Comparison Overview

California Academy of Sciences

VS

Weeksville Heritage Center

California Academy of Sciences

55 Music Concourse Dr., San Francisco, CA, 94118, US
Last Update: 2025-12-02
Between 750 and 799

The California Academy of Sciences is a renowned scientific and educational institution dedicated to regenerating the natural world. Based in San Francisco’s Golden Gate Park, it's the only place in the world to house an aquarium, planetarium, and natural history museum—as well as innovative programs in scientific research and education—all under one living roof. To find out more about our opportunities, visit our Careers page at calacademy.org/careers, or simply follow us here. The Academy is committed to cultivating a culturally inclusive environment where diversity of thought and expression are valued, respected, appreciated and celebrated. We believe in creating a culture where all individuals feel respected, are treated fairly, provided work-life balance, and have an opportunity to excel.

NAICS: 712
NAICS Definition: Museums, Historical Sites, and Similar Institutions
Employees: 756
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Weeksville Heritage Center

158 Buffalo Avenue, Brooklyn, New York, 11213, US
Last Update: 2025-11-28

MISSION: To document, preserve and interpret the history of free African American communities in Weeksville, Brooklyn and beyond and to create and inspire innovative, contemporary uses of African American history through education, the arts, and civic engagement. TODAY Weeksville Heritage Center (WHC) is a multidimensional museum dedicated to preserving the history of the 19th century African American community of Weeksville, Brooklyn. Using a contemporary lens, we activate this unique history through the presentation of innovative, vanguard and experimental programs. Weeksville advances its mission through history, preservation, visual and performing arts, ecology and the built environment. YESTERDAY During the 19th century the village of Weeksville was a vibrant and independent free African American community. It also was one of the first free African-American communities in the country. The settlement is named for African American, James Weeks, who was among a group of African American investors who acquired the property in 1838 to create an intentional land-owning community just 11 years after slavery was abolished in New York. WHC is the steward for three remaining historic houses, which date to the 19th century, and are located on historic Hunterfly Road representing the few remaining domestic structures of Weeksville. WHC emphasizes Weeksville’s history of sanctuary, refuge, independence, self-sufficiency, self-determination, activism and their contemporary relevance. TOMORROW In October 2009 Weeksville broke ground to construct a new 19,000 square foot Education and Cultural Arts Building, set to open to the public in 2014. With this new building comes an unprecedented opportunity for expanded research, education and programming. The new building will see Weeksville become one of the country’s largest African American cultural institutions creating vast national and international impact.

NAICS: 712
NAICS Definition:
Employees: 21
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/california-academy-of-sciences.jpeg
California Academy of Sciences
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/weeksville-heritage-center.jpeg
Weeksville Heritage Center
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
California Academy of Sciences
100%
Compliance Rate
0/4 Standards Verified
Weeksville Heritage Center
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Museums, Historical Sites, and Zoos Industry Average (This Year)

No incidents recorded for California Academy of Sciences in 2025.

Incidents vs Museums, Historical Sites, and Zoos Industry Average (This Year)

No incidents recorded for Weeksville Heritage Center in 2025.

Incident History — California Academy of Sciences (X = Date, Y = Severity)

California Academy of Sciences cyber incidents detection timeline including parent company and subsidiaries

Incident History — Weeksville Heritage Center (X = Date, Y = Severity)

Weeksville Heritage Center cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/california-academy-of-sciences.jpeg
California Academy of Sciences
Incidents

No Incident

https://images.rankiteo.com/companyimages/weeksville-heritage-center.jpeg
Weeksville Heritage Center
Incidents

No Incident

FAQ

California Academy of Sciences company demonstrates a stronger AI Cybersecurity Score compared to Weeksville Heritage Center company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Historically, Weeksville Heritage Center company has disclosed a higher number of cyber incidents compared to California Academy of Sciences company.

In the current year, Weeksville Heritage Center company and California Academy of Sciences company have not reported any cyber incidents.

Neither Weeksville Heritage Center company nor California Academy of Sciences company has reported experiencing a ransomware attack publicly.

Neither Weeksville Heritage Center company nor California Academy of Sciences company has reported experiencing a data breach publicly.

Neither Weeksville Heritage Center company nor California Academy of Sciences company has reported experiencing targeted cyberattacks publicly.

Neither California Academy of Sciences company nor Weeksville Heritage Center company has reported experiencing or disclosing vulnerabilities publicly.

Neither California Academy of Sciences nor Weeksville Heritage Center holds any compliance certifications.

Neither company holds any compliance certifications.

Neither California Academy of Sciences company nor Weeksville Heritage Center company has publicly disclosed detailed information about the number of their subsidiaries.

California Academy of Sciences company employs more people globally than Weeksville Heritage Center company, reflecting its scale as a Museums, Historical Sites, and Zoos.

Neither California Academy of Sciences nor Weeksville Heritage Center holds SOC 2 Type 1 certification.

Neither California Academy of Sciences nor Weeksville Heritage Center holds SOC 2 Type 2 certification.

Neither California Academy of Sciences nor Weeksville Heritage Center holds ISO 27001 certification.

Neither California Academy of Sciences nor Weeksville Heritage Center holds PCI DSS certification.

Neither California Academy of Sciences nor Weeksville Heritage Center holds HIPAA certification.

Neither California Academy of Sciences nor Weeksville Heritage Center holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

vLLM is an inference and serving engine for large language models (LLMs). Prior to 0.11.1, vllm has a critical remote code execution vector in a config class named Nemotron_Nano_VL_Config. When vllm loads a model config that contains an auto_map entry, the config class resolves that mapping with get_class_from_dynamic_module(...) and immediately instantiates the returned class. This fetches and executes Python from the remote repository referenced in the auto_map string. Crucially, this happens even when the caller explicitly sets trust_remote_code=False in vllm.transformers_utils.config.get_config. In practice, an attacker can publish a benign-looking frontend repo whose config.json points via auto_map to a separate malicious backend repo; loading the frontend will silently run the backend’s code on the victim host. This vulnerability is fixed in 0.11.1.

Risk Information
cvss3
Base: 7.1
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
Description

fastify-reply-from is a Fastify plugin to forward the current HTTP request to another server. Prior to 12.5.0, by crafting a malicious URL, an attacker could access routes that are not allowed, even though the reply.from is defined for specific routes in @fastify/reply-from. This vulnerability is fixed in 12.5.0.

Risk Information
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to 21.0.2, 20.3.15, and 19.2.17, A Stored Cross-Site Scripting (XSS) vulnerability has been identified in the Angular Template Compiler. It occurs because the compiler's internal security schema is incomplete, allowing attackers to bypass Angular's built-in security sanitization. Specifically, the schema fails to classify certain URL-holding attributes (e.g., those that could contain javascript: URLs) as requiring strict URL security, enabling the injection of malicious scripts. This vulnerability is fixed in 21.0.2, 20.3.15, and 19.2.17.

Risk Information
cvss4
Base: 8.5
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Gin-vue-admin is a backstage management system based on vue and gin. In 2.8.6 and earlier, attackers can delete any file on the server at will, causing damage or unavailability of server resources. Attackers can control the 'FileMd5' parameter to delete any file and folder.

Risk Information
cvss4
Base: 8.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Portkey.ai Gateway is a blazing fast AI Gateway with integrated guardrails. Prior to 1.14.0, the gateway determined the destination baseURL by prioritizing the value in the x-portkey-custom-host request header. The proxy route then appends the client-specified path to perform an external fetch. This can be maliciously used by users for SSRF attacks. This vulnerability is fixed in 1.14.0.

Risk Information
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X