Company Details
elastic-city
0
17
7111
elastic-city.org
0
ELA_1463388
In-progress

Elastic City Company CyberSecurity Posture
elastic-city.orgElastic City intends to make its audience active participants in an ongoing poetic exchange with the places we live in and visit. Artists are commissioned by Elastic City to create their own walks. These walks tend to focus less on providing factual information and more on heightening our awareness, exploring our senses and making new group rituals in dialogue with public space. We are now in our third season of presenting participatory walks by artists throughout and outside of New York. With this season, over 50 artists will have led walks in New York, Detroit, San Francisco, Berlin, Buenos Aires, London, Paris, Reykjavik and São Paulo. As part of our educational program, Elastic City now offers "ways." Whereas a walk provides the opportunity to participate in a narrative series of poetic moments, a way explicitly engages participants in *how* to generate these moments through exercises, tools and techniques offered by Elastic City artists. In a way, participants gather in an intimate group to prompt exchange, tone the gut and sharpen poetic decision-making. Elastic City ways typically do not involve walking and are offered outdoors unless otherwise noted. Elastic City is directed by Todd Shalom. He realized the idea while suffering from altitude sickness in Cusco, Peru.
Company Details
elastic-city
0
17
7111
elastic-city.org
0
ELA_1463388
In-progress
Between 750 and 799

Elastic City Global Score (TPRM)XXXX



No incidents recorded for Elastic City in 2025.
No incidents recorded for Elastic City in 2025.
No incidents recorded for Elastic City in 2025.
Elastic City cyber incidents detection timeline including parent company and subsidiaries

Elastic City intends to make its audience active participants in an ongoing poetic exchange with the places we live in and visit. Artists are commissioned by Elastic City to create their own walks. These walks tend to focus less on providing factual information and more on heightening our awareness, exploring our senses and making new group rituals in dialogue with public space. We are now in our third season of presenting participatory walks by artists throughout and outside of New York. With this season, over 50 artists will have led walks in New York, Detroit, San Francisco, Berlin, Buenos Aires, London, Paris, Reykjavik and São Paulo. As part of our educational program, Elastic City now offers "ways." Whereas a walk provides the opportunity to participate in a narrative series of poetic moments, a way explicitly engages participants in *how* to generate these moments through exercises, tools and techniques offered by Elastic City artists. In a way, participants gather in an intimate group to prompt exchange, tone the gut and sharpen poetic decision-making. Elastic City ways typically do not involve walking and are offered outdoors unless otherwise noted. Elastic City is directed by Todd Shalom. He realized the idea while suffering from altitude sickness in Cusco, Peru.


The mission of The Tobin Center, a non-profit arts organization, is to serve as San Antonio’s cultural arts center, driving meaningful change in the community through the arts by providing world-class entertainment in state-of-the-art facilities, supporting the work of local performing arts organiza

The Tipping Point is that one dramatic moment in an epidemic when everything can change all at once…and we’ve reached it in a BIG way! From operating as a “vagabond” theatre company under the umbrella of the Parks and Recreation department, performing in any empty space we could get our hands on and

Sydney Theatre Company (STC) has been a major force in the Australian cultural landscape since its establishment in 1978. It is Australia’s largest theatre company in terms of audiences and amount of work presented each year, the state theatre company of NSW, and is recognised as one of the world’s

The Ballet School of Stamford was founded to provide excellent dance training for all children in 1998. We have an exciting mission of opening the world of dance to children along with its discipline, focus and health benefits. We have earned a reputation of nurturing young dancers through a discipl

Established as Sawnee School of Ballet in 1990 under the direction of Joan Kall Stewart, Sawnee School of the Arts is recognized in the Forsyth County community for its standard of excellence. SSA, now under the ownership of Courtney Bromwich, is dedicated to providing the highest quality training

Developing youth and our community through excellence in comprehensive theatre education and performance. CTC was created by the merger of two theatre companies founded in 1976: Walden Theatre and Blue Apple Players. The 2015 merger created a comprehensive organization that serves more than 50,0
.png)
A misconfigured Elasticsearch server holding 1.12 terabytes of data was leaking more than 6 billion records to public access without any...
UK drops 'backdoor' mandate for Apple devices, massive Allianz Life data breach impacts 1.1M people, speed cameras out after cyber attack.
Mandy Andress shares her journey as a cybersecurity champion at Elastic, a technology company specialising in search technology with...
From marketing strategies to cybersecurity solutions, these tech companies in Phoenix are doing their part to make Arizona a tech hotspot.
Cybersecurity Summit. By StateScoop Staff. July 28, 2023. StateScoop Staff. Written by StateScoop Staff. Share. Facebook · LinkedIn · Twitter; Copy Link.
ElasticON is a globetrotting tech expo where some of Elastic's brightest minds will visit your area and show you how to flip on the power of search in your...
Cybersecurity startup Build.security was established just last year, will serve as key location for engineering and security talent.
Elastic is acquiring Endgame for $234 million. The deal will blend Elastic's SIEM (security information and event management) with Endgame's endpoint...
At the Identiverse 2018 conference, Ping Identity announced its acquisition of Elastic Beam, which uses artificial intelligence for...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Elastic City is http://www.elastic-city.org.
According to Rankiteo, Elastic City’s AI-generated cybersecurity score is 762, reflecting their Fair security posture.
According to Rankiteo, Elastic City currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Elastic City is not certified under SOC 2 Type 1.
According to Rankiteo, Elastic City does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Elastic City is not listed as GDPR compliant.
According to Rankiteo, Elastic City does not currently maintain PCI DSS compliance.
According to Rankiteo, Elastic City is not compliant with HIPAA regulations.
According to Rankiteo,Elastic City is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Elastic City operates primarily in the Performing Arts industry.
Elastic City employs approximately 0 people worldwide.
Elastic City presently has no subsidiaries across any sectors.
Elastic City’s official LinkedIn profile has approximately 17 followers.
Elastic City is classified under the NAICS code 7111, which corresponds to Performing Arts Companies.
No, Elastic City does not have a profile on Crunchbase.
Yes, Elastic City maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/elastic-city.
As of December 15, 2025, Rankiteo reports that Elastic City has not experienced any cybersecurity incidents.
Elastic City has an estimated 2,700 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, Elastic City has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
A weakness has been identified in itsourcecode Online Pet Shop Management System 1.0. This vulnerability affects unknown code of the file /pet1/addcnp.php. This manipulation of the argument cnpname causes sql injection. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited.
A security flaw has been discovered in Tenda AX9 22.03.01.46. This affects the function image_check of the component httpd. The manipulation results in use of weak hash. It is possible to launch the attack remotely. A high complexity level is associated with this attack. It is indicated that the exploitability is difficult. The exploit has been released to the public and may be exploited.
A weakness has been identified in code-projects Student File Management System 1.0. This issue affects some unknown processing of the file /admin/update_student.php. This manipulation of the argument stud_id causes sql injection. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be exploited.
A security flaw has been discovered in code-projects Student File Management System 1.0. This vulnerability affects unknown code of the file /admin/save_user.php. The manipulation of the argument firstname results in sql injection. The attack can be executed remotely. The exploit has been released to the public and may be exploited.
A vulnerability was identified in code-projects Student File Management System 1.0. This affects an unknown part of the file /admin/update_user.php. The manipulation of the argument user_id leads to sql injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.