Comparison Overview

Storyhouse

VS

Yow Dance

Storyhouse

Hunter Street, Chester, Cheshire, CH1 2AR, GB
Last Update: 2025-12-09
Between 750 and 799

Storyhouse is a multi award winning library, theatre, cinema, restaurant, community and creative hub. The pioneering new library within Storyhouse, where members of the community work alongside city librarians, has the longest opening hours of any UK public library and is open every day until 11pm. Storyhouse is a charity and offers over 2,000 activities each year for local marginalised groups, including autism friendly colouring sessions, sewing groups for refugees and regular classes for isolated and older communities. The organisation houses a nationally-acclaimed theatre company with home-produced stage shows each year, and runs the country’s most successful regional open-air theatre company, Grosvenor Park Open Air Theatre, in the city’s main park, and an open-air cinema, Moonlight Flicks. Storyhouse produces and is home to a number of festivals each year, including Chester Literature Festival, WayWord children’s literature Festival, Storyhouse Women, Storyhouse Childless, Storyhouse Elders, Storyhouse Queer and Kaleidoscope Festival for people living with a disability. Young Storyhouse works with the regions most disadvantaged young people to gain employability skills.

NAICS: 711
NAICS Definition:
Employees: 134
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Yow Dance

P.O. Box 22632, Orlando, 32830, US
Last Update: 2025-12-13
Between 750 and 799

Yow Dance is an Orlando-based modern dance company, founded by artistic director Eric Yow. Its mission is to create, cultivate and promote modern and contemporary dance performances of exceptional quality and relevance; to enhance exposure of modern dance to Central Florida’s youth by creating and performing accessible, expressive dance programs in various educational settings; and to provide compelling repertoire by renowned international choreographers in order to foster, maintain and expand audiences locally and throughout the nation.

NAICS: 7111
NAICS Definition: Performing Arts Companies
Employees: 3
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/chester-performs.jpeg
Storyhouse
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/defaultcompany.jpeg
Yow Dance
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Storyhouse
100%
Compliance Rate
0/4 Standards Verified
Yow Dance
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Performing Arts Industry Average (This Year)

No incidents recorded for Storyhouse in 2025.

Incidents vs Performing Arts Industry Average (This Year)

No incidents recorded for Yow Dance in 2025.

Incident History — Storyhouse (X = Date, Y = Severity)

Storyhouse cyber incidents detection timeline including parent company and subsidiaries

Incident History — Yow Dance (X = Date, Y = Severity)

Yow Dance cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/chester-performs.jpeg
Storyhouse
Incidents

No Incident

https://images.rankiteo.com/companyimages/defaultcompany.jpeg
Yow Dance
Incidents

No Incident

FAQ

Yow Dance company demonstrates a stronger AI Cybersecurity Score compared to Storyhouse company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Historically, Yow Dance company has disclosed a higher number of cyber incidents compared to Storyhouse company.

In the current year, Yow Dance company and Storyhouse company have not reported any cyber incidents.

Neither Yow Dance company nor Storyhouse company has reported experiencing a ransomware attack publicly.

Neither Yow Dance company nor Storyhouse company has reported experiencing a data breach publicly.

Neither Yow Dance company nor Storyhouse company has reported experiencing targeted cyberattacks publicly.

Neither Storyhouse company nor Yow Dance company has reported experiencing or disclosing vulnerabilities publicly.

Neither Storyhouse nor Yow Dance holds any compliance certifications.

Neither company holds any compliance certifications.

Neither Storyhouse company nor Yow Dance company has publicly disclosed detailed information about the number of their subsidiaries.

Storyhouse company employs more people globally than Yow Dance company, reflecting its scale as a Performing Arts.

Neither Storyhouse nor Yow Dance holds SOC 2 Type 1 certification.

Neither Storyhouse nor Yow Dance holds SOC 2 Type 2 certification.

Neither Storyhouse nor Yow Dance holds ISO 27001 certification.

Neither Storyhouse nor Yow Dance holds PCI DSS certification.

Neither Storyhouse nor Yow Dance holds HIPAA certification.

Neither Storyhouse nor Yow Dance holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

A weakness has been identified in itsourcecode Online Pet Shop Management System 1.0. This vulnerability affects unknown code of the file /pet1/addcnp.php. This manipulation of the argument cnpname causes sql injection. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in Tenda AX9 22.03.01.46. This affects the function image_check of the component httpd. The manipulation results in use of weak hash. It is possible to launch the attack remotely. A high complexity level is associated with this attack. It is indicated that the exploitability is difficult. The exploit has been released to the public and may be exploited.

Risk Information
cvss2
Base: 2.6
Severity: HIGH
AV:N/AC:H/Au:N/C:N/I:P/A:N
cvss3
Base: 3.7
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
cvss4
Base: 6.3
Severity: HIGH
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A weakness has been identified in code-projects Student File Management System 1.0. This issue affects some unknown processing of the file /admin/update_student.php. This manipulation of the argument stud_id causes sql injection. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in code-projects Student File Management System 1.0. This vulnerability affects unknown code of the file /admin/save_user.php. The manipulation of the argument firstname results in sql injection. The attack can be executed remotely. The exploit has been released to the public and may be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was identified in code-projects Student File Management System 1.0. This affects an unknown part of the file /admin/update_user.php. The manipulation of the argument user_id leads to sql injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X