Comparison Overview

Brooklands Museum

VS

Missoula Art Museum

Brooklands Museum

Brooklands Road, Weybridge, GB
Last Update: 2026-01-23

Our mission is ‘to preserve and interpret the heritage of Brooklands, to use that heritage to inspire and educate and to provide a world-class visitor attraction accessible to all.’ In 2011, we adopted the following vision that explains how the Museum wishes to fulfil this mission and make a difference to its community in the next 10 to 15 years: ‘Through inventiveness, expertise and above all, a sense of adventure, Brooklands changed the world. Building on that amazing legacy, we will use those qualities to inspire future generations to shape their world.’ The vision was derived from an examination of Brooklands’ intangible heritage – ‘the Spirit of Brooklands’ - and considering what it would mean to share that spirit with future generations. Our aim is for Brooklands to be ‘best in class’ and an internationally recognised ‘living museum’. By that we mean that the Museum will be a place of activity: we will demonstrate our aircraft and cars by running engines and provide rides on Test Hill and the Banking; we will continue to develop our learning and family activities for all ages, with volunteers who will interact with visitors to ensure that they get the most out of their visits. Our site will be dynamic with constantly developing exhibitions and displays and we will not be afraid to try new things. Brooklands is built on real stories of people with a passion for breaking the mould, their genius and invention, celebrated on the actual tarmac and in the very buildings ‘where it actually happened’. The Museum will continue to be at the forefront of preserving the heritage of Brooklands, both on its own site but also taking a lead and influencing the landowners and stakeholders in the wider Brooklands area. We will strive to be educationally excellent, which we will achieve by instilling traditional museum values of scholarship and research into modern interpretation and continuing to develop our successful schools and college programme.

NAICS: 712
NAICS Definition: Museums, Historical Sites, and Similar Institutions
Employees: 106
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Missoula Art Museum

335 N Pattee St, Missoula, 59802, US
Last Update: 2026-01-22

Mission: MAM serves the public by engaging audiences and artists in the exploration of contemporary art relevant to the community, state and region. Founded in 1975 and accredited by the American Association of Museums since 1987, MAM has always been a flagship institution in culturally savvy Missoula, Montana. After a $5.3 million capital campaign and grand opening in September 2006, MAM offers a spectacular attraction in the heart of the historic downtown: a fully accessible, free, public museum that boasts six exhibition spaces, a library, education center, and an inviting information lounge. The successful building design has seamlessly fused the 100-year-old Carnegie Library building with a contemporary addition, creating the ideal environment for exhibiting, celebrating, and preserving MAM's growing contemporary art collection. MAM's exhibition program is a broad landscape that serves and represents diverse audiences and creative interests. Each year, 20 to 25 solo and group exhibitions rotate through six state-of-the-art galleries. MAM organizes and rents exhibits, develops programs through community partnerships, and welcomes the opportunity to review exhibition proposals. Admission is free every day, thanks to the generosity of MAM members and donors.

NAICS: 712
NAICS Definition: Museums, Historical Sites, and Similar Institutions
Employees: 22
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/brooklands-museum.jpeg
Brooklands Museum
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/missoula-art-museum.jpeg
Missoula Art Museum
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Brooklands Museum
100%
Compliance Rate
0/4 Standards Verified
Missoula Art Museum
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Museums, Historical Sites, and Zoos Industry Average (This Year)

No incidents recorded for Brooklands Museum in 2026.

Incidents vs Museums, Historical Sites, and Zoos Industry Average (This Year)

No incidents recorded for Missoula Art Museum in 2026.

Incident History — Brooklands Museum (X = Date, Y = Severity)

Brooklands Museum cyber incidents detection timeline including parent company and subsidiaries

Incident History — Missoula Art Museum (X = Date, Y = Severity)

Missoula Art Museum cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/brooklands-museum.jpeg
Brooklands Museum
Incidents

No Incident

https://images.rankiteo.com/companyimages/missoula-art-museum.jpeg
Missoula Art Museum
Incidents

No Incident

FAQ

Both Brooklands Museum company and Missoula Art Museum company demonstrate a comparable AI Cybersecurity Score, with strong governance and monitoring frameworks in place.

Historically, Missoula Art Museum company has disclosed a higher number of cyber incidents compared to Brooklands Museum company.

In the current year, Missoula Art Museum company and Brooklands Museum company have not reported any cyber incidents.

Neither Missoula Art Museum company nor Brooklands Museum company has reported experiencing a ransomware attack publicly.

Neither Missoula Art Museum company nor Brooklands Museum company has reported experiencing a data breach publicly.

Neither Missoula Art Museum company nor Brooklands Museum company has reported experiencing targeted cyberattacks publicly.

Neither Brooklands Museum company nor Missoula Art Museum company has reported experiencing or disclosing vulnerabilities publicly.

Neither Brooklands Museum nor Missoula Art Museum holds any compliance certifications.

Neither company holds any compliance certifications.

Neither Brooklands Museum company nor Missoula Art Museum company has publicly disclosed detailed information about the number of their subsidiaries.

Brooklands Museum company employs more people globally than Missoula Art Museum company, reflecting its scale as a Museums, Historical Sites, and Zoos.

Neither Brooklands Museum nor Missoula Art Museum holds SOC 2 Type 1 certification.

Neither Brooklands Museum nor Missoula Art Museum holds SOC 2 Type 2 certification.

Neither Brooklands Museum nor Missoula Art Museum holds ISO 27001 certification.

Neither Brooklands Museum nor Missoula Art Museum holds PCI DSS certification.

Neither Brooklands Museum nor Missoula Art Museum holds HIPAA certification.

Neither Brooklands Museum nor Missoula Art Museum holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

Typemill is a flat-file, Markdown-based CMS designed for informational documentation websites. A reflected Cross-Site Scripting (XSS) exists in the login error view template `login.twig` of versions 2.19.1 and below. The `username` value can be echoed back without proper contextual encoding when authentication fails. An attacker can execute script in the login page context. This issue has been fixed in version 2.19.2.

Risk Information
cvss3
Base: 5.4
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
Description

A DOM-based Cross-Site Scripting (XSS) vulnerability exists in the DomainCheckerApp class within domain/script.js of Sourcecodester Domain Availability Checker v1.0. The vulnerability occurs because the application improperly handles user-supplied data in the createResultElement method by using the unsafe innerHTML property to render domain search results.

Description

A Remote Code Execution (RCE) vulnerability exists in Sourcecodester Modern Image Gallery App v1.0 within the gallery/upload.php component. The application fails to properly validate uploaded file contents. Additionally, the application preserves the user-supplied file extension during the save process. This allows an unauthenticated attacker to upload arbitrary PHP code by spoofing the MIME type as an image, leading to full system compromise.

Description

A UNIX symbolic link following issue in the jailer component in Firecracker version v1.13.1 and earlier and 1.14.0 on Linux may allow a local host user with write access to the pre-created jailer directories to overwrite arbitrary host files via a symlink attack during the initialization copy at jailer startup, if the jailer is executed with root privileges. To mitigate this issue, users should upgrade to version v1.13.2 or 1.14.1 or above.

Risk Information
cvss3
Base: 6.0
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
cvss4
Base: 6.0
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

An information disclosure vulnerability exists in the /srvs/membersrv/getCashiers endpoint of the Aptsys gemscms backend platform thru 2025-05-28. This unauthenticated endpoint returns a list of cashier accounts, including names, email addresses, usernames, and passwords hashed using MD5. As MD5 is a broken cryptographic function, the hashes can be easily reversed using public tools, exposing user credentials in plaintext. This allows remote attackers to perform unauthorized logins and potentially gain access to sensitive POS operations or backend functions.