Company Details
center-for-the-study-of-democracy
108
7,366
54172
csd.eu
0
CEN_1066689
In-progress

Center for the Study of Democracy Company CyberSecurity Posture
csd.euFounded in late 1989, the Center for the Study of Democracy (CSD) is a European public policy institute dedicated to the values of democracy and market economy. CSD is a non-partisan, independent organization fostering the reform process through impact on policy and civil society. CSD objectives are: • to provide an enhanced institutional and policy capacity for a successful European integration process; • to promote institutional reform and the practical implementation of democratic values in legal and economic practice; • to monitor public attitudes and serve as a watchdog of the institutional reform process in the country; • to strengthen the institutional and management capacity of NGOs in Bulgaria. Building bridges is the old-fashioned way of bringing together social actors and cementing new alliances. Born as a think-tank, the Center for the Study of Democracy has evolved into policy development through dialogue and partnership. Bringing cutting-edge solutions to transition problems is our way of keeping the middle ground between academia and social practice. The CSD has pioneered in several areas traditionally perceived as the inviolable public property, such as anti-corruption institutional reform, and national security. Our belief is that bringing a new culture of cooperation and trust in a milieu of inherited fragmentation and opacity is equally rewarding as the achievement of concrete social goals.
Company Details
center-for-the-study-of-democracy
108
7,366
54172
csd.eu
0
CEN_1066689
In-progress
Between 750 and 799

CSD Global Score (TPRM)XXXX



No incidents recorded for Center for the Study of Democracy in 2025.
No incidents recorded for Center for the Study of Democracy in 2025.
No incidents recorded for Center for the Study of Democracy in 2025.
CSD cyber incidents detection timeline including parent company and subsidiaries

Founded in late 1989, the Center for the Study of Democracy (CSD) is a European public policy institute dedicated to the values of democracy and market economy. CSD is a non-partisan, independent organization fostering the reform process through impact on policy and civil society. CSD objectives are: • to provide an enhanced institutional and policy capacity for a successful European integration process; • to promote institutional reform and the practical implementation of democratic values in legal and economic practice; • to monitor public attitudes and serve as a watchdog of the institutional reform process in the country; • to strengthen the institutional and management capacity of NGOs in Bulgaria. Building bridges is the old-fashioned way of bringing together social actors and cementing new alliances. Born as a think-tank, the Center for the Study of Democracy has evolved into policy development through dialogue and partnership. Bringing cutting-edge solutions to transition problems is our way of keeping the middle ground between academia and social practice. The CSD has pioneered in several areas traditionally perceived as the inviolable public property, such as anti-corruption institutional reform, and national security. Our belief is that bringing a new culture of cooperation and trust in a milieu of inherited fragmentation and opacity is equally rewarding as the achievement of concrete social goals.


The National Committee on North Korea (NCNK) is a non-governmental organization of persons with significant and diverse expertise related to the Democratic People’s Republic of Korea. NCNK and its members support principled engagement with North Korea as a means to promote peace and stability on the

The Center is a leading Azerbaijani think tank specialized in economic and social policy issues working with and establishing bridge between the government and the various representatives of civil society. At the same time, the Center positions itself in the center of the civil society having tight

The Athena Alliance is a community that propels leaders to build impact, whether it’s in the C-suite, in the boardroom, as an investor, as an entrepreneur, as a thought leader and beyond. Since its founding, Athena has: • Built and nurtured a network of 3-,000+ C-level women, VCs, and CEOs from ac

Openfields was founded in 2014 with the vision of bringing the most creative, strategic tools for innovation from across sectors to bear on our most pressing, complex social challenges. Our name, Openfields, comes from the insight that these challenges cannot addressed from a single field of work

We are a group of healthy lifestyle and business experts who offer effective strategies, high impact stories and fresh ideas, to enhance the quality of life of audiences and companies. We are powerful motivators and communicators who offer public speaking, strategic consulting, seminars and workshop

The German Marshall Fund of the United States (GMF) is a non-partisan American public policy and grantmaking institution dedicated to promoting better understanding and cooperation between North America and Europe on transatlantic and global issues. GMF does this by supporting individuals and ins
.png)
UGM's Peace and Security Center criticizes the proposed cybersecurity bill for expanding military powers and threatening democracy.
As Director of the US Cybersecurity Infrastructure Security Agency, Director Chris Krebs said the 2020 election was “the most secure in American history,”...
The Department of Homeland Security and its components play a lead role in strengthening cybersecurity resilience across the nation and sectors.
A global shift is taking place. Leaders recognize that tech innovation equals power, and they are marshaling their resources accordingly.
The social media bot is an AI algorithm. It perceives the digital environment, and intelligently post content and perform interactions to achieve its goal.
Associated Publication: King, C., Phillips, S.C. & Carley, K.M. A path forward on online misinformation mitigation based on current user...
How are African nations navigating the governance of AI, digital infrastructure, and emerging technologies?
US policymakers need to develop a more systematic and comprehensive framework for managing the data security and influence risks that come from cross-border...
From political activism to cyberattacks, the rise of technology is changing the face of regional engagement.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Center for the Study of Democracy is csd.eu.
According to Rankiteo, Center for the Study of Democracy’s AI-generated cybersecurity score is 751, reflecting their Fair security posture.
According to Rankiteo, Center for the Study of Democracy currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Center for the Study of Democracy is not certified under SOC 2 Type 1.
According to Rankiteo, Center for the Study of Democracy does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Center for the Study of Democracy is not listed as GDPR compliant.
According to Rankiteo, Center for the Study of Democracy does not currently maintain PCI DSS compliance.
According to Rankiteo, Center for the Study of Democracy is not compliant with HIPAA regulations.
According to Rankiteo,Center for the Study of Democracy is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Center for the Study of Democracy operates primarily in the Think Tanks industry.
Center for the Study of Democracy employs approximately 108 people worldwide.
Center for the Study of Democracy presently has no subsidiaries across any sectors.
Center for the Study of Democracy’s official LinkedIn profile has approximately 7,366 followers.
Center for the Study of Democracy is classified under the NAICS code 54172, which corresponds to Research and Development in the Social Sciences and Humanities.
No, Center for the Study of Democracy does not have a profile on Crunchbase.
Yes, Center for the Study of Democracy maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/center-for-the-study-of-democracy.
As of December 05, 2025, Rankiteo reports that Center for the Study of Democracy has not experienced any cybersecurity incidents.
Center for the Study of Democracy has an estimated 812 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, Center for the Study of Democracy has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
Sigstore Timestamp Authority is a service for issuing RFC 3161 timestamps. Prior to 2.0.3, Function api.ParseJSONRequest currently splits (via a call to strings.Split) an optionally-provided OID (which is untrusted data) on periods. Similarly, function api.getContentType splits the Content-Type header (which is also untrusted data) on an application string. As a result, in the face of a malicious request with either an excessively long OID in the payload containing many period characters or a malformed Content-Type header, a call to api.ParseJSONRequest or api.getContentType incurs allocations of O(n) bytes (where n stands for the length of the function's argument). This vulnerability is fixed in 2.0.3.
Monkeytype is a minimalistic and customizable typing test. In 25.49.0 and earlier, there is improper handling of user input which allows an attacker to execute malicious javascript on anyone viewing a malicious quote submission. quote.text and quote.source are user input, and they're inserted straight into the DOM. If they contain HTML tags, they will be rendered (after some escaping using quotes and textarea tags).
SysReptor is a fully customizable pentest reporting platform. Prior to 2025.102, there is a Stored Cross-Site Scripting (XSS) vulnerability allows authenticated users to execute malicious JavaScript in the context of other logged-in users by uploading malicious JavaScript files in the web UI. This vulnerability is fixed in 2025.102.
Taiko Alethia is an Ethereum-equivalent, permissionless, based rollup designed to scale Ethereum without compromising its fundamental properties. In 2.3.1 and earlier, TaikoInbox._verifyBatches (packages/protocol/contracts/layer1/based/TaikoInbox.sol:627-678) advanced the local tid to whatever transition matched the current blockHash before knowing whether that batch would actually be verified. When the loop later broke (e.g., cooldown window not yet passed or transition invalidated), the function still wrote that newer tid into batches[lastVerifiedBatchId].verifiedTransitionId after decrementing batchId. Result: the last verified batch could end up pointing at a transition index from the next batch (often zeroed), corrupting the verified chain pointer.
A flaw has been found in youlaitech youlai-mall 1.0.0/2.0.0. Affected is the function getById/updateAddress/deleteAddress of the file /mall-ums/app-api/v1/addresses/. Executing manipulation can lead to improper control of dynamically-identified variables. The attack can be executed remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.