Company Details
anikaya-dance-theater
3
114
7111
anikaya.org
0
ANI_2039734
In-progress

ANIKAYA Dance Theater Company CyberSecurity Posture
anikaya.orgANIKAYA Dance Theater was founded in 2003 by choreographer Wendy Jehlen. Our work has so far extended to the US, Benin, Brazil, Botswana, Burkina Faso, Canada, China, France, Haiti, India, Japan, Korea, Mali, Mexico, Mozambique, Palestine, Rwanda, South Africa, and Turkey. ANIKAYA’s mission is to break down the perceived boundaries between people, cultures and art forms. ANIKAYA’s work falls into two symbiotic, porous categories – performance and community engagement. Both come back to one essential change catalyst – kinesthetic empathy. Our work questions the boundaries that we imagine between ourselves, and seeks to break down these imagined walls through an embodied practice of radical empathy. ANIKAYA weaves together music, dance, visual art, new media and storytelling to create work that is resonant of deep-rooted traditions, without being bound to any one genre, place or practice. ANIKAYA engages in the authentic representation of reality. We are an artist-run organization and all of our projects are created by and for people of all genders and gender presentations, people of color from the US and around the world, LGBTQIA people, people with disabilities and people who create bodies that are socially-constructed as disabled.
Company Details
anikaya-dance-theater
3
114
7111
anikaya.org
0
ANI_2039734
In-progress
Between 750 and 799

ADT Global Score (TPRM)XXXX



No incidents recorded for ANIKAYA Dance Theater in 2025.
No incidents recorded for ANIKAYA Dance Theater in 2025.
No incidents recorded for ANIKAYA Dance Theater in 2025.
ADT cyber incidents detection timeline including parent company and subsidiaries

ANIKAYA Dance Theater was founded in 2003 by choreographer Wendy Jehlen. Our work has so far extended to the US, Benin, Brazil, Botswana, Burkina Faso, Canada, China, France, Haiti, India, Japan, Korea, Mali, Mexico, Mozambique, Palestine, Rwanda, South Africa, and Turkey. ANIKAYA’s mission is to break down the perceived boundaries between people, cultures and art forms. ANIKAYA’s work falls into two symbiotic, porous categories – performance and community engagement. Both come back to one essential change catalyst – kinesthetic empathy. Our work questions the boundaries that we imagine between ourselves, and seeks to break down these imagined walls through an embodied practice of radical empathy. ANIKAYA weaves together music, dance, visual art, new media and storytelling to create work that is resonant of deep-rooted traditions, without being bound to any one genre, place or practice. ANIKAYA engages in the authentic representation of reality. We are an artist-run organization and all of our projects are created by and for people of all genders and gender presentations, people of color from the US and around the world, LGBTQIA people, people with disabilities and people who create bodies that are socially-constructed as disabled.


Midsumma Festival is Victoria's premier LGBTQIA+ cultural festival, made for and by communities who live with shared experiences around diverse gender and sexuality. We are a champion of LGBTQIA+ cultures, conversations and events. We are the intersection between generations, people, ideas, stories

We are a small performing arts group but have a stable of 40-50 drummers in our dojo (studio), at various stages of development, that join us in festivals. The members of Fushicho Daiko, in addition to Esther are: Eileen Morgan, senior member, Ken Koshio a Folk/Rock singer from Nagoya, Japan, and M

We believe lasting wellbeing comes from a deeper understanding of ourselves and others. We use creativity and fun to bring people together, building connections, confidence and empathy. We offer bespoke and innovative training programs in Public Speaking, Team Building and Mindful Skills. We use o

The non-profit Wells Fargo Center for the Arts is the North Bay’s premier Arts Center presenting world-class performances, nationally recognized education programs, contemporary visual arts, and many popular community events. Together with its resident companies, the Center is ranked among world’s t

Home of the Performing Arts in South Australia, the Adelaide Festival Centre offers a diverse program of festival quality shows for a broad range of tastes and budgets throughout the year. As well as our own festivals, we make sure the festival continues with a year packed full of music, dance, thea

Now celebrating our twentieth year, Elsie Management represents a roster of performing artists for engagements to performing arts centers, venues of all shapes and sizes, festivals, and special event programming. We are dedicated to promoting exceptional, award-winning performing artists and compani
.png)
Cybercriminals are tricking users into downloading malware disguised as popular office tools like Microsoft Teams and Google Meet.
Cybersecurity isn't just a defensive measure; it's a strategic asset that can significantly enhance enterprise value.
TL;DR: In 2025, cybersecurity shifted from a “best practice” to a mandatory requirement for operational survival.
Against the backdrop of Ukraine, growing East/West geopolitical tensions, and persistent cybersecurity attacks by nation-state threat actors...
TOKYO -- The Japanese government will soon require internet-connected output control systems used in solar power generation to come equipped...
The Cleveland County Sheriff's Office (CCSO) is the victim of a cybersecurity attack, and now a hacking group claiming to be responsible is...
Holly Drake, the state chief information security officer, will join the University of Central Florida as its CISO.
Canada's new cybersecurity bill, Bill C-8, gives ministers unchecked powers to secretly disconnect Canadians, issue sweeping telecom orders,...
The Cybersecurity and Infrastructure Security Agency has released version 2.0 of its Cross-Sector Cybersecurity Performance Goals, or CPGs,...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of ANIKAYA Dance Theater is http://www.anikaya.org.
According to Rankiteo, ANIKAYA Dance Theater’s AI-generated cybersecurity score is 758, reflecting their Fair security posture.
According to Rankiteo, ANIKAYA Dance Theater currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, ANIKAYA Dance Theater is not certified under SOC 2 Type 1.
According to Rankiteo, ANIKAYA Dance Theater does not hold a SOC 2 Type 2 certification.
According to Rankiteo, ANIKAYA Dance Theater is not listed as GDPR compliant.
According to Rankiteo, ANIKAYA Dance Theater does not currently maintain PCI DSS compliance.
According to Rankiteo, ANIKAYA Dance Theater is not compliant with HIPAA regulations.
According to Rankiteo,ANIKAYA Dance Theater is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
ANIKAYA Dance Theater operates primarily in the Performing Arts industry.
ANIKAYA Dance Theater employs approximately 3 people worldwide.
ANIKAYA Dance Theater presently has no subsidiaries across any sectors.
ANIKAYA Dance Theater’s official LinkedIn profile has approximately 114 followers.
ANIKAYA Dance Theater is classified under the NAICS code 7111, which corresponds to Performing Arts Companies.
No, ANIKAYA Dance Theater does not have a profile on Crunchbase.
Yes, ANIKAYA Dance Theater maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/anikaya-dance-theater.
As of December 13, 2025, Rankiteo reports that ANIKAYA Dance Theater has not experienced any cybersecurity incidents.
ANIKAYA Dance Theater has an estimated 2,699 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, ANIKAYA Dance Theater has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
LibreChat is a ChatGPT clone with additional features. In versions 0.8.0 and below, there is no handler for JSON parsing errors; SyntaxError from express.json() includes user input in the error message, which gets reflected in responses. User input (including HTML/JavaScript) can be exposed in error responses, creating an XSS risk if Content-Type isn't strictly enforced. This issue does not have a fix at the time of publication.
LibreChat is a ChatGPT clone with additional features. In versions 0.8.0 and below, when creating prompts, JSON requests are sent to define and modify the prompts via PATCH endpoint for prompt groups (/api/prompts/groups/:groupId). However, the request bodies are not sufficiently validated for proper input, enabling users to modify prompts in a way that was not intended as part of the front end system. The patchPromptGroup function passes req.body directly to updatePromptGroup() without filtering sensitive fields. This issue is fixed in version 0.8.1.
LibreChat is a ChatGPT clone with additional features. In versions 0.8.0 and below, when a user posts a question, the iconURL parameter of the POST request can be modified by an attacker. The malicious code is then stored in the chat which can then be shared to other users. When sharing chats with a potentially malicious “tracker”, resources loaded can lead to loss of privacy for users who view the chat link that is sent to them. This issue is fixed in version 0.8.1.
MaxKB is an open-source AI assistant for enterprise. Versions 2.3.1 and below have improper file permissions which allow attackers to overwrite the built-in dynamic linker and other critical files, potentially resulting in privilege escalation. This issue is fixed in version 2.4.0.
MaxKB is an open-source AI assistant for enterprise. In versions 2.3.1 and below, the tool module allows an attacker to escape the sandbox environment and escalate privileges under certain concurrent conditions. This issue is fixed in version 2.4.0.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.