Comparison Overview

CAYO

VS

Tacoma Musical Playhouse

CAYO

3700 36th Ave S, None, Minneapolis, MN, US, 55406
Last Update: 2025-12-09
Between 750 and 799

CAYO is a national non-profit 501(c)3 organization headquartered in Minneapolis, MN that connects the people of the US and Cuba through music. From one-on-one lessons and chamber music collaborations, to online videos, to a full-scale orchestra of students from across the US and Cuba, music is the medium through which we build the US-Cuba relationship for students, teachers and audiences. CAYO uses music to build a stronger world. Our mission is to support, educate and empower students, teachers and audiences in the US and Cuba. Our meeting ground can be as simple as one tuning A shared between strangers. Our priority is to provide equal input and impact for each side. CAYO Student Ambassador Program is a cultural exchange program for a small cohort of student musicians from the US and Cuba. Student Ambassadors and teaching artists travel between the US and Cuba 3-4 times a year and impact between 150-200 US and Cuban student musicians annually. CAYO’s roster of teaching artists, largely drawn from the Minnesota Orchestra, volunteer their time in Cuba-based workshops in schools such as Havana’s Escuela Nacional de Arte (ENA), Instituto Superior de Arte (ISA) and Conservatorio Amadeo Roldán. During the course of the exchange, they present to elementary, middle and senior high schools with an emphasis on reaching Spanish-speaking learners in our urban centers. Cuban teaching artists make up an important part of our “equal exchange” philosophy, and US students benefit from the different perspectives and playing style of musicians on the island. Our Cuban and US teaching artists teach side-by-side, overcoming language and cultural barriers via the universal language of music. Connections formed through these experiences endure long after the conclusion of the activities, lay the foundation for trust and friendship, and yield new ideas about creative expression.

NAICS: 7111
NAICS Definition: Performing Arts Companies
Employees: 10
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Tacoma Musical Playhouse

7116 Sixth Avenue, Tacoma, WA, 98406, US
Last Update: 2025-12-10
Between 750 and 799

TMP’s mission is “Enriching lives through the art form of musical theater.” We believe that people’s lives are enriched by high-quality entertainment. Sometimes that entertainment challenges people to think about life issues; other times it offers opportunities for hilarity; and still other times it offers moments for tears. In all cases, however, the experiences move people’s emotions and take them to a new place in their thinking. TMP is enriching people this 2014 - 2015 season with productions of Shrek The Musical, A Little Princess, The 25th Annual Putnam County Spelling Bee, Evita, BUDDY The Buddy Holly Story and West Side Story. We are committed to providing our patrons with a wide variety of musical theater selections that will touch them emotionally.

NAICS: 711
NAICS Definition:
Employees: 16
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/cayomusic.jpeg
CAYO
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/tacoma-musical-playhouse.jpeg
Tacoma Musical Playhouse
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
CAYO
100%
Compliance Rate
0/4 Standards Verified
Tacoma Musical Playhouse
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Performing Arts Industry Average (This Year)

No incidents recorded for CAYO in 2025.

Incidents vs Performing Arts Industry Average (This Year)

No incidents recorded for Tacoma Musical Playhouse in 2025.

Incident History — CAYO (X = Date, Y = Severity)

CAYO cyber incidents detection timeline including parent company and subsidiaries

Incident History — Tacoma Musical Playhouse (X = Date, Y = Severity)

Tacoma Musical Playhouse cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/cayomusic.jpeg
CAYO
Incidents

No Incident

https://images.rankiteo.com/companyimages/tacoma-musical-playhouse.jpeg
Tacoma Musical Playhouse
Incidents

No Incident

FAQ

Both CAYO company and Tacoma Musical Playhouse company demonstrate a comparable AI Cybersecurity Score, with strong governance and monitoring frameworks in place.

Historically, Tacoma Musical Playhouse company has disclosed a higher number of cyber incidents compared to CAYO company.

In the current year, Tacoma Musical Playhouse company and CAYO company have not reported any cyber incidents.

Neither Tacoma Musical Playhouse company nor CAYO company has reported experiencing a ransomware attack publicly.

Neither Tacoma Musical Playhouse company nor CAYO company has reported experiencing a data breach publicly.

Neither Tacoma Musical Playhouse company nor CAYO company has reported experiencing targeted cyberattacks publicly.

Neither CAYO company nor Tacoma Musical Playhouse company has reported experiencing or disclosing vulnerabilities publicly.

Neither CAYO nor Tacoma Musical Playhouse holds any compliance certifications.

Neither company holds any compliance certifications.

Neither CAYO company nor Tacoma Musical Playhouse company has publicly disclosed detailed information about the number of their subsidiaries.

Tacoma Musical Playhouse company employs more people globally than CAYO company, reflecting its scale as a Performing Arts.

Neither CAYO nor Tacoma Musical Playhouse holds SOC 2 Type 1 certification.

Neither CAYO nor Tacoma Musical Playhouse holds SOC 2 Type 2 certification.

Neither CAYO nor Tacoma Musical Playhouse holds ISO 27001 certification.

Neither CAYO nor Tacoma Musical Playhouse holds PCI DSS certification.

Neither CAYO nor Tacoma Musical Playhouse holds HIPAA certification.

Neither CAYO nor Tacoma Musical Playhouse holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

NXLog Agent before 6.11 can load a file specified by the OPENSSL_CONF environment variable.

Risk Information
cvss3
Base: 8.1
Severity: HIGH
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
Description

uriparser through 0.9.9 allows unbounded recursion and stack consumption, as demonstrated by ParseMustBeSegmentNzNc with large input containing many commas.

Risk Information
cvss3
Base: 2.9
Severity: HIGH
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
Description

A vulnerability was detected in Mayan EDMS up to 4.10.1. The affected element is an unknown function of the file /authentication/. The manipulation results in cross site scripting. The attack may be performed from remote. The exploit is now public and may be used. Upgrading to version 4.10.2 is sufficient to fix this issue. You should upgrade the affected component. The vendor confirms that this is "[f]ixed in version 4.10.2". Furthermore, that "[b]ackports for older versions in process and will be out as soon as their respective CI pipelines complete."

Risk Information
cvss2
Base: 5.0
Severity: LOW
AV:N/AC:L/Au:N/C:N/I:P/A:N
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

MJML through 4.18.0 allows mj-include directory traversal to test file existence and (in the type="css" case) read files. NOTE: this issue exists because of an incomplete fix for CVE-2020-12827.

Risk Information
cvss3
Base: 4.5
Severity: HIGH
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:L
Description

A half-blind Server Side Request Forgery (SSRF) vulnerability exists in kube-controller-manager when using the in-tree Portworx StorageClass. This vulnerability allows authorized users to leak arbitrary information from unprotected endpoints in the control plane’s host network (including link-local or loopback services).

Risk Information
cvss3
Base: 5.8
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N