Comparison Overview

Fondation Beyeler

VS

Association of Science and Technology Centers

Fondation Beyeler

Baselstrasse 101, Riehen, 4125, CH
Last Update: 2026-01-23

The Fondation Beyeler is a museum of modern and contemporary art open 365 days a year. It is considered one of the world's most beautiful museums. Its exhibitions of renowned artists of the 19th, 20th, and 21st centuries have brought the museum international recognition and established it as Switzerland's most popular art museum. The focus is the visitor's personal and sensory experiences in encountering art and nature.

NAICS: 712
NAICS Definition: Museums, Historical Sites, and Similar Institutions
Employees: 111
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Association of Science and Technology Centers

2000 Florida Ave NW, Suite 300, Washington, DC, US, 20009
Last Update: 2026-01-22
Between 750 and 799

The Association of Science and Technology Centers (ASTC) is a network of nearly 700 science and technology centers and museums, and allied organizations, engaging more than 110 million people annually across North America and in almost 50 countries. With its members and partners, ASTC works towards a vision of increased understanding of—and engagement with—science and technology among all people. Founded in 1973, ASTC provides a collective voice, professional support, and programming opportunities for science centers, museums, and related institutions. Through strategic alliances and global partnerships, ASTC's goal is to increase awareness of the valuable contributions its members make to their communities and the field of informal STEM learning and public engagement in science.

NAICS: 712
NAICS Definition: Museums, Historical Sites, and Similar Institutions
Employees: 43
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/fondation-beyeler.jpeg
Fondation Beyeler
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/sciencecenters.jpeg
Association of Science and Technology Centers
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Fondation Beyeler
100%
Compliance Rate
0/4 Standards Verified
Association of Science and Technology Centers
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Museums, Historical Sites, and Zoos Industry Average (This Year)

No incidents recorded for Fondation Beyeler in 2026.

Incidents vs Museums, Historical Sites, and Zoos Industry Average (This Year)

No incidents recorded for Association of Science and Technology Centers in 2026.

Incident History — Fondation Beyeler (X = Date, Y = Severity)

Fondation Beyeler cyber incidents detection timeline including parent company and subsidiaries

Incident History — Association of Science and Technology Centers (X = Date, Y = Severity)

Association of Science and Technology Centers cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/fondation-beyeler.jpeg
Fondation Beyeler
Incidents

No Incident

https://images.rankiteo.com/companyimages/sciencecenters.jpeg
Association of Science and Technology Centers
Incidents

No Incident

FAQ

Fondation Beyeler company demonstrates a stronger AI Cybersecurity Score compared to Association of Science and Technology Centers company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Historically, Association of Science and Technology Centers company has disclosed a higher number of cyber incidents compared to Fondation Beyeler company.

In the current year, Association of Science and Technology Centers company and Fondation Beyeler company have not reported any cyber incidents.

Neither Association of Science and Technology Centers company nor Fondation Beyeler company has reported experiencing a ransomware attack publicly.

Neither Association of Science and Technology Centers company nor Fondation Beyeler company has reported experiencing a data breach publicly.

Neither Association of Science and Technology Centers company nor Fondation Beyeler company has reported experiencing targeted cyberattacks publicly.

Neither Fondation Beyeler company nor Association of Science and Technology Centers company has reported experiencing or disclosing vulnerabilities publicly.

Neither Fondation Beyeler nor Association of Science and Technology Centers holds any compliance certifications.

Neither company holds any compliance certifications.

Neither Fondation Beyeler company nor Association of Science and Technology Centers company has publicly disclosed detailed information about the number of their subsidiaries.

Fondation Beyeler company employs more people globally than Association of Science and Technology Centers company, reflecting its scale as a Museums, Historical Sites, and Zoos.

Neither Fondation Beyeler nor Association of Science and Technology Centers holds SOC 2 Type 1 certification.

Neither Fondation Beyeler nor Association of Science and Technology Centers holds SOC 2 Type 2 certification.

Neither Fondation Beyeler nor Association of Science and Technology Centers holds ISO 27001 certification.

Neither Fondation Beyeler nor Association of Science and Technology Centers holds PCI DSS certification.

Neither Fondation Beyeler nor Association of Science and Technology Centers holds HIPAA certification.

Neither Fondation Beyeler nor Association of Science and Technology Centers holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

Improper validation of specified type of input in M365 Copilot allows an unauthorized attacker to disclose information over a network.

Risk Information
cvss3
Base: 9.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
Description

Improper access control in Azure Front Door (AFD) allows an unauthorized attacker to elevate privileges over a network.

Risk Information
cvss3
Base: 9.8
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Description

Azure Entra ID Elevation of Privilege Vulnerability

Risk Information
cvss3
Base: 9.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N
Description

Moonraker is a Python web server providing API access to Klipper 3D printing firmware. In versions 0.9.3 and below, instances configured with the "ldap" component enabled are vulnerable to LDAP search filter injection techniques via the login endpoint. The 401 error response message can be used to determine whether or not a search was successful, allowing for brute force methods to discover LDAP entries on the server such as user IDs and user attributes. This issue has been fixed in version 0.10.0.

Risk Information
cvss4
Base: 2.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Runtipi is a Docker-based, personal homeserver orchestrator that facilitates multiple services on a single server. Versions 3.7.0 and above allow an authenticated user to execute arbitrary system commands on the host server by injecting shell metacharacters into backup filenames. The BackupManager fails to sanitize the filenames of uploaded backups. The system persists user-uploaded files directly to the host filesystem using the raw originalname provided in the request. This allows an attacker to stage a file containing shell metacharacters (e.g., $(id).tar.gz) at a predictable path, which is later referenced during the restore process. The successful storage of the file is what allows the subsequent restore command to reference and execute it. This issue has been fixed in version 4.7.0.

Risk Information
cvss3
Base: 8.0
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H