Company Details
20-stories-high
28
531
7111
20storieshigh.org.uk
0
20 _5389418
In-progress

20 Stories High Company CyberSecurity Posture
20storieshigh.org.uk20 Stories High make theatre with… young people from excluded communities, emerging & world-class artists to tell stories that are… contemporary, youthful, authentic, melodic, gritty, poetic, rebellious, cheeky original, visual, challenging, tender anarchic, diverse, eclectic, bass-heavy, political, funny, collaborative… and heart-felt. We bring young people into theatre venues and go out into their communities. We hail from Liverpool, but our reach is national We believe everybody’s got a story to tell...and their own way of telling it...
Company Details
20-stories-high
28
531
7111
20storieshigh.org.uk
0
20 _5389418
In-progress
Between 750 and 799

SH Global Score (TPRM)XXXX



No incidents recorded for 20 Stories High in 2025.
No incidents recorded for 20 Stories High in 2025.
No incidents recorded for 20 Stories High in 2025.
SH cyber incidents detection timeline including parent company and subsidiaries

20 Stories High make theatre with… young people from excluded communities, emerging & world-class artists to tell stories that are… contemporary, youthful, authentic, melodic, gritty, poetic, rebellious, cheeky original, visual, challenging, tender anarchic, diverse, eclectic, bass-heavy, political, funny, collaborative… and heart-felt. We bring young people into theatre venues and go out into their communities. We hail from Liverpool, but our reach is national We believe everybody’s got a story to tell...and their own way of telling it...


The Jamaica Cultural Development Commission (JCDC) began in 1963 as the Festival Office, with a mandate to develop and promote the creative talents and cultural expressions of the Jamaican people. Its function is also to ensure that the nation’s cultural heritage is preserved and sustained for the b

Founded in 1986, San Jose Jazz is a public benefit corporation dedicated to promoting jazz through performance and education to enrich the lives of the people in our community. San Jose Jazz serves the Silicon Valley area, one of the most richly diverse and rapidly growing regions in the US. San Jo

Your one-stop-shop for everything from rock to pop, NOLA School of Music is the place to be to learn a new instrument. We offer 30-minute, 45-minute, and 60-minute weekly private music lessons for students of all ages. We cater our curriculum to fit each student's unique musical tastes & learning s

The Egyptian Theatre is a 1929, fully restored, Egyptian Art Deco movie palace, owned and operated by the 501(c)(3) non-profit organization Preservation of Egyptian Theatre, Inc. Listed on the National Registry of Historic Places, the Egyptian is host to 30+ community organizations, presents nationa

Founded in 1999 as the Riverton Metropolitan Orchestra, the Oquirrh Mountain Symphony is a family-friendly multi-community regional symphony serving patrons in southern Salt Lake County and northern Utah County. Under the direction of Maestro Benjamin Winkler, the Symphony performs a wide range o

The Oregon Symphony is Portland’s largest performing arts organization and the oldest American orchestra west of the Mississippi. Led by Music Director David Danzmayr, it performs with many of the world’s top musicians and offers the best of orchestral music – classical to pops to cutting-edge conte
.png)
Future OpenAI Large Language Models (LLM) could pose higher cybersecurity risks as, in theory, they could be able to develop working...
Hacker's Movie Guide” with Foreword by Steve Wozniak, co-founder of Apple.
In 2023, 725 data breaches were reported to OCR and across those breaches, more than 133 million records were exposed or impermissibly disclosed.
Data breaches affecting millions of users are far too common. Here are some of the biggest, baddest breaches in recent memory.
The cyber threat landscape in 2025 will be shaped by increasingly sophisticated attacks, with ransomware, social engineering and AI-powered cybercrime...
'Industries in the Intelligent Age' is one of the key themes at the World Economic Forum's Annual Meeting 2025 in Davos.
Saudi Arabia wants to take Formula 1 to dizzying new heights. The Middle Eastern nation has released renderings of a new Formula 1 track...
Inside the high-tech, high-stakes race to keep the cloud safe, secure and empowering for all.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of 20 Stories High is http://www.20storieshigh.org.uk.
According to Rankiteo, 20 Stories High’s AI-generated cybersecurity score is 759, reflecting their Fair security posture.
According to Rankiteo, 20 Stories High currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, 20 Stories High is not certified under SOC 2 Type 1.
According to Rankiteo, 20 Stories High does not hold a SOC 2 Type 2 certification.
According to Rankiteo, 20 Stories High is not listed as GDPR compliant.
According to Rankiteo, 20 Stories High does not currently maintain PCI DSS compliance.
According to Rankiteo, 20 Stories High is not compliant with HIPAA regulations.
According to Rankiteo,20 Stories High is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
20 Stories High operates primarily in the Performing Arts industry.
20 Stories High employs approximately 28 people worldwide.
20 Stories High presently has no subsidiaries across any sectors.
20 Stories High’s official LinkedIn profile has approximately 531 followers.
20 Stories High is classified under the NAICS code 7111, which corresponds to Performing Arts Companies.
No, 20 Stories High does not have a profile on Crunchbase.
Yes, 20 Stories High maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/20-stories-high.
As of December 15, 2025, Rankiteo reports that 20 Stories High has not experienced any cybersecurity incidents.
20 Stories High has an estimated 2,701 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, 20 Stories High has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
NXLog Agent before 6.11 can load a file specified by the OPENSSL_CONF environment variable.
uriparser through 0.9.9 allows unbounded recursion and stack consumption, as demonstrated by ParseMustBeSegmentNzNc with large input containing many commas.
A vulnerability was detected in Mayan EDMS up to 4.10.1. The affected element is an unknown function of the file /authentication/. The manipulation results in cross site scripting. The attack may be performed from remote. The exploit is now public and may be used. Upgrading to version 4.10.2 is sufficient to fix this issue. You should upgrade the affected component. The vendor confirms that this is "[f]ixed in version 4.10.2". Furthermore, that "[b]ackports for older versions in process and will be out as soon as their respective CI pipelines complete."
MJML through 4.18.0 allows mj-include directory traversal to test file existence and (in the type="css" case) read files. NOTE: this issue exists because of an incomplete fix for CVE-2020-12827.
A half-blind Server Side Request Forgery (SSRF) vulnerability exists in kube-controller-manager when using the in-tree Portworx StorageClass. This vulnerability allows authorized users to leak arbitrary information from unprotected endpoints in the control plane’s host network (including link-local or loopback services).

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.