Comparison Overview

Edge Motor Museum, Inc

VS

Nerman Museum of Contemporary Art

Edge Motor Museum, Inc

645 Marshall Ave, Memphis, Tennessee, 38103, US
Last Update: 2025-12-02

The Edge Motor Museum is a non-profit 501(c)(3) organization focused on preserving vehicles in their original state and presenting them in their proper historical context for educational purposes. The vehicles presented are a geopolitical reflection of eras in which they were designed, built, sold, and driven, and provide context to the legacies they leave when maintained in their original state.

NAICS: 712
NAICS Definition:
Employees: 4
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Nerman Museum of Contemporary Art

12345 College Blvd, Overland Park, Kansas, 66210, US
Last Update: 2025-12-01
Between 750 and 799

The Nerman Museum of Contemporary Art has earned its place in the vanguard of contemporary art through its cutting-edge art exhibitions and permanent collection. The collection focuses on international, national, and regional contemporary artists, with an emphasis on diverse practitioners and educational access. In addition to gallery spaces within the Nerman Museum, 400 works from the collection are installed across campus, ensuring visibility and accessibility for the JCCC campus community, greater Kansas City area residents, and visitors.

NAICS: 712
NAICS Definition: Museums, Historical Sites, and Similar Institutions
Employees: 2
Subsidiaries: 9
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/edge-motor-museum-inc.jpeg
Edge Motor Museum, Inc
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/nerman-museum-of-contemporary-art.jpeg
Nerman Museum of Contemporary Art
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Edge Motor Museum, Inc
100%
Compliance Rate
0/4 Standards Verified
Nerman Museum of Contemporary Art
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Museums, Historical Sites, and Zoos Industry Average (This Year)

No incidents recorded for Edge Motor Museum, Inc in 2025.

Incidents vs Museums, Historical Sites, and Zoos Industry Average (This Year)

No incidents recorded for Nerman Museum of Contemporary Art in 2025.

Incident History — Edge Motor Museum, Inc (X = Date, Y = Severity)

Edge Motor Museum, Inc cyber incidents detection timeline including parent company and subsidiaries

Incident History — Nerman Museum of Contemporary Art (X = Date, Y = Severity)

Nerman Museum of Contemporary Art cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/edge-motor-museum-inc.jpeg
Edge Motor Museum, Inc
Incidents

No Incident

https://images.rankiteo.com/companyimages/nerman-museum-of-contemporary-art.jpeg
Nerman Museum of Contemporary Art
Incidents

No Incident

FAQ

Edge Motor Museum, Inc company demonstrates a stronger AI Cybersecurity Score compared to Nerman Museum of Contemporary Art company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Historically, Nerman Museum of Contemporary Art company has disclosed a higher number of cyber incidents compared to Edge Motor Museum, Inc company.

In the current year, Nerman Museum of Contemporary Art company and Edge Motor Museum, Inc company have not reported any cyber incidents.

Neither Nerman Museum of Contemporary Art company nor Edge Motor Museum, Inc company has reported experiencing a ransomware attack publicly.

Neither Nerman Museum of Contemporary Art company nor Edge Motor Museum, Inc company has reported experiencing a data breach publicly.

Neither Nerman Museum of Contemporary Art company nor Edge Motor Museum, Inc company has reported experiencing targeted cyberattacks publicly.

Neither Edge Motor Museum, Inc company nor Nerman Museum of Contemporary Art company has reported experiencing or disclosing vulnerabilities publicly.

Neither Edge Motor Museum, Inc nor Nerman Museum of Contemporary Art holds any compliance certifications.

Neither company holds any compliance certifications.

Nerman Museum of Contemporary Art company has more subsidiaries worldwide compared to Edge Motor Museum, Inc company.

Edge Motor Museum, Inc company employs more people globally than Nerman Museum of Contemporary Art company, reflecting its scale as a Museums, Historical Sites, and Zoos.

Neither Edge Motor Museum, Inc nor Nerman Museum of Contemporary Art holds SOC 2 Type 1 certification.

Neither Edge Motor Museum, Inc nor Nerman Museum of Contemporary Art holds SOC 2 Type 2 certification.

Neither Edge Motor Museum, Inc nor Nerman Museum of Contemporary Art holds ISO 27001 certification.

Neither Edge Motor Museum, Inc nor Nerman Museum of Contemporary Art holds PCI DSS certification.

Neither Edge Motor Museum, Inc nor Nerman Museum of Contemporary Art holds HIPAA certification.

Neither Edge Motor Museum, Inc nor Nerman Museum of Contemporary Art holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to 7.1.2-9 and 6.9.13-34, there is a vulnerability in ImageMagick’s Magick++ layer that manifests when Options::fontFamily is invoked with an empty string. Clearing a font family calls RelinquishMagickMemory on _drawInfo->font, freeing the font string but leaving _drawInfo->font pointing to freed memory while _drawInfo->family is set to that (now-invalid) pointer. Any later cleanup or reuse of _drawInfo->font re-frees or dereferences dangling memory. DestroyDrawInfo and other setters (Options::font, Image::font) assume _drawInfo->font remains valid, so destruction or subsequent updates trigger crashes or heap corruption. This vulnerability is fixed in 7.1.2-9 and 6.9.13-34.

Risk Information
cvss3
Base: 4.9
Severity: HIGH
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
Description

FeehiCMS version 2.1.1 has a Remote Code Execution via Unrestricted File Upload in Ad Management. FeehiCMS version 2.1.1 allows authenticated remote attackers to upload files that the server later executes (or stores in an executable location) without sufficient validation, sanitization, or execution restrictions. An authenticated remote attacker can upload a crafted PHP file and cause the application or web server to execute it, resulting in remote code execution (RCE).

Risk Information
cvss3
Base: 6.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Description

PHPGurukul Billing System 1.0 is vulnerable to SQL Injection in the admin/index.php endpoint. Specifically, the username parameter accepts unvalidated user input, which is then concatenated directly into a backend SQL query.

Risk Information
cvss3
Base: 6.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Description

NMIS/BioDose software V22.02 and previous versions contain executable binaries with plain text hard-coded passwords. These hard-coded passwords could allow unauthorized access to both the application and database.

Risk Information
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L
cvss4
Base: 8.4
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

NMIS/BioDose V22.02 and previous versions' installation directory paths by default have insecure file permissions, which in certain deployment scenarios can enable users on client workstations to modify the program executables and libraries.

Risk Information
cvss3
Base: 8.0
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H
cvss4
Base: 7.1
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X