Comparison Overview

CISF (Central Industrial Security Force)

VS

The City of Bakersfield

CISF (Central Industrial Security Force)

Last Update: 2024-08-10 (UTC)
Between 700 and 749

CISF is just a unique organisation in paramilitary forces for India, which works for sea ways, airways and some of the major installations in India. In CISF there are some reserved battalions which works with the state police to protect law and orders. CISF plays a major role in Disaster Management, for Disaster Management course the personnel are trained from NISA, Hyderabad. Another unique thing which the CISF has is a Fire Wing which helps during fire accidents in Industries where CISF is on guard

NAICS: 92
NAICS Definition: Public Administration
Employees: 2,721
Subsidiaries: 0
12-month incidents
0
Known data breaches
1
Attack type number
1

The City of Bakersfield

1600 Truxtun Ave, None, Bakersfield, California, US, 93301
Last Update: 2025-07-26 (UTC)

The City of Bakersfield was incorporated on January 11, 1898 and is currently home to more than 403,000 residents, making it the ninth largest city in California, and 48th largest in the United States. The city operates under a Council-Manager form of government. The Mayor presides over the seven-member council as they act on behalf of our citizens. The council-appointed City Manager oversees the overall administration and day-to-day operations of the city. The City of Bakersfield welcomes and encourages all visitors of our online communities to contribute comments which are related to responsibilities of and topics pertaining to the City. The City of Bakersfield Social Media account is operated by the City of Bakersfield and posts are made by a City of Bakersfield staff member. Comments posted to this page will be monitored. The following postings/comments are prohibited: a. Comments not topically related to the administrator’s posting; b. Content that violates City policy, including abusive, harassing, intimidating, vulgar, obscene and offensive communications, communications that defame or libel others, and communications that infringe upon the privacy rights of others; c. Disparaging communications or jokes that are based on race, national origin, marital status, gender, sexual orientation, disability, age, religion, or any other characteristic protected under federal, state or local law; d. Communications of any copyrighted materials, trade secrets, proprietary information, or any other highly sensitive confidential information; e. Solicitation of others for commercial ventures or religious, social or political causes; or f. Comments or communications that violate the Brown Act. The City of Bakersfield reserves the right to remove content that is deemed in violation of City policy or any applicable law.

NAICS: 92
NAICS Definition: Public Administration
Employees: 535
Subsidiaries: 0
12-month incidents
0
Known data breaches
1
Attack type number
2

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/cisfcentralindustrialsecurityforce.jpeg
CISF (Central Industrial Security Force)
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/city-of-bakersfield.jpeg
The City of Bakersfield
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
CISF (Central Industrial Security Force)
100%
Compliance Rate
0/4 Standards Verified
The City of Bakersfield
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Government Administration Industry Average (This Year)

No incidents recorded for CISF (Central Industrial Security Force) in 2025.

Incidents vs Government Administration Industry Average (This Year)

No incidents recorded for The City of Bakersfield in 2025.

Incident History — CISF (Central Industrial Security Force) (X = Date, Y = Severity)

CISF (Central Industrial Security Force) cyber incidents detection timeline including parent company and subsidiaries

Incident History — The City of Bakersfield (X = Date, Y = Severity)

The City of Bakersfield cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/cisfcentralindustrialsecurityforce.jpeg
CISF (Central Industrial Security Force)
Incidents

Date Detected: 03/2022
Type:Breach
Attack Vector: Unsecured Database
Blog: Blog
https://images.rankiteo.com/companyimages/city-of-bakersfield.jpeg
The City of Bakersfield
Incidents

Date Detected: 7/2019
Type:Cyber Attack
Attack Vector: Unauthorized code insertion
Blog: Blog

Date Detected: 8/2018
Type:Breach
Attack Vector: Unauthorized Code Insertion
Blog: Blog

FAQ

The City of Bakersfield company demonstrates a stronger AI Cybersecurity Score compared to CISF (Central Industrial Security Force) company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

The City of Bakersfield company has faced a higher number of disclosed cyber incidents historically compared to CISF (Central Industrial Security Force) company.

In the current year, The City of Bakersfield company and CISF (Central Industrial Security Force) company have not reported any cyber incidents.

Neither The City of Bakersfield company nor CISF (Central Industrial Security Force) company has reported experiencing a ransomware attack publicly.

Both The City of Bakersfield company and CISF (Central Industrial Security Force) company have disclosed experiencing at least one data breach.

The City of Bakersfield company has reported targeted cyberattacks, while CISF (Central Industrial Security Force) company has not reported such incidents publicly.

Neither CISF (Central Industrial Security Force) company nor The City of Bakersfield company has reported experiencing or disclosing vulnerabilities publicly.

Neither CISF (Central Industrial Security Force) nor The City of Bakersfield holds any compliance certifications.

Neither company holds any compliance certifications.

Neither CISF (Central Industrial Security Force) company nor The City of Bakersfield company has publicly disclosed detailed information about the number of their subsidiaries.

CISF (Central Industrial Security Force) company employs more people globally than The City of Bakersfield company, reflecting its scale as a Government Administration.

Neither CISF (Central Industrial Security Force) nor The City of Bakersfield holds SOC 2 Type 1 certification.

Neither CISF (Central Industrial Security Force) nor The City of Bakersfield holds SOC 2 Type 2 certification.

Neither CISF (Central Industrial Security Force) nor The City of Bakersfield holds ISO 27001 certification.

Neither CISF (Central Industrial Security Force) nor The City of Bakersfield holds PCI DSS certification.

Neither CISF (Central Industrial Security Force) nor The City of Bakersfield holds HIPAA certification.

Neither CISF (Central Industrial Security Force) nor The City of Bakersfield holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

Cursor is a code editor built for programming with AI. In versions 1.7.44 and below, various NTFS path quirks allow a prompt injection attacker to circumvent sensitive file protections and overwrite files which Cursor requires human approval to overwrite. Modification of some of the protected files can lead to RCE. Must be chained with a prompt injection or malicious model attach. Only affects systems supporting NTFS. This issue is fixed in version 2.0.

Risk Information
cvss3
Base: 8.8
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Description

Cursor is a code editor built for programming with AI. In versions 1.7.52 and below, manipulating internal settings may lead to RCE. Cursor detects path manipulation via forward slashes (./.cursor/./././././mcp.json etc.), and requires human approval to complete the operation. However, the same kind of manipulation using backslashes was not correctly detected, allowing an attacker who had already achieved prompt injection or some other level of control to overwrite sensitive editor files without approval on Windows machines. This issue is fixed in version 2.0.

Risk Information
cvss3
Base: 8.8
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Description

Cursor is a code editor built for programming with AI. In versions 1.7.28 and below, an input validation flaw in Cursor's MCP server installation enables specially crafted deep-links to bypass the standard security warnings and conceal executed commands from users if they choose to accept the server. If an attacker is able to convince a victim to navigate to a malicious deeplink, the victim will not see the correct speedbump modal, and if they choose to accept, will execute commands specified by the attackers deeplink.

Risk Information
cvss3
Base: 8.8
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Description

LinkAce is a self-hosted archive to collect website links. In versions 2.3.1 and below, the social media sharing functionality contains a Stored Cross-Site Scripting (XSS) vulnerability that allows any authenticated user to inject arbitrary JavaScript by creating a link with malicious HTML in the title field. When a user views the link details page and the shareable links are rendered, the malicious JavaScript executes in their browser. This vulnerability affects multiple sharing services and can be exploited to steal session cookies, perform actions on behalf of users, or deliver malware. This issue is fixed in version 2.4.0.

Risk Information
cvss4
Base: 8.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

CVE-2025-59596 is a denial-of-service vulnerability in Secure Access Windows client versions 12.0 to 14.10 that is addressed in version 14.12. If a local networking policy is active, attackers on an adjacent network may be able to send a crafted packet and cause the client system to crash.

Risk Information
cvss4
Base: 6.0
Severity: LOW
CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X