Company Details
cantor-gaming
72
1,471
713
cgtglobal.com
0
CG _7264859
In-progress

CG Technology Company CyberSecurity Posture
cgtglobal.comAbout CG Technology™ CG Technology, formerly known as Cantor Gaming, is a preeminent technology company providing innovative technological products serving the worldwide gaming industry. CG Technology provides private networks, systems, operations, management services, system licensing, and hardware and software design and development. In addition, CG Technology develops casino games with web hosting platforms for casinos. As the first company licensed by the Nevada Gaming Commission to manufacture, distribute and operate a mobile gaming system in the state, it is also a leader in providing mobile gaming technology for casino-style games, and mobile sports wagering technology in the state of Nevada and internationally, via Android™ and Apple® compatible applications, as well as comprehensive account-based systems for race and sports books. Outside of the U.S., CG Technology has licensed its sophisticated mobile gaming and race book and sports pool systems, as well as risk management consulting services, to Atlantis, Paradise Island in the Bahamas. In addition, CG Technology has an agreement with Celebrity Cruises to offer its innovative mobile gaming technology on a selection of high-end Celebrity Cruises ships, marking the first time the cruise industry has offered customers a mobile casino gaming application. CG Technology is passionate about applying best-in-class technology to offer customers a unique, innovative and memorable gaming experience.
Company Details
cantor-gaming
72
1,471
713
cgtglobal.com
0
CG _7264859
In-progress
Between 750 and 799

CG Technology Global Score (TPRM)XXXX



No incidents recorded for CG Technology in 2025.
No incidents recorded for CG Technology in 2025.
No incidents recorded for CG Technology in 2025.
CG Technology cyber incidents detection timeline including parent company and subsidiaries

About CG Technology™ CG Technology, formerly known as Cantor Gaming, is a preeminent technology company providing innovative technological products serving the worldwide gaming industry. CG Technology provides private networks, systems, operations, management services, system licensing, and hardware and software design and development. In addition, CG Technology develops casino games with web hosting platforms for casinos. As the first company licensed by the Nevada Gaming Commission to manufacture, distribute and operate a mobile gaming system in the state, it is also a leader in providing mobile gaming technology for casino-style games, and mobile sports wagering technology in the state of Nevada and internationally, via Android™ and Apple® compatible applications, as well as comprehensive account-based systems for race and sports books. Outside of the U.S., CG Technology has licensed its sophisticated mobile gaming and race book and sports pool systems, as well as risk management consulting services, to Atlantis, Paradise Island in the Bahamas. In addition, CG Technology has an agreement with Celebrity Cruises to offer its innovative mobile gaming technology on a selection of high-end Celebrity Cruises ships, marking the first time the cruise industry has offered customers a mobile casino gaming application. CG Technology is passionate about applying best-in-class technology to offer customers a unique, innovative and memorable gaming experience.


Native Gaming (NativeGaming.io) is an ambitious new online casino that allows players to "Be the House" by directly taking a stake in the bankroll. Stakeholders receive Gross Gaming Revenue generated by 5,000+ Casino Games from over 70 game providers, including Evolution Gaming, Netent, Play'n GO an

Founded in 2015 our vision is to be a leading international gaming company, underpinned by superior talent and technology. We operate a multi-branded strategy, using a combination of proprietary and licensed software to provide online bingo and slot gaming and a social gaming mobile application.

Casino City Press specializes in the publication of current and comprehensive information on the gaming industry. Our dedicated research team investigates every aspect of the industry, and a strong technical focus allows us to present our data through interactive online applications that make it eas

One seamless integration. 16,000+ games. Alea is a pure game aggregator. We help casino operators connect to 160+ providers through one secure API; no platforms, no white labels, and no lock-in. We started out as operators, so we’ve felt the pain of clunky integrations, patchy support, and endless

BVGroup is an online gambling operator and B2B technology solutions provider. We are known for our pioneering ethos. We are one of the few gambling companies to have our own in-house product and the first gaming company to use LED steeplechase advertising in horseracing. We also gave away £1 million

An incomparable gaming, dining and entertainment experience awaits you at the Grand Villa Casino. And you’ll receive a welcome that befits our Guest of Honour at the Lower Mainland’s newest and largest gaming facility. Lose yourself in a soothing atmosphere created by rustic, golden hues and the maj
.png)
Cybersecurity company Axonius Inc. has found its first general counsel in a veteran legal leader who has worked at software and technology...
Sanam Saaber is taking the legal reins of Axonius, a threat detection and mitigation platform that has raised $865 million.
ABB has launched the GCP100 gas chromatograph, setting a new standard in cybersecurity and real-time analysis of complex gas mixtures in the...
As 2025 unfolds, the technology sector stands at a pivotal crossroads.
New guidance from the UK's National Cyber Security Centre (NCSC) aimed at helping companies map their technology environment represents a...
Discover how cyber games are revolutionizing education, making learning fun and engaging. Explore the top games teaching cybersecurity...
On September 30, 2025, the Department of Justice (DOJ) announced that Georgia Tech Research Corporation (GTRC) agreed to pay $875000 to settle allegations...
The GCP100 is the first gas chromatograph with built-in cybersecurity on the market; It sets a new standard in cybersecurity and real-time...
Today's forum is a great step toward a better understanding of AI, its role in the financial industry, and how to think about security and cybersecurity risks.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of CG Technology is http://www.cgtglobal.com.
According to Rankiteo, CG Technology’s AI-generated cybersecurity score is 765, reflecting their Fair security posture.
According to Rankiteo, CG Technology currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, CG Technology is not certified under SOC 2 Type 1.
According to Rankiteo, CG Technology does not hold a SOC 2 Type 2 certification.
According to Rankiteo, CG Technology is not listed as GDPR compliant.
According to Rankiteo, CG Technology does not currently maintain PCI DSS compliance.
According to Rankiteo, CG Technology is not compliant with HIPAA regulations.
According to Rankiteo,CG Technology is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
CG Technology operates primarily in the Gambling Facilities and Casinos industry.
CG Technology employs approximately 72 people worldwide.
CG Technology presently has no subsidiaries across any sectors.
CG Technology’s official LinkedIn profile has approximately 1,471 followers.
No, CG Technology does not have a profile on Crunchbase.
Yes, CG Technology maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/cantor-gaming.
As of November 28, 2025, Rankiteo reports that CG Technology has not experienced any cybersecurity incidents.
CG Technology has an estimated 896 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, CG Technology has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to versions 19.2.16, 20.3.14, and 21.0.1, there is a XSRF token leakage via protocol-relative URLs in angular HTTP clients. The vulnerability is a Credential Leak by App Logic that leads to the unauthorized disclosure of the Cross-Site Request Forgery (XSRF) token to an attacker-controlled domain. Angular's HttpClient has a built-in XSRF protection mechanism that works by checking if a request URL starts with a protocol (http:// or https://) to determine if it is cross-origin. If the URL starts with protocol-relative URL (//), it is incorrectly treated as a same-origin request, and the XSRF token is automatically added to the X-XSRF-TOKEN header. This issue has been patched in versions 19.2.16, 20.3.14, and 21.0.1. A workaround for this issue involves avoiding using protocol-relative URLs (URLs starting with //) in HttpClient requests. All backend communication URLs should be hardcoded as relative paths (starting with a single /) or fully qualified, trusted absolute URLs.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Uncontrolled Recursion vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs. This issue has been patched in version 1.3.2.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Integer Overflow vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures containing OIDs with oversized arcs. These arcs may be decoded as smaller, trusted OIDs due to 32-bit bitwise truncation, enabling the bypass of downstream OID-based security decisions. This issue has been patched in version 1.3.2.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, working with large buffers in Lua scripts can lead to a stack overflow. Users of Lua rules and output scripts may be affected when working with large buffers. This includes a rule passing a large buffer to a Lua script. This issue has been patched in versions 7.0.13 and 8.0.2. A workaround for this issue involves disabling Lua rules and output scripts, or making sure limits, such as stream.depth.reassembly and HTTP response body limits (response-body-limit), are set to less than half the stack size.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. In versions from 8.0.0 to before 8.0.2, a NULL dereference can occur when the entropy keyword is used in conjunction with base64_data. This issue has been patched in version 8.0.2. A workaround involves disabling rules that use entropy in conjunction with base64_data.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.