Company Details
footlight-club
8
0
7111
footlight.org
0
FOO_1833869
In-progress

Footlight Club Company CyberSecurity Posture
footlight.orgNestled in a residential area near Jamaica Pond, The Footlight Club, America's oldest community theatre, has performed every year since 1877. For over a century Footlight Club members have sustained the organization's mission: To present the best in non-professional theater to a broad-based audience, and to preserve and maintain Eliot Hall as a community resource. Increased membership and audience sizes are evidence that The Footlight Club is once again taking its place among the sisterhood of community theatres. Founded by an energetic group of young socialites, The Footlight Club has evolved along with its neighborhood. Once, wealthy aristocrats arrived in coaches to enjoy the society of their own kind in an atmosphere of gentility and wealth. The performances sometimes seemed secondary to the social function. Today the Footlight Club draws its membership from Jamaica Plain, other Boston neighborhoods and surrounding communities. Members and guests range in age from teens to senior citizens and come from every social and economic stratum. Doctors and lawyers, waiters and cooks, husbands and wives, come together to perform, to enjoy, and to support exciting amateur productions and the other activities that make up live theater.
Company Details
footlight-club
8
0
7111
footlight.org
0
FOO_1833869
In-progress
Between 800 and 849

Footlight Club Global Score (TPRM)XXXX



No incidents recorded for Footlight Club in 2025.
No incidents recorded for Footlight Club in 2025.
No incidents recorded for Footlight Club in 2025.
Footlight Club cyber incidents detection timeline including parent company and subsidiaries

Nestled in a residential area near Jamaica Pond, The Footlight Club, America's oldest community theatre, has performed every year since 1877. For over a century Footlight Club members have sustained the organization's mission: To present the best in non-professional theater to a broad-based audience, and to preserve and maintain Eliot Hall as a community resource. Increased membership and audience sizes are evidence that The Footlight Club is once again taking its place among the sisterhood of community theatres. Founded by an energetic group of young socialites, The Footlight Club has evolved along with its neighborhood. Once, wealthy aristocrats arrived in coaches to enjoy the society of their own kind in an atmosphere of gentility and wealth. The performances sometimes seemed secondary to the social function. Today the Footlight Club draws its membership from Jamaica Plain, other Boston neighborhoods and surrounding communities. Members and guests range in age from teens to senior citizens and come from every social and economic stratum. Doctors and lawyers, waiters and cooks, husbands and wives, come together to perform, to enjoy, and to support exciting amateur productions and the other activities that make up live theater.


Trollwood Performing Arts School provides high quality arts education, exceptional community entertainment, and operates as a community events and exposition center. Trollwood serves as the managing arm for Bluestem Center for the Arts, a world-class facility headquartered in Moorhead, Minnesota. T

The historic 455-seat Tower Theatre is owned and operated by the Tower Theatre Foundation, a non-profit 501(c)3 organization. Our Mission To be Central Oregon's leading performing arts organization, providing cultural and educational programs that make essential contributions to the region's lifest

Enriching lives and building community through the arts. COCA was founded in 1986 by Richard Baron, President of McCormack Baron Salazar Inc., in conjunction with the late Dorothy Dubinsky, Mark Twain Banks, Robert Orchard, the Sachs Fund and Trivers Associates. A $2 million renovation in 1985-

Golden Thread Productions, founded in 1996, is the first American theatre company focused on the Middle East. We produce passionate and provocative plays from and about the Middle East that celebrate the multiplicity of its perspectives and identities. We are a developmental catalyst and vibrant art

Dearest Accomplice, You are invited to join The Impostors for a game of make-believe! As children, “to pretend” is to be unfettered and free. A pirate at sea, a mother of unruly lost boys, or a warrior princess…these curiosities billow the sails of a child’s imagination. As adults, “to pretend” is

Humor in Bedrijf has been helping organisations, since 2003, with changing their company culture. We use humour as a tool. Every company deals with different processes of change and humour can be the lighthearted approach to loosen some tension. People who use humour are less stressed, are more prod
.png)
CrowdStrike, Palo Alto Networks, and Fortinet are the three Cybersecurity stocks to watch today, according to MarketBeat's stock screener...
AI dominates cybersecurity experts' 2026 predictions as it touches on authentication, privacy and attack acceleration.
ServiceNow (NOW) is in advanced talks to acquire Armis, a significant move into the cybersecurity sector. Armis, valued at $6.1 billion,...
Ogeechee Technical College's Cybersecurity Club, ARPe-DIEM, has proven its mettle on the national stage, achieving a significant ranking in...
As 2025 nears its close, the cybersecurity landscape shows no signs of slowing down. This week's developments highlight how rapidly the...
Back in July, the UK government announced its intention to ban ransomware payments for all public sector bodies, including local government,...
The Lake County Public Defender's office recently recognized two Lake County staffers with The Chief's Award during the office's quarterly...
Cybersecurity US Stocks Week Ahead (Dec. 15–19, 2025): Zscaler's Bounce Test, SailPoint's Post-Earnings Reset, and Fed-Cut Volatility...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Footlight Club is http://www.footlight.org.
According to Rankiteo, Footlight Club’s AI-generated cybersecurity score is 806, reflecting their Good security posture.
According to Rankiteo, Footlight Club currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Footlight Club is not certified under SOC 2 Type 1.
According to Rankiteo, Footlight Club does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Footlight Club is not listed as GDPR compliant.
According to Rankiteo, Footlight Club does not currently maintain PCI DSS compliance.
According to Rankiteo, Footlight Club is not compliant with HIPAA regulations.
According to Rankiteo,Footlight Club is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Footlight Club operates primarily in the Performing Arts industry.
Footlight Club employs approximately 8 people worldwide.
Footlight Club presently has no subsidiaries across any sectors.
Footlight Club’s official LinkedIn profile has approximately 0 followers.
Footlight Club is classified under the NAICS code 7111, which corresponds to Performing Arts Companies.
No, Footlight Club does not have a profile on Crunchbase.
Yes, Footlight Club maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/footlight-club.
As of December 14, 2025, Rankiteo reports that Footlight Club has not experienced any cybersecurity incidents.
Footlight Club has an estimated 2,700 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, Footlight Club has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
A weakness has been identified in itsourcecode Online Pet Shop Management System 1.0. This vulnerability affects unknown code of the file /pet1/addcnp.php. This manipulation of the argument cnpname causes sql injection. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited.
A security flaw has been discovered in Tenda AX9 22.03.01.46. This affects the function image_check of the component httpd. The manipulation results in use of weak hash. It is possible to launch the attack remotely. A high complexity level is associated with this attack. It is indicated that the exploitability is difficult. The exploit has been released to the public and may be exploited.
A weakness has been identified in code-projects Student File Management System 1.0. This issue affects some unknown processing of the file /admin/update_student.php. This manipulation of the argument stud_id causes sql injection. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be exploited.
A security flaw has been discovered in code-projects Student File Management System 1.0. This vulnerability affects unknown code of the file /admin/save_user.php. The manipulation of the argument firstname results in sql injection. The attack can be executed remotely. The exploit has been released to the public and may be exploited.
A vulnerability was identified in code-projects Student File Management System 1.0. This affects an unknown part of the file /admin/update_user.php. The manipulation of the argument user_id leads to sql injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.