Comparison Overview

DISH Network

VS

Axiata

DISH Network

9601 S. Meridian Blvd, Englewood, CO, 80112, US
Last Update: 2025-12-19
Between 650 and 699

Our adventure began by changing the way people watched TV, bringing DISH to where big cable wouldn’t: rural America. Since then, we have reinvented ourselves and our own industry with Sling TV to give millions of consumers more choice in entertainment. Today, we’ve officially entered the consumer wireless industry as the fourth largest wireless provider with our acquisitions of Boost Mobile, Ting Mobile and Gen Mobile — but that’s just the start. We’re building America’s first cloud-native 5G network to transform the way we live, work and play with unlimited possibilities.

NAICS: 517
NAICS Definition: Telecommunications
Employees: 23,216
Subsidiaries: 8
12-month incidents
0
Known data breaches
1
Attack type number
2

Axiata

Level 23, Axiata Tower, 9 Jalan Stesen Sentral 5 KL Sentral, Kuala Lumpur 50470, MY
Last Update: 2025-12-17
Between 750 and 799

AXIATA GROUP BERHAD 242188-H (199201010685) In pursuit of its vision to be The Next Generation Digital Champion, Axiata is a diversified telecommunications and digital conglomerate operating Digital Telcos, Digital Businesses and Infrastructure businesses across a footprint spanning ASEAN and South Asia. The Group has controlling stakes in market-leading mobile and fixed operators in the region including 'XL’ and ‘Link Net' in Indonesia, 'Dialog' in Sri Lanka, 'Robi' in Bangladesh, and 'Smart' in Cambodia while 'CelcomDigi' in Malaysia is a Key Associate Company. Axiata’s regional digital business verticals comprise ‘Boost’ a fintech company, and ‘ADA’, a digital analytics and AI company. 'EDOTCO' is among the top 10 independent TowerCos globally, operating in nine countries to deliver telecommunications infrastructure services. As a committed and long-term investor, the Group actively supports and drives young talent development; community outreach; as well as climate change initiatives. Axiata's broader goal of Advancing Asia aims to piece together the best in the region in terms of innovation, connectivity and talent to drive digital inclusion and sustainable progress across our markets. Find out more at www.axiata.com

NAICS: 517
NAICS Definition: Telecommunications
Employees: 10,001
Subsidiaries: 2
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/dish-network.jpeg
DISH Network
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/axiata.jpeg
Axiata
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
DISH Network
100%
Compliance Rate
0/4 Standards Verified
Axiata
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Telecommunications Industry Average (This Year)

No incidents recorded for DISH Network in 2025.

Incidents vs Telecommunications Industry Average (This Year)

No incidents recorded for Axiata in 2025.

Incident History — DISH Network (X = Date, Y = Severity)

DISH Network cyber incidents detection timeline including parent company and subsidiaries

Incident History — Axiata (X = Date, Y = Severity)

Axiata cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/dish-network.jpeg
DISH Network
Incidents

Date Detected: 05/2023
Type:Ransomware
Attack Vector: Compromised Windows domain controllers
Motivation: Ransom
Blog: Blog

Date Detected: 02/2023
Type:Ransomware
Attack Vector: Ransomware
Motivation: Financial Gain
Blog: Blog

Date Detected: 3/2019
Type:Breach
Attack Vector: Unauthorized Access
Blog: Blog
https://images.rankiteo.com/companyimages/axiata.jpeg
Axiata
Incidents

No Incident

FAQ

Axiata company demonstrates a stronger AI Cybersecurity Score compared to DISH Network company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

DISH Network company has historically faced a number of disclosed cyber incidents, whereas Axiata company has not reported any.

In the current year, Axiata company and DISH Network company have not reported any cyber incidents.

DISH Network company has confirmed experiencing a ransomware attack, while Axiata company has not reported such incidents publicly.

DISH Network company has disclosed at least one data breach, while the other Axiata company has not reported such incidents publicly.

Neither Axiata company nor DISH Network company has reported experiencing targeted cyberattacks publicly.

Neither DISH Network company nor Axiata company has reported experiencing or disclosing vulnerabilities publicly.

Neither DISH Network nor Axiata holds any compliance certifications.

Neither company holds any compliance certifications.

DISH Network company has more subsidiaries worldwide compared to Axiata company.

DISH Network company employs more people globally than Axiata company, reflecting its scale as a Telecommunications.

Neither DISH Network nor Axiata holds SOC 2 Type 1 certification.

Neither DISH Network nor Axiata holds SOC 2 Type 2 certification.

Neither DISH Network nor Axiata holds ISO 27001 certification.

Neither DISH Network nor Axiata holds PCI DSS certification.

Neither DISH Network nor Axiata holds HIPAA certification.

Neither DISH Network nor Axiata holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

Marshmallow is a lightweight library for converting complex objects to and from simple Python datatypes. In versions from 3.0.0rc1 to before 3.26.2 and from 4.0.0 to before 4.1.2, Schema.load(data, many=True) is vulnerable to denial of service attacks. A moderately sized request can consume a disproportionate amount of CPU time. This issue has been patched in version 3.26.2 and 4.1.2.

Risk Information
cvss3
Base: 5.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Description

KEDA is a Kubernetes-based Event Driven Autoscaling component. Prior to versions 2.17.3 and 2.18.3, an Arbitrary File Read vulnerability has been identified in KEDA, potentially affecting any KEDA resource that uses TriggerAuthentication to configure HashiCorp Vault authentication. The vulnerability stems from an incorrect or insufficient path validation when loading the Service Account Token specified in spec.hashiCorpVault.credential.serviceAccount. An attacker with permissions to create or modify a TriggerAuthentication resource can exfiltrate the content of any file from the node's filesystem (where the KEDA pod resides) by directing the file's content to a server under their control, as part of the Vault authentication request. The potential impact includes the exfiltration of sensitive system information, such as secrets, keys, or the content of files like /etc/passwd. This issue has been patched in versions 2.17.3 and 2.18.3.

Risk Information
cvss4
Base: 8.2
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Fedify is a TypeScript library for building federated server apps powered by ActivityPub. Prior to versions 1.6.13, 1.7.14, 1.8.15, and 1.9.2, a Regular Expression Denial of Service (ReDoS) vulnerability exists in Fedify's document loader. The HTML parsing regex at packages/fedify/src/runtime/docloader.ts:259 contains nested quantifiers that cause catastrophic backtracking when processing maliciously crafted HTML responses. This issue has been patched in versions 1.6.13, 1.7.14, 1.8.15, and 1.9.2.

Risk Information
cvss3
Base: 7.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Description

Authenticated Remote Code Execution (RCE) in PluXml CMS 5.8.22 allows an attacker with administrator panel access to inject a malicious PHP webshell into a theme file (e.g., home.php).

Risk Information
cvss3
Base: 6.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
Description

An issue was discovered in Xiongmai XM530 IP cameras on firmware V5.00.R02.000807D8.10010.346624.S.ONVIF 21.06. The GetStreamUri exposes RTSP URIs containing hardcoded credentials enabling direct unauthorized video stream access.

Risk Information
cvss3
Base: 7.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N