Comparison Overview

Dublin Port Company

VS

Yacht Crew Register

Dublin Port Company

Last Update: 2025-12-02
Between 700 and 749

Dublin Port is the largest freight and passenger port in Ireland with all cargo handling activities being carried out by private sector companies operating in intensely competitive markets within the Port. Dublin Port is one of five major ports classified as Tier 1 / Tier 2 ports in National Port Policy and categorised as core / comprehensive ports in the EU’s TEN-T network. Dublin Port’s large share of national port volumes, particularly in the Ro-Ro and Lo-Lo modes, arises due to a combination of two factors, location and depth of water. Dublin Port is a key part of the national port system and Dublin Port Company seeks to ensure that it plays its role in providing national port capacity. Dublin Port handles almost 50% of all trade in the Republic of Ireland. Located in the heart of Dublin City and at the hub of the national road and rail network, Dublin Port is a key strategic access point for Ireland and in particular the Dublin area.

NAICS: 483
NAICS Definition: Water Transportation
Employees: 147
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
1

Yacht Crew Register

Vancouver, CA
Last Update: 2025-12-02
Between 750 and 799

Yacht Crew Register has been successfully recruiting professional captains and crew since 1995, and has developed a reputation for confidentiality. We are a private yacht crew agency serving yacht owners and select management companies. We guarantee complete confidentiality of all information entrusted to us while managing your crew requests. We specialize in providing a personal service and have developed relationships with captains and crew for 25 years. We consider it an honor and privilege to represent over 30,000 professional yacht captains and crew located in every major port of the world. Yacht Crew Register is MLC compliant and meets all requirements of the 2006 Maritime Labor Convention.

NAICS: 483
NAICS Definition:
Employees: 10,001
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/dublin-port-company.jpeg
Dublin Port Company
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/yacht-crew-register.jpeg
Yacht Crew Register
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Dublin Port Company
100%
Compliance Rate
0/4 Standards Verified
Yacht Crew Register
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Maritime Transportation Industry Average (This Year)

No incidents recorded for Dublin Port Company in 2025.

Incidents vs Maritime Transportation Industry Average (This Year)

No incidents recorded for Yacht Crew Register in 2025.

Incident History — Dublin Port Company (X = Date, Y = Severity)

Dublin Port Company cyber incidents detection timeline including parent company and subsidiaries

Incident History — Yacht Crew Register (X = Date, Y = Severity)

Yacht Crew Register cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/dublin-port-company.jpeg
Dublin Port Company
Incidents

Date Detected: 6/2019
Type:Data Leak
Blog: Blog
https://images.rankiteo.com/companyimages/yacht-crew-register.jpeg
Yacht Crew Register
Incidents

No Incident

FAQ

Yacht Crew Register company demonstrates a stronger AI Cybersecurity Score compared to Dublin Port Company company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Dublin Port Company company has historically faced a number of disclosed cyber incidents, whereas Yacht Crew Register company has not reported any.

In the current year, Yacht Crew Register company and Dublin Port Company company have not reported any cyber incidents.

Neither Yacht Crew Register company nor Dublin Port Company company has reported experiencing a ransomware attack publicly.

Neither Yacht Crew Register company nor Dublin Port Company company has reported experiencing a data breach publicly.

Neither Yacht Crew Register company nor Dublin Port Company company has reported experiencing targeted cyberattacks publicly.

Neither Dublin Port Company company nor Yacht Crew Register company has reported experiencing or disclosing vulnerabilities publicly.

Neither Dublin Port Company nor Yacht Crew Register holds any compliance certifications.

Neither company holds any compliance certifications.

Neither Dublin Port Company company nor Yacht Crew Register company has publicly disclosed detailed information about the number of their subsidiaries.

Yacht Crew Register company employs more people globally than Dublin Port Company company, reflecting its scale as a Maritime Transportation.

Neither Dublin Port Company nor Yacht Crew Register holds SOC 2 Type 1 certification.

Neither Dublin Port Company nor Yacht Crew Register holds SOC 2 Type 2 certification.

Neither Dublin Port Company nor Yacht Crew Register holds ISO 27001 certification.

Neither Dublin Port Company nor Yacht Crew Register holds PCI DSS certification.

Neither Dublin Port Company nor Yacht Crew Register holds HIPAA certification.

Neither Dublin Port Company nor Yacht Crew Register holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

MCP Server Kubernetes is an MCP Server that can connect to a Kubernetes cluster and manage it. Prior to 2.9.8, there is a security issue exists in the exec_in_pod tool of the mcp-server-kubernetes MCP Server. The tool accepts user-provided commands in both array and string formats. When a string format is provided, it is passed directly to shell interpretation (sh -c) without input validation, allowing shell metacharacters to be interpreted. This vulnerability can be exploited through direct command injection or indirect prompt injection attacks, where AI agents may execute commands without explicit user intent. This vulnerability is fixed in 2.9.8.

Risk Information
cvss3
Base: 6.4
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
Description

XML external entity (XXE) injection in eyoucms v1.7.1 allows remote attackers to cause a denial of service via crafted body of a POST request.

Description

An issue was discovered in Fanvil x210 V2 2.12.20 allowing unauthenticated attackers on the local network to access administrative functions of the device (e.g. file upload, firmware update, reboot...) via a crafted authentication bypass.

Description

Cal.com is open-source scheduling software. Prior to 5.9.8, A flaw in the login credentials provider allows an attacker to bypass password verification when a TOTP code is provided, potentially gaining unauthorized access to user accounts. This issue exists due to problematic conditional logic in the authentication flow. This vulnerability is fixed in 5.9.8.

Risk Information
cvss4
Base: 9.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Rhino is an open-source implementation of JavaScript written entirely in Java. Prior to 1.8.1, 1.7.15.1, and 1.7.14.1, when an application passed an attacker controlled float poing number into the toFixed() function, it might lead to high CPU consumption and a potential Denial of Service. Small numbers go through this call stack: NativeNumber.numTo > DToA.JS_dtostr > DToA.JS_dtoa > DToA.pow5mult where pow5mult attempts to raise 5 to a ridiculous power. This vulnerability is fixed in 1.8.1, 1.7.15.1, and 1.7.14.1.

Risk Information
cvss4
Base: 5.5
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X