Comparison Overview

Arts House Group (AHG)

VS

San Diego Children's Discovery Museum

Arts House Group (AHG)

Aliwal Arts Centre, Singapore, 199918, SG
Last Update: 2025-12-01
Between 750 and 799

Arts House Group (AHG) is a not-for-profit organisation dedicated to enriching lives through the transformative power of the arts. As a key part of Singapore’s arts and cultural landscape, AHG presents the nation’s two flagship festivals – the Singapore International Festival of Arts and the Singapore Writers Festival – and oversees six key arts venues: The Arts House at the Old Parliament, Victoria Theatre and Victoria Concert Hall, Drama Centre, and the creative enclaves Goodman Arts Centre, Aliwal Arts Centre, and Stamford Arts Centre. AHG fosters artistic excellence at all stages of an artist’s journey, offering dynamic spaces for practice, presentation and exchange - empowering artists to create, express, collaborate and connect with diverse audiences. Through artist tenancies, commissions, festivals and public programmes, we champion Singapore’s creative talents while fostering meaningful audience engagement and shared experiences across communities. Our Cultural Medallion Gallery also honours the nation’s most accomplished artists, celebrating their enduring contributions to the arts.

NAICS: 712
NAICS Definition: Museums, Historical Sites, and Similar Institutions
Employees: 156
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

San Diego Children's Discovery Museum

320 North Broadway, Escondido, California 92025, US
Last Update: 2025-12-01
Between 750 and 799

San Diego Children's Discovery Museum sparks a love of learning so all children can discover their wildest dreams! Founded in 1999, we remain the only hands-on educational children's museum in North San Diego County, serving children ages 0-10 with interactive exhibits and programs focused on science, technology, reading, engineering, art, and math (STREAM). Our central location in Escondido allows us to serve children and families across San Diego County, as well as West Imperial County, and South Riverside and Orange Counties. Interactive experiences are a crucial element of learning. All exhibits and programs are designed with the help of museum experts, educators, and childhood development specialists, ensuring a wide range of skill development and concepts that align with California’s Common Core curriculum for science, math, English language arts, visual and performing arts, and social science. Time spent at SDCDM develops crucial life skills like curiosity, confidence, and creativity, all qualities that strengthen children’s potential to excel in school, careers, communities, and as parents. We challenge children’s imagination and curiosity through interactive exhibits and hands-on programming. Through play, children have the opportunity for creative problem-solving, critical thinking, and hands-on exploration and experimentation in a safe environment where there are no right or wrong answers.

NAICS: 712
NAICS Definition:
Employees: 32
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/artshousegroup.jpeg
Arts House Group (AHG)
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/san-diego-children's-discovery-museum.jpeg
San Diego Children's Discovery Museum
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Arts House Group (AHG)
100%
Compliance Rate
0/4 Standards Verified
San Diego Children's Discovery Museum
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Museums, Historical Sites, and Zoos Industry Average (This Year)

No incidents recorded for Arts House Group (AHG) in 2025.

Incidents vs Museums, Historical Sites, and Zoos Industry Average (This Year)

No incidents recorded for San Diego Children's Discovery Museum in 2025.

Incident History — Arts House Group (AHG) (X = Date, Y = Severity)

Arts House Group (AHG) cyber incidents detection timeline including parent company and subsidiaries

Incident History — San Diego Children's Discovery Museum (X = Date, Y = Severity)

San Diego Children's Discovery Museum cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/artshousegroup.jpeg
Arts House Group (AHG)
Incidents

No Incident

https://images.rankiteo.com/companyimages/san-diego-children's-discovery-museum.jpeg
San Diego Children's Discovery Museum
Incidents

No Incident

FAQ

Arts House Group (AHG) company demonstrates a stronger AI Cybersecurity Score compared to San Diego Children's Discovery Museum company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Historically, San Diego Children's Discovery Museum company has disclosed a higher number of cyber incidents compared to Arts House Group (AHG) company.

In the current year, San Diego Children's Discovery Museum company and Arts House Group (AHG) company have not reported any cyber incidents.

Neither San Diego Children's Discovery Museum company nor Arts House Group (AHG) company has reported experiencing a ransomware attack publicly.

Neither San Diego Children's Discovery Museum company nor Arts House Group (AHG) company has reported experiencing a data breach publicly.

Neither San Diego Children's Discovery Museum company nor Arts House Group (AHG) company has reported experiencing targeted cyberattacks publicly.

Neither Arts House Group (AHG) company nor San Diego Children's Discovery Museum company has reported experiencing or disclosing vulnerabilities publicly.

Neither Arts House Group (AHG) nor San Diego Children's Discovery Museum holds any compliance certifications.

Neither company holds any compliance certifications.

Neither Arts House Group (AHG) company nor San Diego Children's Discovery Museum company has publicly disclosed detailed information about the number of their subsidiaries.

Arts House Group (AHG) company employs more people globally than San Diego Children's Discovery Museum company, reflecting its scale as a Museums, Historical Sites, and Zoos.

Neither Arts House Group (AHG) nor San Diego Children's Discovery Museum holds SOC 2 Type 1 certification.

Neither Arts House Group (AHG) nor San Diego Children's Discovery Museum holds SOC 2 Type 2 certification.

Neither Arts House Group (AHG) nor San Diego Children's Discovery Museum holds ISO 27001 certification.

Neither Arts House Group (AHG) nor San Diego Children's Discovery Museum holds PCI DSS certification.

Neither Arts House Group (AHG) nor San Diego Children's Discovery Museum holds HIPAA certification.

Neither Arts House Group (AHG) nor San Diego Children's Discovery Museum holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

vLLM is an inference and serving engine for large language models (LLMs). Prior to 0.11.1, vllm has a critical remote code execution vector in a config class named Nemotron_Nano_VL_Config. When vllm loads a model config that contains an auto_map entry, the config class resolves that mapping with get_class_from_dynamic_module(...) and immediately instantiates the returned class. This fetches and executes Python from the remote repository referenced in the auto_map string. Crucially, this happens even when the caller explicitly sets trust_remote_code=False in vllm.transformers_utils.config.get_config. In practice, an attacker can publish a benign-looking frontend repo whose config.json points via auto_map to a separate malicious backend repo; loading the frontend will silently run the backend’s code on the victim host. This vulnerability is fixed in 0.11.1.

Risk Information
cvss3
Base: 7.1
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
Description

fastify-reply-from is a Fastify plugin to forward the current HTTP request to another server. Prior to 12.5.0, by crafting a malicious URL, an attacker could access routes that are not allowed, even though the reply.from is defined for specific routes in @fastify/reply-from. This vulnerability is fixed in 12.5.0.

Risk Information
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to 21.0.2, 20.3.15, and 19.2.17, A Stored Cross-Site Scripting (XSS) vulnerability has been identified in the Angular Template Compiler. It occurs because the compiler's internal security schema is incomplete, allowing attackers to bypass Angular's built-in security sanitization. Specifically, the schema fails to classify certain URL-holding attributes (e.g., those that could contain javascript: URLs) as requiring strict URL security, enabling the injection of malicious scripts. This vulnerability is fixed in 21.0.2, 20.3.15, and 19.2.17.

Risk Information
cvss4
Base: 8.5
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Gin-vue-admin is a backstage management system based on vue and gin. In 2.8.6 and earlier, attackers can delete any file on the server at will, causing damage or unavailability of server resources. Attackers can control the 'FileMd5' parameter to delete any file and folder.

Risk Information
cvss4
Base: 8.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Portkey.ai Gateway is a blazing fast AI Gateway with integrated guardrails. Prior to 1.14.0, the gateway determined the destination baseURL by prioritizing the value in the x-portkey-custom-host request header. The proxy route then appends the client-specified path to perform an external fetch. This can be maliciously used by users for SSRF attacks. This vulnerability is fixed in 1.14.0.

Risk Information
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X