Company Details
enroll-america
28
932
921
enrollamerica.org
0
ENR_2310789
In-progress

Enroll America Company CyberSecurity Posture
enrollamerica.orgEnroll America accomplishes its work by engaging a wide variety of organizations with a stake in enrolling the uninsured in health coverage. Our partners include health insurers, hospitals, pharmaceutical companies, employers, consumer organizations, faith-based organizations, civic organizations, and philanthropies. -We track the latest information on “best practices” for optimizing enrollment, and share that information widely. -We provide guidance and assistance to help states and the federal government adopt streamlined and user-friendly enrollment policies, procedures, and practices. -We work to raise awareness of enrollment options among the uninsured and broaden the range of channels through which uninsured individuals can enroll.
Company Details
enroll-america
28
932
921
enrollamerica.org
0
ENR_2310789
In-progress
Between 700 and 749

Enroll America Global Score (TPRM)XXXX



No incidents recorded for Enroll America in 2025.
No incidents recorded for Enroll America in 2025.
No incidents recorded for Enroll America in 2025.
Enroll America cyber incidents detection timeline including parent company and subsidiaries

Enroll America accomplishes its work by engaging a wide variety of organizations with a stake in enrolling the uninsured in health coverage. Our partners include health insurers, hospitals, pharmaceutical companies, employers, consumer organizations, faith-based organizations, civic organizations, and philanthropies. -We track the latest information on “best practices” for optimizing enrollment, and share that information widely. -We provide guidance and assistance to help states and the federal government adopt streamlined and user-friendly enrollment policies, procedures, and practices. -We work to raise awareness of enrollment options among the uninsured and broaden the range of channels through which uninsured individuals can enroll.


The Ministry of Energy and Natural Resources (MENR) was established upon Presidential Approval No. 4-400 dated 25.12.1963. According to Law No. 3154, the purpose of the Ministry of Energy and Natural Resources is to help define targets and policies related to energy and natural resources in a way

Fresh Energy is an independent nonprofit organization working to speed the transition to a clean energy economy. Our team of attorneys, analysts, economists, and educators advances forward-looking policies that benefit our communities and our future. Using data, science, and market-based solutions F

The Canadian Urban Institute (CUI) is a non-profit applied research organization headquartered in Toronto, Ontario. We focus on solutions for the built environment that balance human, ecological and economic impacts in order to achieve healthy urban development both in Canada and internationally.

Citizens for Tax Justice, founded in 1979, is a 501 (c)(4) public interest research and advocacy organization focusing on federal, state and local tax policies and their impact upon our nation. CTJ's mission is to give ordinary people a greater voice in the development of tax laws. Against the armie

De gemeente Waterland is een landelijke gemeente met 17.500 inwoners, gelegen op geringe afstand van Amsterdam, Purmerend, Hoorn en Zaandam. Een uniek monumentenbestand wordt gecombineerd met het zo typerende open en waardevolle veenweidelandschap. De gemeente is enig in zijn soort door het bescherm
The Institute on Taxation and Economic Policy (ITEP) is a non-profit, non-partisan research organization that provides timely, in-depth analyses on the effects of federal, state, and local tax policies. ITEP’s mission is to ensure the nation has a fair and sustainable tax system that raises enough r
.png)
Are you a student looking for cybersecurity information and resources to help you succeed and advance in the cybersecurity workforce?
Find the best U.S. schools with online cybersecurity bachelor's degrees, and learn how to succeed in an online cybersecurity bachelor's...
A lawsuit filed by Nebraska Attorney General Mike Hilgers over the 2024 Change Healthcare data breach has been allowed to proceed after...
Top Cyber Security Projects: 1. Cybersecurity Incident Response Simulation Tool 2. Biometric Authentication System 3.
Find out which cyber security jobs pay the most in 2026. Learn about salary trends, in-demand skills, and career paths in the growing field...
Cybersecurity engineers play a pivotal role in safeguarding sensitive data and protecting systems from cyber threats.
Although Windows 10 is no longer officially supported, Microsoft says users can now sign up for free security updates.
Explore average U.S. Cyber Security Analyst pay in 2026, differences by experience and location, and tips to boost earnings with certs like...
Republished on October 8 with a new user survey and warning about the staggering scale of the Windows 10 risk that's now less than a week away.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Enroll America is http://www.enrollamerica.org/.
According to Rankiteo, Enroll America’s AI-generated cybersecurity score is 743, reflecting their Moderate security posture.
According to Rankiteo, Enroll America currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Enroll America is not certified under SOC 2 Type 1.
According to Rankiteo, Enroll America does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Enroll America is not listed as GDPR compliant.
According to Rankiteo, Enroll America does not currently maintain PCI DSS compliance.
According to Rankiteo, Enroll America is not compliant with HIPAA regulations.
According to Rankiteo,Enroll America is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Enroll America operates primarily in the Public Policy Offices industry.
Enroll America employs approximately 28 people worldwide.
Enroll America presently has no subsidiaries across any sectors.
Enroll America’s official LinkedIn profile has approximately 932 followers.
No, Enroll America does not have a profile on Crunchbase.
Yes, Enroll America maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/enroll-america.
As of November 28, 2025, Rankiteo reports that Enroll America has not experienced any cybersecurity incidents.
Enroll America has an estimated 1,023 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, Enroll America has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to versions 19.2.16, 20.3.14, and 21.0.1, there is a XSRF token leakage via protocol-relative URLs in angular HTTP clients. The vulnerability is a Credential Leak by App Logic that leads to the unauthorized disclosure of the Cross-Site Request Forgery (XSRF) token to an attacker-controlled domain. Angular's HttpClient has a built-in XSRF protection mechanism that works by checking if a request URL starts with a protocol (http:// or https://) to determine if it is cross-origin. If the URL starts with protocol-relative URL (//), it is incorrectly treated as a same-origin request, and the XSRF token is automatically added to the X-XSRF-TOKEN header. This issue has been patched in versions 19.2.16, 20.3.14, and 21.0.1. A workaround for this issue involves avoiding using protocol-relative URLs (URLs starting with //) in HttpClient requests. All backend communication URLs should be hardcoded as relative paths (starting with a single /) or fully qualified, trusted absolute URLs.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Uncontrolled Recursion vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs. This issue has been patched in version 1.3.2.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Integer Overflow vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures containing OIDs with oversized arcs. These arcs may be decoded as smaller, trusted OIDs due to 32-bit bitwise truncation, enabling the bypass of downstream OID-based security decisions. This issue has been patched in version 1.3.2.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, working with large buffers in Lua scripts can lead to a stack overflow. Users of Lua rules and output scripts may be affected when working with large buffers. This includes a rule passing a large buffer to a Lua script. This issue has been patched in versions 7.0.13 and 8.0.2. A workaround for this issue involves disabling Lua rules and output scripts, or making sure limits, such as stream.depth.reassembly and HTTP response body limits (response-body-limit), are set to less than half the stack size.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. In versions from 8.0.0 to before 8.0.2, a NULL dereference can occur when the entropy keyword is used in conjunction with base64_data. This issue has been patched in version 8.0.2. A workaround involves disabling rules that use entropy in conjunction with base64_data.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.