Comparison Overview

COMMUNITY - Culture/Territoire/Sociétal

VS

Sing for Hope

COMMUNITY - Culture/Territoire/Sociétal

36 rue de Ponthieu, Paris, 75008, FR
Last Update: 2025-12-10
Between 800 and 849

********************************************************************* Community est une société d'Ingénierie culturelle. ********************************************************************* Chez Community, nous défendons tous les jours l’idée que l’art et la culture participent activement au développement harmonieux de nos sociétés modernes et que nous en avons plus que jamais besoin. Nous croyons aussi fermement que l’art et la culture ne peuvent plus être pensés comme des champs isolés mais comme des forces dynamiques qui interagissent de façon positive avec l’économie, le social, l’éducation ou le tourisme. C’est pourquoi, lorsque nous envisageons des solutions culturelles pour nos clients ou lorsque nous concevons nos propres programmes, nous veillons toujours à ce qu’ils puissent générer des effets de levier tant dans le domaine du social et de l’éducation que dans celui de l’économie et du tourisme.

NAICS: 7111
NAICS Definition: Performing Arts Companies
Employees: 132
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Sing for Hope

undefined, New York, NY, 10005, US
Last Update: 2025-12-10
Between 750 and 799

Sing for Hope harnesses the power of the arts to create a better world. Our creative programs bring hope, healing, and connection to millions of people in hospitals, schools, care facilities, refugee camps, transit hubs, and public spaces worldwide. A non-profit organization founded in New York City in response to the events of 9/11, Sing for Hope partners with hundreds of community-based organizations, mobilizes thousands of artists in creative service, and produces artist-created Sing for Hope Pianos across the US and around the world. The official Cultural Partner of the World Summit of Nobel Peace Laureates, Sing for Hope champions art for all because we believe the arts have an unmatched capacity to uplift, unite, and heal. Learn more at singforhope.org. facebook.com/sing4hope instagram.com/singforhope Sing for Hope is a registered 501(c)(3) non-profit organization.

NAICS: 711
NAICS Definition:
Employees: 85
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/community.jpeg
COMMUNITY - Culture/Territoire/Sociétal
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/sing-for-hope.jpeg
Sing for Hope
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
COMMUNITY - Culture/Territoire/Sociétal
100%
Compliance Rate
0/4 Standards Verified
Sing for Hope
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Performing Arts Industry Average (This Year)

No incidents recorded for COMMUNITY - Culture/Territoire/Sociétal in 2025.

Incidents vs Performing Arts Industry Average (This Year)

No incidents recorded for Sing for Hope in 2025.

Incident History — COMMUNITY - Culture/Territoire/Sociétal (X = Date, Y = Severity)

COMMUNITY - Culture/Territoire/Sociétal cyber incidents detection timeline including parent company and subsidiaries

Incident History — Sing for Hope (X = Date, Y = Severity)

Sing for Hope cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/community.jpeg
COMMUNITY - Culture/Territoire/Sociétal
Incidents

No Incident

https://images.rankiteo.com/companyimages/sing-for-hope.jpeg
Sing for Hope
Incidents

No Incident

FAQ

COMMUNITY - Culture/Territoire/Sociétal company demonstrates a stronger AI Cybersecurity Score compared to Sing for Hope company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Historically, Sing for Hope company has disclosed a higher number of cyber incidents compared to COMMUNITY - Culture/Territoire/Sociétal company.

In the current year, Sing for Hope company and COMMUNITY - Culture/Territoire/Sociétal company have not reported any cyber incidents.

Neither Sing for Hope company nor COMMUNITY - Culture/Territoire/Sociétal company has reported experiencing a ransomware attack publicly.

Neither Sing for Hope company nor COMMUNITY - Culture/Territoire/Sociétal company has reported experiencing a data breach publicly.

Neither Sing for Hope company nor COMMUNITY - Culture/Territoire/Sociétal company has reported experiencing targeted cyberattacks publicly.

Neither COMMUNITY - Culture/Territoire/Sociétal company nor Sing for Hope company has reported experiencing or disclosing vulnerabilities publicly.

Neither COMMUNITY - Culture/Territoire/Sociétal nor Sing for Hope holds any compliance certifications.

Neither company holds any compliance certifications.

Neither COMMUNITY - Culture/Territoire/Sociétal company nor Sing for Hope company has publicly disclosed detailed information about the number of their subsidiaries.

COMMUNITY - Culture/Territoire/Sociétal company employs more people globally than Sing for Hope company, reflecting its scale as a Performing Arts.

Neither COMMUNITY - Culture/Territoire/Sociétal nor Sing for Hope holds SOC 2 Type 1 certification.

Neither COMMUNITY - Culture/Territoire/Sociétal nor Sing for Hope holds SOC 2 Type 2 certification.

Neither COMMUNITY - Culture/Territoire/Sociétal nor Sing for Hope holds ISO 27001 certification.

Neither COMMUNITY - Culture/Territoire/Sociétal nor Sing for Hope holds PCI DSS certification.

Neither COMMUNITY - Culture/Territoire/Sociétal nor Sing for Hope holds HIPAA certification.

Neither COMMUNITY - Culture/Territoire/Sociétal nor Sing for Hope holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

NXLog Agent before 6.11 can load a file specified by the OPENSSL_CONF environment variable.

Risk Information
cvss3
Base: 8.1
Severity: HIGH
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
Description

uriparser through 0.9.9 allows unbounded recursion and stack consumption, as demonstrated by ParseMustBeSegmentNzNc with large input containing many commas.

Risk Information
cvss3
Base: 2.9
Severity: HIGH
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
Description

A vulnerability was detected in Mayan EDMS up to 4.10.1. The affected element is an unknown function of the file /authentication/. The manipulation results in cross site scripting. The attack may be performed from remote. The exploit is now public and may be used. Upgrading to version 4.10.2 is sufficient to fix this issue. You should upgrade the affected component. The vendor confirms that this is "[f]ixed in version 4.10.2". Furthermore, that "[b]ackports for older versions in process and will be out as soon as their respective CI pipelines complete."

Risk Information
cvss2
Base: 5.0
Severity: LOW
AV:N/AC:L/Au:N/C:N/I:P/A:N
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

MJML through 4.18.0 allows mj-include directory traversal to test file existence and (in the type="css" case) read files. NOTE: this issue exists because of an incomplete fix for CVE-2020-12827.

Risk Information
cvss3
Base: 4.5
Severity: HIGH
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:L
Description

A half-blind Server Side Request Forgery (SSRF) vulnerability exists in kube-controller-manager when using the in-tree Portworx StorageClass. This vulnerability allows authorized users to leak arbitrary information from unprotected endpoints in the control plane’s host network (including link-local or loopback services).

Risk Information
cvss3
Base: 5.8
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N