Company Details
centre-for-contemporary-arts
39
1,101
712
cca-glasgow.com
0
CEN_1651337
In-progress

Centre for Contemporary Arts Company CyberSecurity Posture
cca-glasgow.comCCA is a not-for-profit, multi-purpose, centre for contemporary art and culture located in the city centre of Glasgow. We curate thought-provoking, often experimental work and provide a platform for a collaborative, civic-led programme, all of which serves as a catalyst for new ways of thinking and active engagement. We host a programme of exhibitions, events, films, music, literature, workshops, festivals and performances - working collaboratively with more than 200 programme partners every year. At the core of all activities is the desire to work with artists, develop relationships with communities across the city and beyond, commission new work and provide a welcoming and accessible space for the widest possible audience to enjoy art and culture. Across all these activities, and our building, we are actively working towards integrating sustainable practices.
Company Details
centre-for-contemporary-arts
39
1,101
712
cca-glasgow.com
0
CEN_1651337
In-progress
Between 750 and 799

CCA Global Score (TPRM)XXXX



No incidents recorded for Centre for Contemporary Arts in 2025.
No incidents recorded for Centre for Contemporary Arts in 2025.
No incidents recorded for Centre for Contemporary Arts in 2025.
CCA cyber incidents detection timeline including parent company and subsidiaries

CCA is a not-for-profit, multi-purpose, centre for contemporary art and culture located in the city centre of Glasgow. We curate thought-provoking, often experimental work and provide a platform for a collaborative, civic-led programme, all of which serves as a catalyst for new ways of thinking and active engagement. We host a programme of exhibitions, events, films, music, literature, workshops, festivals and performances - working collaboratively with more than 200 programme partners every year. At the core of all activities is the desire to work with artists, develop relationships with communities across the city and beyond, commission new work and provide a welcoming and accessible space for the widest possible audience to enjoy art and culture. Across all these activities, and our building, we are actively working towards integrating sustainable practices.


"Preserving and celebrating the creative and historic significance of Doylestown and its neighboring communities". Collecting and preserving artifacts of our past is a major activity of the Society. But we also collect stories. The narratives are the human connection to our past and it is these

Designed by the award-winning Zaha Hadid Architects, the Roca London Gallery is an innovative space where product display environments live harmoniously alongside a series of cultural exhibitions, events and meetings on a variety of themes such as architecture, design and sustainability. Roca Galle

O Museu Brasileiro da Escultura - MuBE é uma entidade cultural sem fins econômicos. Abriga exposições de arte, promove oficinas e cursos regulares de história da arte, cerâmica, pintura, escultura, arte e inclusão, palestras, debates, entre outras atividades. O MuBE realiza ainda todos os domingos

JTR Collections Management offers a wide range of Collections Management, Registration, and Educational services for private collectors, artist foundations, auction houses, historic houses, and museums of all sizes. Collections Management and Registration services: Collections policy and proce

The Alaska Native Heritage Center (ANHC), one of America's Cultural Treasures, preserves & strengthens the traditions, languages, & art of Alaska’s Native Peoples. An educational and cultural institution for all Alaskans, ANHC provides programs in both academic and informal settings, including wor

The Old Dillard Museum occupies a prominent place in the history of Fort Lauderdale. Formerly called “the colored school," the building is one of Ft. Lauderdale’s first local historic landmarks, as well as the first school constructed for people of color in this area. Since its construction, this
.png)
Cyber security refers to technologies, processes, and rules created to protect computer systems, servers, networks, programs, and data from cyber-attacks.
Rhode Islanders approved a slate of four bond initiatives, totaling about $343 million, at the polls Tuesday, according to unofficial preliminary results from...
Artists are writing the narratives of our times.” Hear what ICA Director Jill Medvedow had to say about the ways that remaining in one place can help arts...
The institute is poised to have a significant influence over the direction of cybersecurity for the future.
India News: Home Minister Amit Shah inaugurates the Assam Rifles' cyber security operations centre (CSOC) — first of its kind for the...
Wuhan National Cybersecurity Center Core Phase 2, China design by Aedas: amalgamated commercial, office, apartment and innovation hubs.
Installation Ceremony Officially Welcomes CFA Dean, Heads; Employee Resource Groups to Sponsor Winter Necessity Drive; Take Cybersecurity...
The Federal University of Technology Akure (FUTA) has commissioned its state-of-the-art Cyber Security Laboratory.
Cyber violence against women is defined as a form of gender-based violence (GBV) carried out through digital means.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Centre for Contemporary Arts is http://www.cca-glasgow.com.
According to Rankiteo, Centre for Contemporary Arts’s AI-generated cybersecurity score is 762, reflecting their Fair security posture.
According to Rankiteo, Centre for Contemporary Arts currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Centre for Contemporary Arts is not certified under SOC 2 Type 1.
According to Rankiteo, Centre for Contemporary Arts does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Centre for Contemporary Arts is not listed as GDPR compliant.
According to Rankiteo, Centre for Contemporary Arts does not currently maintain PCI DSS compliance.
According to Rankiteo, Centre for Contemporary Arts is not compliant with HIPAA regulations.
According to Rankiteo,Centre for Contemporary Arts is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Centre for Contemporary Arts operates primarily in the Museums, Historical Sites, and Zoos industry.
Centre for Contemporary Arts employs approximately 39 people worldwide.
Centre for Contemporary Arts presently has no subsidiaries across any sectors.
Centre for Contemporary Arts’s official LinkedIn profile has approximately 1,101 followers.
No, Centre for Contemporary Arts does not have a profile on Crunchbase.
Yes, Centre for Contemporary Arts maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/centre-for-contemporary-arts.
As of December 03, 2025, Rankiteo reports that Centre for Contemporary Arts has not experienced any cybersecurity incidents.
Centre for Contemporary Arts has an estimated 2,134 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, Centre for Contemporary Arts has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to 7.1.2-9 and 6.9.13-34, there is a vulnerability in ImageMagick’s Magick++ layer that manifests when Options::fontFamily is invoked with an empty string. Clearing a font family calls RelinquishMagickMemory on _drawInfo->font, freeing the font string but leaving _drawInfo->font pointing to freed memory while _drawInfo->family is set to that (now-invalid) pointer. Any later cleanup or reuse of _drawInfo->font re-frees or dereferences dangling memory. DestroyDrawInfo and other setters (Options::font, Image::font) assume _drawInfo->font remains valid, so destruction or subsequent updates trigger crashes or heap corruption. This vulnerability is fixed in 7.1.2-9 and 6.9.13-34.
FeehiCMS version 2.1.1 has a Remote Code Execution via Unrestricted File Upload in Ad Management. FeehiCMS version 2.1.1 allows authenticated remote attackers to upload files that the server later executes (or stores in an executable location) without sufficient validation, sanitization, or execution restrictions. An authenticated remote attacker can upload a crafted PHP file and cause the application or web server to execute it, resulting in remote code execution (RCE).
PHPGurukul Billing System 1.0 is vulnerable to SQL Injection in the admin/index.php endpoint. Specifically, the username parameter accepts unvalidated user input, which is then concatenated directly into a backend SQL query.
NMIS/BioDose software V22.02 and previous versions contain executable binaries with plain text hard-coded passwords. These hard-coded passwords could allow unauthorized access to both the application and database.
NMIS/BioDose V22.02 and previous versions' installation directory paths by default have insecure file permissions, which in certain deployment scenarios can enable users on client workstations to modify the program executables and libraries.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.