Comparison Overview

City of Port Phillip

VS

Västra Götalandsregionen

City of Port Phillip

99a Carlisle Street, St Kilda, Victoria, 3182, AU
Last Update: 2026-01-21

The City of Port Phillip was formed in 1994 and is an amalgamation of the former cities of Port Melbourne, South Melbourne and St Kilda. We are an inner city council in Melbourne that includes the following neighbourhoods; St Kilda, Elwood, South Melbourne, Windsor, Ripponlea, Balaclava, St Kilda East, Port Melbourne, Albert Park, Middle Park. Council respectfully acknowledges the Traditional Owners of this land, the people of the Kulin Nations. We pay our respect to their Elders, past and present. We acknowledge and uphold their continuing relationship to this land.

NAICS: 92
NAICS Definition: Public Administration
Employees: 748
Subsidiaries: 24
12-month incidents
0
Known data breaches
1
Attack type number
2

Västra Götalandsregionen

Västra Götalandsregionen, Vänersborg, 462 80, SE
Last Update: 2026-01-20
Between 750 and 799

Region Västra Götaland is governed by democratically elected politicians and with just over 50,000 employees is one of Sweden’s biggest employers. It is tasked with offering good healthcare and dental care and providing the prerequisites for good public health, a rich cultural life, a good environment, jobs, research, education and good communications. All together, these provide a foundation for sustainable growth in Västra Götaland. Koncernen Västra Götalandsregionen finns till för människorna i Västra Götaland och för allt som ligger invånarna nära: jobb, utbildning, hälso- och sjukvård, kultur och kommunikationer. Västra Götalandsregionen ska bidra till hälsa och trygghet i vardagen och för ett livskraftigt Västra Götaland nu och i framtiden. Vi har ett gemensamt ansvar att se till den enskilda människans behov och till regionmedborgarnas samlade behov för att uppnå visionen Det goda livet. Det gör vi inom våra tre ansvarsområden: Hälso- och sjukvård, tillväxt och utveckling och kollektivtrafik. Koncernen har drygt 50 000 medarbetare som arbetar inom framförallt hälso-och sjukvård men även inom kollektivtrafik, kulturverksamhet, skolor, folktandvård, lokal- och fastighetsförvaltning och folkhälsofrågor. Att arbeta i Västra Götalandsregionen gör avtryck – hos människor, i samhället och för framtiden. Lediga tjänster finns på: www.vgregion.se/jobb

NAICS: 92
NAICS Definition: Public Administration
Employees: 16,663
Subsidiaries: 3
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/city-of-port-phillip.jpeg
City of Port Phillip
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/vastra-gotalandsregionen.jpeg
Västra Götalandsregionen
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
City of Port Phillip
100%
Compliance Rate
0/4 Standards Verified
Västra Götalandsregionen
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Government Administration Industry Average (This Year)

No incidents recorded for City of Port Phillip in 2026.

Incidents vs Government Administration Industry Average (This Year)

No incidents recorded for Västra Götalandsregionen in 2026.

Incident History — City of Port Phillip (X = Date, Y = Severity)

City of Port Phillip cyber incidents detection timeline including parent company and subsidiaries

Incident History — Västra Götalandsregionen (X = Date, Y = Severity)

Västra Götalandsregionen cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/city-of-port-phillip.jpeg
City of Port Phillip
Incidents

Date Detected: 12/2022
Type:Breach
Attack Vector: Unauthorized access
Blog: Blog

Date Detected: 02/2018
Type:Data Leak
Attack Vector: Unintentional Data Disclosure
Blog: Blog
https://images.rankiteo.com/companyimages/vastra-gotalandsregionen.jpeg
Västra Götalandsregionen
Incidents

No Incident

FAQ

Västra Götalandsregionen company demonstrates a stronger AI Cybersecurity Score compared to City of Port Phillip company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

City of Port Phillip company has historically faced a number of disclosed cyber incidents, whereas Västra Götalandsregionen company has not reported any.

In the current year, Västra Götalandsregionen company and City of Port Phillip company have not reported any cyber incidents.

Neither Västra Götalandsregionen company nor City of Port Phillip company has reported experiencing a ransomware attack publicly.

City of Port Phillip company has disclosed at least one data breach, while the other Västra Götalandsregionen company has not reported such incidents publicly.

Neither Västra Götalandsregionen company nor City of Port Phillip company has reported experiencing targeted cyberattacks publicly.

Neither City of Port Phillip company nor Västra Götalandsregionen company has reported experiencing or disclosing vulnerabilities publicly.

Neither City of Port Phillip nor Västra Götalandsregionen holds any compliance certifications.

Neither company holds any compliance certifications.

City of Port Phillip company has more subsidiaries worldwide compared to Västra Götalandsregionen company.

Västra Götalandsregionen company employs more people globally than City of Port Phillip company, reflecting its scale as a Government Administration.

Neither City of Port Phillip nor Västra Götalandsregionen holds SOC 2 Type 1 certification.

Neither City of Port Phillip nor Västra Götalandsregionen holds SOC 2 Type 2 certification.

Neither City of Port Phillip nor Västra Götalandsregionen holds ISO 27001 certification.

Neither City of Port Phillip nor Västra Götalandsregionen holds PCI DSS certification.

Neither City of Port Phillip nor Västra Götalandsregionen holds HIPAA certification.

Neither City of Port Phillip nor Västra Götalandsregionen holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

SummaryA command injection vulnerability (CWE-78) has been found to exist in the `wrangler pages deploy` command. The issue occurs because the `--commit-hash` parameter is passed directly to a shell command without proper validation or sanitization, allowing an attacker with control of `--commit-hash` to execute arbitrary commands on the system running Wrangler. Root causeThe commitHash variable, derived from user input via the --commit-hash CLI argument, is interpolated directly into a shell command using template literals (e.g.,  execSync(`git show -s --format=%B ${commitHash}`)). Shell metacharacters are interpreted by the shell, enabling command execution. ImpactThis vulnerability is generally hard to exploit, as it requires --commit-hash to be attacker controlled. The vulnerability primarily affects CI/CD environments where `wrangler pages deploy` is used in automated pipelines and the --commit-hash parameter is populated from external, potentially untrusted sources. An attacker could exploit this to: * Run any shell command. * Exfiltrate environment variables. * Compromise the CI runner to install backdoors or modify build artifacts. Credits Disclosed responsibly by kny4hacker. Mitigation * Wrangler v4 users are requested to upgrade to Wrangler v4.59.1 or higher. * Wrangler v3 users are requested to upgrade to Wrangler v3.114.17 or higher. * Users on Wrangler v2 (EOL) should upgrade to a supported major version.

Risk Information
cvss4
Base: 7.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).

Risk Information
cvss3
Base: 8.2
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Description

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data as well as unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:L).

Risk Information
cvss3
Base: 8.1
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:L
Description

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).

Risk Information
cvss3
Base: 8.2
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Description

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).

Risk Information
cvss3
Base: 8.2
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H