Company Details
children's-museum-of-southern-minnesota
18
557
712
cmsouthernmn.org
0
CHI_3918488
In-progress

Children's Museum of Southern Minnesota Company CyberSecurity Posture
cmsouthernmn.orgThe Children's Museum of Southern Minnesota is full of opportunities for discovery, development, and hands-on play. The Museum is many things: a mission, a place, and an organization -- but it is entirely devoted to serving children, families, and the greater community. The Children's Museum of Southern Minnesota features exhibits, activities, and spaces to engage all ages. From the Betsy Tacy-inspired Play Porch to the mind-inspiring attractions of the Two Level Makers Space, and with a towering Mankato Clinic Tree of Forts Climber so tall that it burst through the roof, there's plenty to do and see -- all within a safe, inviting, and comfortable space. The Children's Museum of Minnesota exists thanks to the support of dozens of businesses, hundreds of families, many wonderful volunteers, and the entire Greater Mankato community. With the continued help and enthusiasm of all who have supported us, we can't wait to put smiles on many more faces -- for generations to come.
Company Details
children's-museum-of-southern-minnesota
18
557
712
cmsouthernmn.org
0
CHI_3918488
In-progress
Between 750 and 799

CMSM Global Score (TPRM)XXXX



No incidents recorded for Children's Museum of Southern Minnesota in 2025.
No incidents recorded for Children's Museum of Southern Minnesota in 2025.
No incidents recorded for Children's Museum of Southern Minnesota in 2025.
CMSM cyber incidents detection timeline including parent company and subsidiaries

The Children's Museum of Southern Minnesota is full of opportunities for discovery, development, and hands-on play. The Museum is many things: a mission, a place, and an organization -- but it is entirely devoted to serving children, families, and the greater community. The Children's Museum of Southern Minnesota features exhibits, activities, and spaces to engage all ages. From the Betsy Tacy-inspired Play Porch to the mind-inspiring attractions of the Two Level Makers Space, and with a towering Mankato Clinic Tree of Forts Climber so tall that it burst through the roof, there's plenty to do and see -- all within a safe, inviting, and comfortable space. The Children's Museum of Minnesota exists thanks to the support of dozens of businesses, hundreds of families, many wonderful volunteers, and the entire Greater Mankato community. With the continued help and enthusiasm of all who have supported us, we can't wait to put smiles on many more faces -- for generations to come.


Two Rivers Gallery proudly sits on the traditional, unceded territory of the Lheidli T’enneh. Operated by the Prince George Regional Art Gallery Association, the Gallery serves the Regional District of Fraser-Fort George, which includes the traditional territories of the McLeod Lake Indian Band, Lhe

The Children’s Museum in West Hartford and Roaring Brook Nature Center in Canton are Connecticut’s premiere destinations for exploration and education. The Children's Museum Wildlife Sanctuary is home to more than 100 live rescued animals. Travelers Science Dome is CT's largest digital full dome pla

It is with a heavy heart that we inform you that due to a significant financial deficit, the American Textile History Museum has closed our doors to the public. Over the next year, we will seek to find new homes for our collection. We are gratefully accepting donations to help preserve and protect t

Art Museum of Southeast Texas' purpose is to collect, preserve, exhibit and interpret the arts with special attention to Texas fine and folk arts of the 19th-21st centuries. Through unique collections, exhibitions, public programs and outreach in the visual arts, AMSET's mission is to provide educ

The mission of the Washington Pavilion is to deliver memorable experiences that entertain, educate and enrich. Our vision is inspire lifelong discovery and inclusive experiences that improve the quality of life for everyone. The Washington Pavilion is the region’s home for the arts, entertainment a

New Zealand’s geographic isolation has served to forge our identity as a country, and as New Zealanders. We are a nation of innovators, dreamers and pioneers. People who are driven to find their own course, to seek out new possibilities with imagination and conviction. Nowhere stronger is this e
.png)
The Senate Committee spent a part of Tuesday visiting Mankato for four proposed projects.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Children's Museum of Southern Minnesota is http://www.cmsouthernmn.org.
According to Rankiteo, Children's Museum of Southern Minnesota’s AI-generated cybersecurity score is 762, reflecting their Fair security posture.
According to Rankiteo, Children's Museum of Southern Minnesota currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Children's Museum of Southern Minnesota is not certified under SOC 2 Type 1.
According to Rankiteo, Children's Museum of Southern Minnesota does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Children's Museum of Southern Minnesota is not listed as GDPR compliant.
According to Rankiteo, Children's Museum of Southern Minnesota does not currently maintain PCI DSS compliance.
According to Rankiteo, Children's Museum of Southern Minnesota is not compliant with HIPAA regulations.
According to Rankiteo,Children's Museum of Southern Minnesota is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Children's Museum of Southern Minnesota operates primarily in the Museums, Historical Sites, and Zoos industry.
Children's Museum of Southern Minnesota employs approximately 18 people worldwide.
Children's Museum of Southern Minnesota presently has no subsidiaries across any sectors.
Children's Museum of Southern Minnesota’s official LinkedIn profile has approximately 557 followers.
Children's Museum of Southern Minnesota is classified under the NAICS code 712, which corresponds to Museums, Historical Sites, and Similar Institutions.
No, Children's Museum of Southern Minnesota does not have a profile on Crunchbase.
Yes, Children's Museum of Southern Minnesota maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/children's-museum-of-southern-minnesota.
As of December 03, 2025, Rankiteo reports that Children's Museum of Southern Minnesota has not experienced any cybersecurity incidents.
Children's Museum of Southern Minnesota has an estimated 2,133 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, Children's Museum of Southern Minnesota has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
vLLM is an inference and serving engine for large language models (LLMs). Prior to 0.11.1, vllm has a critical remote code execution vector in a config class named Nemotron_Nano_VL_Config. When vllm loads a model config that contains an auto_map entry, the config class resolves that mapping with get_class_from_dynamic_module(...) and immediately instantiates the returned class. This fetches and executes Python from the remote repository referenced in the auto_map string. Crucially, this happens even when the caller explicitly sets trust_remote_code=False in vllm.transformers_utils.config.get_config. In practice, an attacker can publish a benign-looking frontend repo whose config.json points via auto_map to a separate malicious backend repo; loading the frontend will silently run the backend’s code on the victim host. This vulnerability is fixed in 0.11.1.
fastify-reply-from is a Fastify plugin to forward the current HTTP request to another server. Prior to 12.5.0, by crafting a malicious URL, an attacker could access routes that are not allowed, even though the reply.from is defined for specific routes in @fastify/reply-from. This vulnerability is fixed in 12.5.0.
Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to 21.0.2, 20.3.15, and 19.2.17, A Stored Cross-Site Scripting (XSS) vulnerability has been identified in the Angular Template Compiler. It occurs because the compiler's internal security schema is incomplete, allowing attackers to bypass Angular's built-in security sanitization. Specifically, the schema fails to classify certain URL-holding attributes (e.g., those that could contain javascript: URLs) as requiring strict URL security, enabling the injection of malicious scripts. This vulnerability is fixed in 21.0.2, 20.3.15, and 19.2.17.
Gin-vue-admin is a backstage management system based on vue and gin. In 2.8.6 and earlier, attackers can delete any file on the server at will, causing damage or unavailability of server resources. Attackers can control the 'FileMd5' parameter to delete any file and folder.
Portkey.ai Gateway is a blazing fast AI Gateway with integrated guardrails. Prior to 1.14.0, the gateway determined the destination baseURL by prioritizing the value in the x-portkey-custom-host request header. The proxy route then appends the client-specified path to perform an external fetch. This can be maliciously used by users for SSRF attacks. This vulnerability is fixed in 1.14.0.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.