Company Details
chicago-architecture-center
134
15,417
712
architecture.org
0
CHI_1428479
In-progress


Chicago Architecture Center Company CyberSecurity Posture
architecture.orgWhen you hit the pavement on one of our 75+ walking tours through Chicago neighborhoods, embark on our award-winning river cruise or visit the stunning riverfront Center, you’re helping fund youth education initiatives, world-renowned events like Open House Chicago and public information campaigns that empower citizens to take an active role in the future of their cities. As a certified nonprofit, all CAC ticket purchases directly support our education efforts and community engagement projects.
Company Details
chicago-architecture-center
134
15,417
712
architecture.org
0
CHI_1428479
In-progress
Between 750 and 799

CAC Global Score (TPRM)XXXX



No incidents recorded for Chicago Architecture Center in 2026.
No incidents recorded for Chicago Architecture Center in 2026.
No incidents recorded for Chicago Architecture Center in 2026.
CAC cyber incidents detection timeline including parent company and subsidiaries

When you hit the pavement on one of our 75+ walking tours through Chicago neighborhoods, embark on our award-winning river cruise or visit the stunning riverfront Center, you’re helping fund youth education initiatives, world-renowned events like Open House Chicago and public information campaigns that empower citizens to take an active role in the future of their cities. As a certified nonprofit, all CAC ticket purchases directly support our education efforts and community engagement projects.


The Wild Center is located in the heart of the Adirondacks in upstate New York. The Adirondacks are unique in the world. Surrounded by people, they house great expanses of nature interspersed with small towns and communities. They can be an example for a future where man and the rest of the natural

Founded in 1947, the George Eastman Museum is the world’s oldest photography museum and one of the largest film archives in the United States, located on the historic Rochester estate of entrepreneur and philanthropist George Eastman, the pioneer of popular photography. Its holdings comprise more th
COSI provides an exciting and informative atmosphere for those of all ages to discover more about our environment, our accomplishments, our heritage, and ourselves. We motivate a desire toward a better understanding of science, industry, health, and history through involvement in exhibits, demonstr

The Nerman Museum of Contemporary Art has earned its place in the vanguard of contemporary art through its cutting-edge art exhibitions and permanent collection. The collection focuses on international, national, and regional contemporary artists, with an emphasis on diverse practitioners and educat

The Texas State Aquarium (TSA) is a private, not-for-profit 501(c)(3) wildlife conservation-focused institution. Established in 1990 and designated as the official Aquarium of Texas, the Texas State Aquarium is ranked among the top 5 best aquariums in the nation by USA Today's 10Best Readers' Choice

Located on the corner of Wilshire & Fairfax in Los Angeles, California, the Petersen Automotive Museum encompasses more than 100,000 square feet- celebrating the exploration, design, and engineering of the automobile. The Museum spans four floors and features more than 150 rare: cars, trucks, and m

The Niagara History Center is dedicated to the preservation, promotion, and interpretation of the diverse cultural heritage of the people, places, and events related to Niagara County and the Erie Canal. It spans three properties and seven buildings in historic Lockport: the main campus at 215 Niaga

Dulwich Picture Gallery, founded in 1811, is the world’s first purpose-built public art gallery. We care for and display our outstanding collection of Old Master paintings within Sir John Soane’s pioneering architecture. As an independent gallery, we remain true to our founders’ purpose of presentin

The Mobile Museums of Tolerance (MMOT) is a free traveling human rights education center utilizing innovative technology and interactive lessons to bring a message of tolerance directly to communities throughout the United States. The MMOT empowers visitors to combat anti-Semitism, bullying, racism,
.png)
Explore 2026's top cybersecurity events to network, learn from experts and uncover strategies to mitigate risks in a complex threat...
Good Thursday morning, Illinois. It's the 24th anniversary of the 9/11 attacks on the United States. TOP TALKER.
With more than $3 billion in critical maintenance work needed at Chicago Public Schools buildings but limited money to work with,...
The University of Illinois Chicago's new state-of-the-art computer science facility will expand collaborative research and teaching capacity.
Steve Morgan, Editor-in-Chief. Northport, N.Y. – Aug. 30, 2024. Over an eight-year period tracked by Cybersecurity Ventures, the number of...
Chicago's tech scene is booming in 2025, with high-paying jobs in AI, cybersecurity, and cloud architecture leading the way.
Location: 219 S Dearborn St, Chicago, IL 60604 History In 1960, Congress authorized the U.S. General Services Administration to construct a...
The building, at 564 W. Randolph, will feature an in-person cybersecurity training facility and a research and development center.
The award includes $115.8 million in Inflation Reduction Act funding to build the new Cybersecurity and Infrastructure Security Agency headquarters.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Chicago Architecture Center is http://architecture.org.
According to Rankiteo, Chicago Architecture Center’s AI-generated cybersecurity score is 763, reflecting their Fair security posture.
According to Rankiteo, Chicago Architecture Center currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Chicago Architecture Center has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, Chicago Architecture Center is not certified under SOC 2 Type 1.
According to Rankiteo, Chicago Architecture Center does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Chicago Architecture Center is not listed as GDPR compliant.
According to Rankiteo, Chicago Architecture Center does not currently maintain PCI DSS compliance.
According to Rankiteo, Chicago Architecture Center is not compliant with HIPAA regulations.
According to Rankiteo,Chicago Architecture Center is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Chicago Architecture Center operates primarily in the Museums, Historical Sites, and Zoos industry.
Chicago Architecture Center employs approximately 134 people worldwide.
Chicago Architecture Center presently has no subsidiaries across any sectors.
Chicago Architecture Center’s official LinkedIn profile has approximately 15,417 followers.
Chicago Architecture Center is classified under the NAICS code 712, which corresponds to Museums, Historical Sites, and Similar Institutions.
No, Chicago Architecture Center does not have a profile on Crunchbase.
Yes, Chicago Architecture Center maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/chicago-architecture-center.
As of January 23, 2026, Rankiteo reports that Chicago Architecture Center has not experienced any cybersecurity incidents.
Chicago Architecture Center has an estimated 2,178 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, Chicago Architecture Center has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
Improper validation of specified type of input in M365 Copilot allows an unauthorized attacker to disclose information over a network.
Improper access control in Azure Front Door (AFD) allows an unauthorized attacker to elevate privileges over a network.
Azure Entra ID Elevation of Privilege Vulnerability
Moonraker is a Python web server providing API access to Klipper 3D printing firmware. In versions 0.9.3 and below, instances configured with the "ldap" component enabled are vulnerable to LDAP search filter injection techniques via the login endpoint. The 401 error response message can be used to determine whether or not a search was successful, allowing for brute force methods to discover LDAP entries on the server such as user IDs and user attributes. This issue has been fixed in version 0.10.0.
Runtipi is a Docker-based, personal homeserver orchestrator that facilitates multiple services on a single server. Versions 3.7.0 and above allow an authenticated user to execute arbitrary system commands on the host server by injecting shell metacharacters into backup filenames. The BackupManager fails to sanitize the filenames of uploaded backups. The system persists user-uploaded files directly to the host filesystem using the raw originalname provided in the request. This allows an attacker to stage a file containing shell metacharacters (e.g., $(id).tar.gz) at a predictable path, which is later referenced during the restore process. The successful storage of the file is what allows the subsequent restore command to reference and execute it. This issue has been fixed in version 4.7.0.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.