Comparison Overview

Discovery Spotlight Expo and Competition

VS

Ashleyliane Dance Company

Discovery Spotlight Expo and Competition

1240 Winnowing Way, Mount Pleasant, South Carolina, 29466, US
Last Update: 2025-12-14

Since 2006, Discovery Spotlight™ has been providing aspiring models, actors, singers and dancers exposure to some of the most influential agents, recruiters and casting directors in the entertainment industry who work with many recognizable brands. Discovery Spotlight is much more than just a model and talent expo though. Training workshops and networking with show business professionals teach participants how to use their craft in the entertainment business. The event weekend is structured to foster assertiveness and independence, build confidence and self worth, and stress the importance of preparedness and hard work. The Discovery Spotlight Model & Talent Expo helps increase awareness of one's true potential and ability to succeed. We truly believe that Discovery Begins Within.

NAICS: 711
NAICS Definition:
Employees: 7
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Ashleyliane Dance Company

8 N Newstead Ave, St Louis, Missouri, 63108, US
Last Update: 2025-12-11
Between 750 and 799

Ashleyliane Dance Company (ADC) is a professional performance organization under the artistic direction of Ashley L. Tate. Since its inception in 2007, ADC has performed at a plethora of major events and private engagements, including but not limited to: the Muny, Fair St. Louis, First Night, Loop in Motion, Dancing in the Street, Casino Queen, Four Seasons Hotel and The Pageant. ADC has been featured on Fox 2 News,"Best of the STL"​ on STL TV, Show Me St. Louis, HEC-TV, and the Nine Network and in Alive Magazine and the St. Louis Post-Dispatch. The company has produced a number of dance concerts at the Center of Creative Arts (COCA), Ivory Theatre, and Missouri History Museum, Edison Theatre, and The Grandel. ADC has also served as entertainment for the Susan G. Komen Race for the Cure, Working Women's Survival Show, LLUSA's Light the Night, and more! They have also been invited to perform at the Dance Chicago Festival, the American College Dance Association Convention, the University of Illinois-Chicago, the Chicago Choreographers'​ Carnival, the Pulse On Tour Dance Convention in Chicago and Las Vegas, as well Peridance Capezio Center, TADA! Theater, and Baruch Performing Arts Center in New York City. ADC is a proud resident of the Kranzberg Arts Foundation.

NAICS: 711
NAICS Definition:
Employees: 6
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/discovery-spotlight-expo-and-competition.jpeg
Discovery Spotlight Expo and Competition
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/ashleyliane-dance-company.jpeg
Ashleyliane Dance Company
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Discovery Spotlight Expo and Competition
100%
Compliance Rate
0/4 Standards Verified
Ashleyliane Dance Company
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Performing Arts Industry Average (This Year)

No incidents recorded for Discovery Spotlight Expo and Competition in 2025.

Incidents vs Performing Arts Industry Average (This Year)

No incidents recorded for Ashleyliane Dance Company in 2025.

Incident History — Discovery Spotlight Expo and Competition (X = Date, Y = Severity)

Discovery Spotlight Expo and Competition cyber incidents detection timeline including parent company and subsidiaries

Incident History — Ashleyliane Dance Company (X = Date, Y = Severity)

Ashleyliane Dance Company cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/discovery-spotlight-expo-and-competition.jpeg
Discovery Spotlight Expo and Competition
Incidents

No Incident

https://images.rankiteo.com/companyimages/ashleyliane-dance-company.jpeg
Ashleyliane Dance Company
Incidents

No Incident

FAQ

Ashleyliane Dance Company company demonstrates a stronger AI Cybersecurity Score compared to Discovery Spotlight Expo and Competition company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Historically, Ashleyliane Dance Company company has disclosed a higher number of cyber incidents compared to Discovery Spotlight Expo and Competition company.

In the current year, Ashleyliane Dance Company company and Discovery Spotlight Expo and Competition company have not reported any cyber incidents.

Neither Ashleyliane Dance Company company nor Discovery Spotlight Expo and Competition company has reported experiencing a ransomware attack publicly.

Neither Ashleyliane Dance Company company nor Discovery Spotlight Expo and Competition company has reported experiencing a data breach publicly.

Neither Ashleyliane Dance Company company nor Discovery Spotlight Expo and Competition company has reported experiencing targeted cyberattacks publicly.

Neither Discovery Spotlight Expo and Competition company nor Ashleyliane Dance Company company has reported experiencing or disclosing vulnerabilities publicly.

Neither Discovery Spotlight Expo and Competition nor Ashleyliane Dance Company holds any compliance certifications.

Neither company holds any compliance certifications.

Neither Discovery Spotlight Expo and Competition company nor Ashleyliane Dance Company company has publicly disclosed detailed information about the number of their subsidiaries.

Discovery Spotlight Expo and Competition company employs more people globally than Ashleyliane Dance Company company, reflecting its scale as a Performing Arts.

Neither Discovery Spotlight Expo and Competition nor Ashleyliane Dance Company holds SOC 2 Type 1 certification.

Neither Discovery Spotlight Expo and Competition nor Ashleyliane Dance Company holds SOC 2 Type 2 certification.

Neither Discovery Spotlight Expo and Competition nor Ashleyliane Dance Company holds ISO 27001 certification.

Neither Discovery Spotlight Expo and Competition nor Ashleyliane Dance Company holds PCI DSS certification.

Neither Discovery Spotlight Expo and Competition nor Ashleyliane Dance Company holds HIPAA certification.

Neither Discovery Spotlight Expo and Competition nor Ashleyliane Dance Company holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

A weakness has been identified in itsourcecode Online Pet Shop Management System 1.0. This vulnerability affects unknown code of the file /pet1/addcnp.php. This manipulation of the argument cnpname causes sql injection. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in Tenda AX9 22.03.01.46. This affects the function image_check of the component httpd. The manipulation results in use of weak hash. It is possible to launch the attack remotely. A high complexity level is associated with this attack. It is indicated that the exploitability is difficult. The exploit has been released to the public and may be exploited.

Risk Information
cvss2
Base: 2.6
Severity: HIGH
AV:N/AC:H/Au:N/C:N/I:P/A:N
cvss3
Base: 3.7
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
cvss4
Base: 6.3
Severity: HIGH
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A weakness has been identified in code-projects Student File Management System 1.0. This issue affects some unknown processing of the file /admin/update_student.php. This manipulation of the argument stud_id causes sql injection. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in code-projects Student File Management System 1.0. This vulnerability affects unknown code of the file /admin/save_user.php. The manipulation of the argument firstname results in sql injection. The attack can be executed remotely. The exploit has been released to the public and may be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was identified in code-projects Student File Management System 1.0. This affects an unknown part of the file /admin/update_user.php. The manipulation of the argument user_id leads to sql injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X