Comparison Overview

Association of Directory Publishers

VS

Teacher ACER

Association of Directory Publishers

PO Box Q, Lake City, MI, 49651, US
Last Update: 2025-11-21
Between 750 and 799

The Association of Directory Publishers (ADP) is an international trade association serving the directory publishing industry since 1898. ADP membership includes online and print publishers, app developers and designers, advertising agencies and suppliers to the online, mobile and print publishing industry. The directory publishing industry is the original "local search engine," widely known as the medium that brings buyers to sellers at the exact moment they are ready to buy. As this ever-evolving world of "search" expands, whether it is print, online, social networks or mobile devices, ADP will continue to be at the forefront to assist its members in connecting buyers to sellers.

NAICS: 511
NAICS Definition: Publishing Industries (except Internet)
Employees: 5
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Teacher ACER

Melbourne, AU
Last Update: 2025-11-21

Teacher is proud to promote quality teaching and leading, assisting school improvement at a grassroots level. We are dedicated to helping teachers, principals and school staff improve their skills and practices using evidence-based approaches. The publication supports educators by providing timely, high quality, independent content that draws on the wealth of knowledge and expertise that exists within the education community, nationally and internationally. Research shows that high-quality teaching and leadership teams learn from each other's practices, which is why the publication gives individuals a strong voice and a platform to share and collaborate. We encourage article contributions from school staff - whatever their role, sector or location. See less

NAICS: 511
NAICS Definition: Publishing Industries (except Internet)
Employees: None
Subsidiaries: 5
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/association-of-directory-publishers.jpeg
Association of Directory Publishers
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/teacher-acer.jpeg
Teacher ACER
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Association of Directory Publishers
100%
Compliance Rate
0/4 Standards Verified
Teacher ACER
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Book and Periodical Publishing Industry Average (This Year)

No incidents recorded for Association of Directory Publishers in 2025.

Incidents vs Book and Periodical Publishing Industry Average (This Year)

No incidents recorded for Teacher ACER in 2025.

Incident History — Association of Directory Publishers (X = Date, Y = Severity)

Association of Directory Publishers cyber incidents detection timeline including parent company and subsidiaries

Incident History — Teacher ACER (X = Date, Y = Severity)

Teacher ACER cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/association-of-directory-publishers.jpeg
Association of Directory Publishers
Incidents

No Incident

https://images.rankiteo.com/companyimages/teacher-acer.jpeg
Teacher ACER
Incidents

No Incident

FAQ

Teacher ACER company demonstrates a stronger AI Cybersecurity Score compared to Association of Directory Publishers company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Historically, Teacher ACER company has disclosed a higher number of cyber incidents compared to Association of Directory Publishers company.

In the current year, Teacher ACER company and Association of Directory Publishers company have not reported any cyber incidents.

Neither Teacher ACER company nor Association of Directory Publishers company has reported experiencing a ransomware attack publicly.

Neither Teacher ACER company nor Association of Directory Publishers company has reported experiencing a data breach publicly.

Neither Teacher ACER company nor Association of Directory Publishers company has reported experiencing targeted cyberattacks publicly.

Neither Association of Directory Publishers company nor Teacher ACER company has reported experiencing or disclosing vulnerabilities publicly.

Neither Association of Directory Publishers nor Teacher ACER holds any compliance certifications.

Neither company holds any compliance certifications.

Teacher ACER company has more subsidiaries worldwide compared to Association of Directory Publishers company.

Neither Association of Directory Publishers nor Teacher ACER holds SOC 2 Type 1 certification.

Neither Association of Directory Publishers nor Teacher ACER holds SOC 2 Type 2 certification.

Neither Association of Directory Publishers nor Teacher ACER holds ISO 27001 certification.

Neither Association of Directory Publishers nor Teacher ACER holds PCI DSS certification.

Neither Association of Directory Publishers nor Teacher ACER holds HIPAA certification.

Neither Association of Directory Publishers nor Teacher ACER holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

ThingsBoard in versions prior to v4.2.1 allows an authenticated user to upload malicious SVG images via the "Image Gallery", leading to a Stored Cross-Site Scripting (XSS) vulnerability. The exploit can be triggered when any user accesses the public API endpoint of the malicious SVG images, or if the malicious images are embedded in an `iframe` element, during a widget creation, deployed to any page of the platform (e.g., dashboards), and accessed during normal operations. The vulnerability resides in the `ImageController`, which fails to restrict the execution of JavaScript code when an image is loaded by the user's browser. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions.

Risk Information
cvss4
Base: 6.2
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:H/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).

Risk Information
cvss3
Base: 9.9
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Description

Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to sanitize team email addresses to be visible only to Team Admins, which allows any authenticated user to view team email addresses via the GET /api/v4/channels/{channel_id}/common_teams endpoint

Risk Information
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Description

Exposure of email service credentials to users without administrative rights in Devolutions Server.This issue affects Devolutions Server: before 2025.2.21, before 2025.3.9.

Description

Exposure of credentials in unintended requests in Devolutions Server.This issue affects Server: through 2025.2.20, through 2025.3.8.