Comparison Overview

Augusta Players Inc

VS

ANIKAYA Dance Theater

Augusta Players Inc

1301 Greene St, Augusta, Georgia 30901-1031, US
Last Update: 2025-12-09

The Augusta Players is an award-winning non-profit theatre organization dedicated to presenting the highest quality musical theatre productions. Serving the City of Augusta and its surrounding counties, our mission is to foster creative expression by providing a medium for local actors, musicians, dancers, directors, designers, and technicians to explore their talents. Central to our focus is the purpose of creating an artistic environment that attracts and excites diverse members of the community to draw new audience members, participants and volunteers, through the art of quality theatre. Through MainStage productions, community outreach, and special programming for children and youth, we exist to enrich the cultural lives of our populace and teach theatre performance skills to any and all volunteers. We are committed to providing a positive outlet for cultural and artistic expression to all. The Augusta Players has been Augusta’s premier theatre company since 1945. As the oldest and certainly among the finest performing arts groups in Augusta, the Augusta Players has become a cultural fixture in the community. Over the years, the organization has experienced remarkable growth. That continued growth has been due in no small part to members of our community who believe that quality performing arts are essential to a thriving society. The Augusta Players’ programming provides an environment where all citizens can create, experience and appreciate theatre as well as create the cultural infrastructure that allows the community of Augusta to flourish.

NAICS: 711
NAICS Definition:
Employees: 11
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

ANIKAYA Dance Theater

Somerville, MA, US
Last Update: 2025-12-09
Between 750 and 799

ANIKAYA Dance Theater was founded in 2003 by choreographer Wendy Jehlen. Our work has so far extended to the US, Benin, Brazil, Botswana, Burkina Faso, Canada, China, France, Haiti, India, Japan, Korea, Mali, Mexico, Mozambique, Palestine, Rwanda, South Africa, and Turkey. ANIKAYA’s mission is to break down the perceived boundaries between people, cultures and art forms. ANIKAYA’s work falls into two symbiotic, porous categories – performance and community engagement. Both come back to one essential change catalyst – kinesthetic empathy. Our work questions the boundaries that we imagine between ourselves, and seeks to break down these imagined walls through an embodied practice of radical empathy. ANIKAYA weaves together music, dance, visual art, new media and storytelling to create work that is resonant of deep-rooted traditions, without being bound to any one genre, place or practice. ANIKAYA engages in the authentic representation of reality. We are an artist-run organization and all of our projects are created by and for people of all genders and gender presentations, people of color from the US and around the world, LGBTQIA people, people with disabilities and people who create bodies that are socially-constructed as disabled.

NAICS: 7111
NAICS Definition: Performing Arts Companies
Employees: 3
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/augusta-players-inc.jpeg
Augusta Players Inc
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/anikaya-dance-theater.jpeg
ANIKAYA Dance Theater
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Augusta Players Inc
100%
Compliance Rate
0/4 Standards Verified
ANIKAYA Dance Theater
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Performing Arts Industry Average (This Year)

No incidents recorded for Augusta Players Inc in 2025.

Incidents vs Performing Arts Industry Average (This Year)

No incidents recorded for ANIKAYA Dance Theater in 2025.

Incident History — Augusta Players Inc (X = Date, Y = Severity)

Augusta Players Inc cyber incidents detection timeline including parent company and subsidiaries

Incident History — ANIKAYA Dance Theater (X = Date, Y = Severity)

ANIKAYA Dance Theater cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/augusta-players-inc.jpeg
Augusta Players Inc
Incidents

No Incident

https://images.rankiteo.com/companyimages/anikaya-dance-theater.jpeg
ANIKAYA Dance Theater
Incidents

No Incident

FAQ

Augusta Players Inc company demonstrates a stronger AI Cybersecurity Score compared to ANIKAYA Dance Theater company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Historically, ANIKAYA Dance Theater company has disclosed a higher number of cyber incidents compared to Augusta Players Inc company.

In the current year, ANIKAYA Dance Theater company and Augusta Players Inc company have not reported any cyber incidents.

Neither ANIKAYA Dance Theater company nor Augusta Players Inc company has reported experiencing a ransomware attack publicly.

Neither ANIKAYA Dance Theater company nor Augusta Players Inc company has reported experiencing a data breach publicly.

Neither ANIKAYA Dance Theater company nor Augusta Players Inc company has reported experiencing targeted cyberattacks publicly.

Neither Augusta Players Inc company nor ANIKAYA Dance Theater company has reported experiencing or disclosing vulnerabilities publicly.

Neither Augusta Players Inc nor ANIKAYA Dance Theater holds any compliance certifications.

Neither company holds any compliance certifications.

Neither Augusta Players Inc company nor ANIKAYA Dance Theater company has publicly disclosed detailed information about the number of their subsidiaries.

Augusta Players Inc company employs more people globally than ANIKAYA Dance Theater company, reflecting its scale as a Performing Arts.

Neither Augusta Players Inc nor ANIKAYA Dance Theater holds SOC 2 Type 1 certification.

Neither Augusta Players Inc nor ANIKAYA Dance Theater holds SOC 2 Type 2 certification.

Neither Augusta Players Inc nor ANIKAYA Dance Theater holds ISO 27001 certification.

Neither Augusta Players Inc nor ANIKAYA Dance Theater holds PCI DSS certification.

Neither Augusta Players Inc nor ANIKAYA Dance Theater holds HIPAA certification.

Neither Augusta Players Inc nor ANIKAYA Dance Theater holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

NXLog Agent before 6.11 can load a file specified by the OPENSSL_CONF environment variable.

Risk Information
cvss3
Base: 8.1
Severity: HIGH
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
Description

uriparser through 0.9.9 allows unbounded recursion and stack consumption, as demonstrated by ParseMustBeSegmentNzNc with large input containing many commas.

Risk Information
cvss3
Base: 2.9
Severity: HIGH
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
Description

A vulnerability was detected in Mayan EDMS up to 4.10.1. The affected element is an unknown function of the file /authentication/. The manipulation results in cross site scripting. The attack may be performed from remote. The exploit is now public and may be used. Upgrading to version 4.10.2 is sufficient to fix this issue. You should upgrade the affected component. The vendor confirms that this is "[f]ixed in version 4.10.2". Furthermore, that "[b]ackports for older versions in process and will be out as soon as their respective CI pipelines complete."

Risk Information
cvss2
Base: 5.0
Severity: LOW
AV:N/AC:L/Au:N/C:N/I:P/A:N
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

MJML through 4.18.0 allows mj-include directory traversal to test file existence and (in the type="css" case) read files. NOTE: this issue exists because of an incomplete fix for CVE-2020-12827.

Risk Information
cvss3
Base: 4.5
Severity: HIGH
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:L
Description

A half-blind Server Side Request Forgery (SSRF) vulnerability exists in kube-controller-manager when using the in-tree Portworx StorageClass. This vulnerability allows authorized users to leak arbitrary information from unprotected endpoints in the control plane’s host network (including link-local or loopback services).

Risk Information
cvss3
Base: 5.8
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N