sunoco Pe

The Drawing Center, a museum in Manhattan's SoHo district, explores the medium of drawing as primary, dynamic, and relevant to contemporary culture, the future of art, and creative thought. Its activities, which are both multidisciplinary and broadly historical, include exhibitions; Open Sessions, a
.png)
of VISA INC. lobbying was just disclosed, from Q2 of 2025, in a new Lobbying Disclosure A.
A lawsuit filed by Nebraska Attorney General Mike Hilgers over the 2024 Change Healthcare data breach has been allowed to proceed after...
Geneva, Switzerland, Oct. 31, 2025 (GLOBE NEWSWIRE) -- SEALSQ Corp (NASDAQ: LAES) (
After a March cybersecurity breach that allowed an unauthorized third party to access patients' information, the Yale New Haven Health...
Tego Cyber is now VigilAigent Corp., effective immediately, reflecting its Agentic AI focus and security platform.
Rilevera Inc., a startup focused on automating cyberthreat detection rule management, today said it has raised $3 million in seed funding to...
VIENNA, Va., Oct. 31, 2025 (GLOBE NEWSWIRE) -- Castellum, Inc. (NYSE-American: CTM) (“Castellum” or “CTM”), a cybersecurity,...
Share : Weekly Intelligence Report – 31 October 2025. Ransomware of the week. CYFIRMA Research and Advisory Team would like to highlight...
The group claimed that it stole some 1.1 terabytes of data from Askul, and customer information and purchase histories are now downloadable.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of 10-31 Inc. is http://10-31.com.
According to Rankiteo, 10-31 Inc.’s AI-generated cybersecurity score is 764, reflecting their Fair security posture.
According to Rankiteo, 10-31 Inc. currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, 10-31 Inc. is not certified under SOC 2 Type 1.
According to Rankiteo, 10-31 Inc. does not hold a SOC 2 Type 2 certification.
According to Rankiteo, 10-31 Inc. is not listed as GDPR compliant.
According to Rankiteo, 10-31 Inc. does not currently maintain PCI DSS compliance.
According to Rankiteo, 10-31 Inc. is not compliant with HIPAA regulations.
According to Rankiteo,10-31 Inc. is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
10-31 Inc. operates primarily in the Museums, Historical Sites, and Zoos industry.
10-31 Inc. employs approximately 15 people worldwide.
10-31 Inc. presently has no subsidiaries across any sectors.
10-31 Inc.’s official LinkedIn profile has approximately 115 followers.
No, 10-31 Inc. does not have a profile on Crunchbase.
Yes, 10-31 Inc. maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/10-31-inc..
As of December 03, 2025, Rankiteo reports that 10-31 Inc. has not experienced any cybersecurity incidents.
10-31 Inc. has an estimated 2,134 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, 10-31 Inc. has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to 7.1.2-9 and 6.9.13-34, there is a vulnerability in ImageMagick’s Magick++ layer that manifests when Options::fontFamily is invoked with an empty string. Clearing a font family calls RelinquishMagickMemory on _drawInfo->font, freeing the font string but leaving _drawInfo->font pointing to freed memory while _drawInfo->family is set to that (now-invalid) pointer. Any later cleanup or reuse of _drawInfo->font re-frees or dereferences dangling memory. DestroyDrawInfo and other setters (Options::font, Image::font) assume _drawInfo->font remains valid, so destruction or subsequent updates trigger crashes or heap corruption. This vulnerability is fixed in 7.1.2-9 and 6.9.13-34.
FeehiCMS version 2.1.1 has a Remote Code Execution via Unrestricted File Upload in Ad Management. FeehiCMS version 2.1.1 allows authenticated remote attackers to upload files that the server later executes (or stores in an executable location) without sufficient validation, sanitization, or execution restrictions. An authenticated remote attacker can upload a crafted PHP file and cause the application or web server to execute it, resulting in remote code execution (RCE).
PHPGurukul Billing System 1.0 is vulnerable to SQL Injection in the admin/index.php endpoint. Specifically, the username parameter accepts unvalidated user input, which is then concatenated directly into a backend SQL query.
NMIS/BioDose software V22.02 and previous versions contain executable binaries with plain text hard-coded passwords. These hard-coded passwords could allow unauthorized access to both the application and database.
NMIS/BioDose V22.02 and previous versions' installation directory paths by default have insecure file permissions, which in certain deployment scenarios can enable users on client workstations to modify the program executables and libraries.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.