Comparison Overview

Center for Economic Analyses

VS

Wisconsin Project on Nuclear Arms Control

Center for Economic Analyses

None
Last Update: 2025-12-02
Between 750 and 799

The Mission of CEA is to continuously research economic development and public policy in the Republic of Macedonia and to offer recommendations, suggestions and measures to the government and non-governmental institutions. CEA members share a common vision of the Republic of Macedonia as a new emerging economy integrated with regional and world markets. They devote their time, efforts and knowledge to help make this vision become a reality. : 1. To provide quality policy analyses; 2. To support viable economic policy in Macedonia; 3. To help foster an environment that brings about higher investment, accelerated development and growth of the Macedonian economy, and EU accession; 4. To achieve financial sustainability; 5. To encourage regional cooperation and collaboration in the Balkans; 6. To strengthen civil society, social capital and trust.

NAICS: 54172
NAICS Definition: Research and Development in the Social Sciences and Humanities
Employees: 4
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Wisconsin Project on Nuclear Arms Control

1701 K Street NW, Suite 805, Washington, DC, US, 20006
Last Update: 2025-12-01

The Wisconsin Project on Nuclear Arms Control conducts research and advocacy to stem the spread of nuclear and other weapons of mass destruction. The Wisconsin Project is a private, non-profit, non-partisan organization in Washington, D.C. founded in cooperation with the University of Wisconsin. The organization’s work is guided by the idea that the best way to stop the proliferation of mass destruction weapons is to do so at the source: to cut off the supply of material, equipment and technology needed to make these weapons. To that end, the Project uncovers and publicizes dangerous export transactions and works directly with countries to improve their export control systems. The Wisconsin Project was established in 1986 by now-Emeritus Professor Gary Milhollin. Ms. Valerie Lincy, who joined the Project in 2003, was named Executive Director in 2012. As a result of the Project’s research and revelations in the press, Israel was forced to return nuclear material it had imported for improper purposes from Norway, Germany overhauled and strengthened its export control system, the U.S. Congress tightened restrictions on the sale of American supercomputers, and the U.S. Commerce Department restricted trade with 63 organizations in Pakistan and India following those countries’ nuclear weapon tests. The United States, the United Nations and the European Union also used the Project’s research to identify Iranian entities linked to nuclear and missile work whose assets should be frozen. The Project has also provided direct assistance to U.S. and foreign government agencies to help them improve their export controls. In cooperation with the U.S. Defense and State Departments, the Project has trained thousands of export control officials in some 40 countries around the world. This initiative began in 1998, with countries in Eastern Europe and the former Soviet Union. It since has expanded to include countries in Africa, Latin America, the Middle East, and Southeast Asia, including countries of concern for transshipment and diversion. The Risk Report database and the Iran Watch website (iranwatch.org) are the Wisconsin Project’s two principal programs. The Risk Report is a leading source of unclassified information on companies around the world suspected of links to weapons of mass destruction programs or to terrorism. The Risk Report is a subscription database first produced in 1995 that is used by governments for end use screening, risk management, and investigations, and by companies for supply chain and transaction screening. Iran Watch is a comprehensive web site that tracks Iran’s ability to construct nuclear and chemical weapons and the missiles to deliver them. Iran Watch was launched in 2004 and contains thousands of pages of official documents about Iran’s WMD programs, as well as analysis by the Wisconsin Project. The Wisconsin Project receives support through grants from the U.S. government and private foundations.

NAICS: 54172
NAICS Definition: Research and Development in the Social Sciences and Humanities
Employees: 6
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/center-for-economic-analyses.jpeg
Center for Economic Analyses
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/wisconsin-project-on-nuclear-arms-control.jpeg
Wisconsin Project on Nuclear Arms Control
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Center for Economic Analyses
100%
Compliance Rate
0/4 Standards Verified
Wisconsin Project on Nuclear Arms Control
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Think Tanks Industry Average (This Year)

No incidents recorded for Center for Economic Analyses in 2025.

Incidents vs Think Tanks Industry Average (This Year)

No incidents recorded for Wisconsin Project on Nuclear Arms Control in 2025.

Incident History — Center for Economic Analyses (X = Date, Y = Severity)

Center for Economic Analyses cyber incidents detection timeline including parent company and subsidiaries

Incident History — Wisconsin Project on Nuclear Arms Control (X = Date, Y = Severity)

Wisconsin Project on Nuclear Arms Control cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/center-for-economic-analyses.jpeg
Center for Economic Analyses
Incidents

No Incident

https://images.rankiteo.com/companyimages/wisconsin-project-on-nuclear-arms-control.jpeg
Wisconsin Project on Nuclear Arms Control
Incidents

No Incident

FAQ

Center for Economic Analyses company demonstrates a stronger AI Cybersecurity Score compared to Wisconsin Project on Nuclear Arms Control company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Historically, Wisconsin Project on Nuclear Arms Control company has disclosed a higher number of cyber incidents compared to Center for Economic Analyses company.

In the current year, Wisconsin Project on Nuclear Arms Control company and Center for Economic Analyses company have not reported any cyber incidents.

Neither Wisconsin Project on Nuclear Arms Control company nor Center for Economic Analyses company has reported experiencing a ransomware attack publicly.

Neither Wisconsin Project on Nuclear Arms Control company nor Center for Economic Analyses company has reported experiencing a data breach publicly.

Neither Wisconsin Project on Nuclear Arms Control company nor Center for Economic Analyses company has reported experiencing targeted cyberattacks publicly.

Neither Center for Economic Analyses company nor Wisconsin Project on Nuclear Arms Control company has reported experiencing or disclosing vulnerabilities publicly.

Neither Center for Economic Analyses nor Wisconsin Project on Nuclear Arms Control holds any compliance certifications.

Neither company holds any compliance certifications.

Neither Center for Economic Analyses company nor Wisconsin Project on Nuclear Arms Control company has publicly disclosed detailed information about the number of their subsidiaries.

Wisconsin Project on Nuclear Arms Control company employs more people globally than Center for Economic Analyses company, reflecting its scale as a Think Tanks.

Neither Center for Economic Analyses nor Wisconsin Project on Nuclear Arms Control holds SOC 2 Type 1 certification.

Neither Center for Economic Analyses nor Wisconsin Project on Nuclear Arms Control holds SOC 2 Type 2 certification.

Neither Center for Economic Analyses nor Wisconsin Project on Nuclear Arms Control holds ISO 27001 certification.

Neither Center for Economic Analyses nor Wisconsin Project on Nuclear Arms Control holds PCI DSS certification.

Neither Center for Economic Analyses nor Wisconsin Project on Nuclear Arms Control holds HIPAA certification.

Neither Center for Economic Analyses nor Wisconsin Project on Nuclear Arms Control holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

MCP Server Kubernetes is an MCP Server that can connect to a Kubernetes cluster and manage it. Prior to 2.9.8, there is a security issue exists in the exec_in_pod tool of the mcp-server-kubernetes MCP Server. The tool accepts user-provided commands in both array and string formats. When a string format is provided, it is passed directly to shell interpretation (sh -c) without input validation, allowing shell metacharacters to be interpreted. This vulnerability can be exploited through direct command injection or indirect prompt injection attacks, where AI agents may execute commands without explicit user intent. This vulnerability is fixed in 2.9.8.

Risk Information
cvss3
Base: 6.4
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
Description

XML external entity (XXE) injection in eyoucms v1.7.1 allows remote attackers to cause a denial of service via crafted body of a POST request.

Description

An issue was discovered in Fanvil x210 V2 2.12.20 allowing unauthenticated attackers on the local network to access administrative functions of the device (e.g. file upload, firmware update, reboot...) via a crafted authentication bypass.

Description

Cal.com is open-source scheduling software. Prior to 5.9.8, A flaw in the login credentials provider allows an attacker to bypass password verification when a TOTP code is provided, potentially gaining unauthorized access to user accounts. This issue exists due to problematic conditional logic in the authentication flow. This vulnerability is fixed in 5.9.8.

Risk Information
cvss4
Base: 9.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Rhino is an open-source implementation of JavaScript written entirely in Java. Prior to 1.8.1, 1.7.15.1, and 1.7.14.1, when an application passed an attacker controlled float poing number into the toFixed() function, it might lead to high CPU consumption and a potential Denial of Service. Small numbers go through this call stack: NativeNumber.numTo > DToA.JS_dtostr > DToA.JS_dtoa > DToA.pow5mult where pow5mult attempts to raise 5 to a ridiculous power. This vulnerability is fixed in 1.8.1, 1.7.15.1, and 1.7.14.1.

Risk Information
cvss4
Base: 5.5
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X