Comparison Overview

Storyhouse

VS

Epiphany DanceArts

Storyhouse

Hunter Street, Chester, Cheshire, CH1 2AR, GB
Last Update: 2025-12-09
Between 750 and 799

Storyhouse is a multi award winning library, theatre, cinema, restaurant, community and creative hub. The pioneering new library within Storyhouse, where members of the community work alongside city librarians, has the longest opening hours of any UK public library and is open every day until 11pm. Storyhouse is a charity and offers over 2,000 activities each year for local marginalised groups, including autism friendly colouring sessions, sewing groups for refugees and regular classes for isolated and older communities. The organisation houses a nationally-acclaimed theatre company with home-produced stage shows each year, and runs the country’s most successful regional open-air theatre company, Grosvenor Park Open Air Theatre, in the city’s main park, and an open-air cinema, Moonlight Flicks. Storyhouse produces and is home to a number of festivals each year, including Chester Literature Festival, WayWord children’s literature Festival, Storyhouse Women, Storyhouse Childless, Storyhouse Elders, Storyhouse Queer and Kaleidoscope Festival for people living with a disability. Young Storyhouse works with the regions most disadvantaged young people to gain employability skills.

NAICS: 711
NAICS Definition:
Employees: 134
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Epiphany DanceArts

None
Last Update: 2025-12-09

We believe art should illuminate a glimpse of something beyond ourselves – something sacred. We are Epiphany DanceArts, a company of professional dancers based out of Dallas, Texas. Our mission is to perform with a high level of excellence, innovation, and purpose to bring about personal growth in people’s lives through education, artistic outreach, and performance. We desire to provide a platform of support for local artists and mission organizations.

NAICS: 7111
NAICS Definition: Performing Arts Companies
Employees: 3
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/chester-performs.jpeg
Storyhouse
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/epiphany-dancearts.jpeg
Epiphany DanceArts
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Storyhouse
100%
Compliance Rate
0/4 Standards Verified
Epiphany DanceArts
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Performing Arts Industry Average (This Year)

No incidents recorded for Storyhouse in 2025.

Incidents vs Performing Arts Industry Average (This Year)

No incidents recorded for Epiphany DanceArts in 2025.

Incident History — Storyhouse (X = Date, Y = Severity)

Storyhouse cyber incidents detection timeline including parent company and subsidiaries

Incident History — Epiphany DanceArts (X = Date, Y = Severity)

Epiphany DanceArts cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/chester-performs.jpeg
Storyhouse
Incidents

No Incident

https://images.rankiteo.com/companyimages/epiphany-dancearts.jpeg
Epiphany DanceArts
Incidents

No Incident

FAQ

Epiphany DanceArts company demonstrates a stronger AI Cybersecurity Score compared to Storyhouse company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Historically, Epiphany DanceArts company has disclosed a higher number of cyber incidents compared to Storyhouse company.

In the current year, Epiphany DanceArts company and Storyhouse company have not reported any cyber incidents.

Neither Epiphany DanceArts company nor Storyhouse company has reported experiencing a ransomware attack publicly.

Neither Epiphany DanceArts company nor Storyhouse company has reported experiencing a data breach publicly.

Neither Epiphany DanceArts company nor Storyhouse company has reported experiencing targeted cyberattacks publicly.

Neither Storyhouse company nor Epiphany DanceArts company has reported experiencing or disclosing vulnerabilities publicly.

Neither Storyhouse nor Epiphany DanceArts holds any compliance certifications.

Neither company holds any compliance certifications.

Neither Storyhouse company nor Epiphany DanceArts company has publicly disclosed detailed information about the number of their subsidiaries.

Storyhouse company employs more people globally than Epiphany DanceArts company, reflecting its scale as a Performing Arts.

Neither Storyhouse nor Epiphany DanceArts holds SOC 2 Type 1 certification.

Neither Storyhouse nor Epiphany DanceArts holds SOC 2 Type 2 certification.

Neither Storyhouse nor Epiphany DanceArts holds ISO 27001 certification.

Neither Storyhouse nor Epiphany DanceArts holds PCI DSS certification.

Neither Storyhouse nor Epiphany DanceArts holds HIPAA certification.

Neither Storyhouse nor Epiphany DanceArts holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

A weakness has been identified in itsourcecode Online Pet Shop Management System 1.0. This vulnerability affects unknown code of the file /pet1/addcnp.php. This manipulation of the argument cnpname causes sql injection. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in Tenda AX9 22.03.01.46. This affects the function image_check of the component httpd. The manipulation results in use of weak hash. It is possible to launch the attack remotely. A high complexity level is associated with this attack. It is indicated that the exploitability is difficult. The exploit has been released to the public and may be exploited.

Risk Information
cvss2
Base: 2.6
Severity: HIGH
AV:N/AC:H/Au:N/C:N/I:P/A:N
cvss3
Base: 3.7
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
cvss4
Base: 6.3
Severity: HIGH
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A weakness has been identified in code-projects Student File Management System 1.0. This issue affects some unknown processing of the file /admin/update_student.php. This manipulation of the argument stud_id causes sql injection. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in code-projects Student File Management System 1.0. This vulnerability affects unknown code of the file /admin/save_user.php. The manipulation of the argument firstname results in sql injection. The attack can be executed remotely. The exploit has been released to the public and may be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was identified in code-projects Student File Management System 1.0. This affects an unknown part of the file /admin/update_user.php. The manipulation of the argument user_id leads to sql injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X