Company Details
contemporary-design-group
6
282
337
contemporarydesign.com
0
CON_1332669
In-progress

Contemporary Design Group Company CyberSecurity Posture
contemporarydesign.comWE'RE A NATIONAL ASSOCIATION OF LOCAL, INDEPENDENT FURNITURE RETAILERS with 27 member retailers and 39 showrooms in the U.S. In 1983, Ed and Howard Haimsohn, father and son owners of Lawrance Furniture in San Diego, CA had an idea. What if they could gather a community of likeminded retailers with whom they could share ideas, best practices, and innovative advertising solutions? They would be able to combine the power of large national chains with the unique individuality of local retailers. With that, they began recruiting other independent contemporary furniture stores that shared that vision, and Contemporary Design Group was born. Today CDG has become a dynamic networking and buying group- working with top manufacturers and suppliers around the world to develop the finest selection in contemporary home furnishings. View a list of retailer members at http://www.contemporarydesign.com/find-my-store.html
Company Details
contemporary-design-group
6
282
337
contemporarydesign.com
0
CON_1332669
In-progress
Between 750 and 799

CDG Global Score (TPRM)XXXX



No incidents recorded for Contemporary Design Group in 2025.
No incidents recorded for Contemporary Design Group in 2025.
No incidents recorded for Contemporary Design Group in 2025.
CDG cyber incidents detection timeline including parent company and subsidiaries

WE'RE A NATIONAL ASSOCIATION OF LOCAL, INDEPENDENT FURNITURE RETAILERS with 27 member retailers and 39 showrooms in the U.S. In 1983, Ed and Howard Haimsohn, father and son owners of Lawrance Furniture in San Diego, CA had an idea. What if they could gather a community of likeminded retailers with whom they could share ideas, best practices, and innovative advertising solutions? They would be able to combine the power of large national chains with the unique individuality of local retailers. With that, they began recruiting other independent contemporary furniture stores that shared that vision, and Contemporary Design Group was born. Today CDG has become a dynamic networking and buying group- working with top manufacturers and suppliers around the world to develop the finest selection in contemporary home furnishings. View a list of retailer members at http://www.contemporarydesign.com/find-my-store.html


Creative has been providing comprehensive expertise in commercial interiors since 1991 with showrooms in Milwaukee, Madison and Green Bay. Known as a “Specialty Contractor” our services include interior design, interior construction, painting, commercial furnishings and facility services. Creative i

About Us Nearly 50 years leading the design and equipment of workplaces. Hand in hand with architects and interior designers in common projects. Ofita is a benchmark in the manufacture of furniture for workplaces, office desks, office chairs, desks and cabinets. In most projects, we personalize

Tanatel Trading Co. was founded back in 1998 to primarily promote the group furniture sector. Over the years, the company expanded its presence in in both geography & product-wise. Currently, the company runs 18 showrooms around the kingdom for owned and licenced brands (e.g. Tanatel, Space & Co, Pe

We created Ivars USA in 2006 to provide a service. We wanted to create an intelligent, international network-based, organization with a focus on office furniture components development and supply. Our extensive experience in seating components and custom castings, coupled with an extraordinary mar

ZOLi Contemporary Living prides itself as the metro area's premier source for European contemporary modern furniture, providing quality choices in home furnishings that suit our Colorado lifestyle. Founded originally in 1976 as Danish Design Center, our collection, showcased then in Denver and Bould

El usbe es un cargador solar para dispositivos móviles. Es completamente autónomo, por lo que no necesita estar conectado a la red eléctrica. Funciona únicamente con energía solar y está pensado para su utilización en espacios públicos como plazas, parques infantiles, playas e incluso en lugares com
.png)
HONG KONG, HK – November 24, 2025 – PRESSADVANTAGE –. Ginza Diamond Shiraishi Hong Kong today announced an enhanced design framework for its 結婚戒指...
HONG KONG, HK – November 24, 2025 – PRESSADVANTAGE –. Ginza Diamond Shiraishi Hong Kong today announced an enhanced design framework for its 結婚戒指...
Norcross, Georgia – November 24, 2025 – PRESSADVANTAGE –. The UniqHouse Norcross, a remodeling company serving the greater Atlanta metro area, has expanded...
Norcross, Georgia – November 24, 2025 – PRESSADVANTAGE –. The UniqHouse Norcross, a remodeling company serving the greater Atlanta metro area, has expanded...
LONDON, UK – November 10, 2025 – PRESSADVANTAGE –. Otto Tiles and Design strengthens its position as a leading destination for handcrafted and contemporary...
VMPL New Delhi [India], November 10: As 2025 concludes, Entrepreneur News, NAVOTRA Group's flagship business media brand released its final...
Tech News News: US lawmakers are urging the FTC to probe Flock Safety, a license plate camera network, over lax cybersecurity.
RICHMOND, VA – October 30, 2025 – PRESSADVANTAGE –. NextDAY Cabinets Richmond Showroom has introduced an extensive 29-page showcase featuring the complete...
Careers News: India's tech talent is crucial for global digital transformation. Demand for AI, cybersecurity, and software skills is soaring...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Contemporary Design Group is http://www.contemporarydesign.com.
According to Rankiteo, Contemporary Design Group’s AI-generated cybersecurity score is 753, reflecting their Fair security posture.
According to Rankiteo, Contemporary Design Group currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Contemporary Design Group is not certified under SOC 2 Type 1.
According to Rankiteo, Contemporary Design Group does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Contemporary Design Group is not listed as GDPR compliant.
According to Rankiteo, Contemporary Design Group does not currently maintain PCI DSS compliance.
According to Rankiteo, Contemporary Design Group is not compliant with HIPAA regulations.
According to Rankiteo,Contemporary Design Group is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Contemporary Design Group operates primarily in the Furniture and Home Furnishings Manufacturing industry.
Contemporary Design Group employs approximately 6 people worldwide.
Contemporary Design Group presently has no subsidiaries across any sectors.
Contemporary Design Group’s official LinkedIn profile has approximately 282 followers.
Contemporary Design Group is classified under the NAICS code 337, which corresponds to Furniture and Related Product Manufacturing.
No, Contemporary Design Group does not have a profile on Crunchbase.
Yes, Contemporary Design Group maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/contemporary-design-group.
As of November 28, 2025, Rankiteo reports that Contemporary Design Group has not experienced any cybersecurity incidents.
Contemporary Design Group has an estimated 2,617 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, Contemporary Design Group has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
ThingsBoard in versions prior to v4.2.1 allows an authenticated user to upload malicious SVG images via the "Image Gallery", leading to a Stored Cross-Site Scripting (XSS) vulnerability. The exploit can be triggered when any user accesses the public API endpoint of the malicious SVG images, or if the malicious images are embedded in an `iframe` element, during a widget creation, deployed to any page of the platform (e.g., dashboards), and accessed during normal operations. The vulnerability resides in the `ImageController`, which fails to restrict the execution of JavaScript code when an image is loaded by the user's browser. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions.
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to sanitize team email addresses to be visible only to Team Admins, which allows any authenticated user to view team email addresses via the GET /api/v4/channels/{channel_id}/common_teams endpoint
Exposure of email service credentials to users without administrative rights in Devolutions Server.This issue affects Devolutions Server: before 2025.2.21, before 2025.3.9.
Exposure of credentials in unintended requests in Devolutions Server.This issue affects Server: through 2025.2.20, through 2025.3.8.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.