ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

Georgetown Center on Poverty and Inequality expands economic security and opportunity and advances racial and gender equity for everyone in the U.S. through research, analysis, and ambitious policy ideas. We bridge academia and policy to equip policymakers and advocates with rigorous research, trusted analysis, and innovative policy solutions needed to make change. Our ideas are backed by evidence and data and rooted in the lived experiences of people affected by poverty.

Georgetown Center on Poverty & Inequality A.I CyberSecurity Scoring

GCPI

Company Details

Linkedin ID:

georgetown-center-on-poverty-and-inequality

Employees number:

18

Number of followers:

1,903

NAICS:

541

Industry Type:

Think Tanks

Homepage:

georgetownpoverty.org

IP Addresses:

0

Company ID:

GEO_9308358

Scan Status:

In-progress

AI scoreGCPI Risk Score (AI oriented)

Between 700 and 749

https://images.rankiteo.com/companyimages/georgetown-center-on-poverty-and-inequality.jpeg
GCPI Think Tanks
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreGCPI Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/georgetown-center-on-poverty-and-inequality.jpeg
GCPI Think Tanks
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

GCPI Company CyberSecurity News & History

Past Incidents
0
Attack Types
0
No data available
Ailogo

GCPI Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for GCPI

Incidents vs Think Tanks Industry Average (This Year)

No incidents recorded for Georgetown Center on Poverty & Inequality in 2025.

Incidents vs All-Companies Average (This Year)

No incidents recorded for Georgetown Center on Poverty & Inequality in 2025.

Incident Types GCPI vs Think Tanks Industry Avg (This Year)

No incidents recorded for Georgetown Center on Poverty & Inequality in 2025.

Incident History — GCPI (X = Date, Y = Severity)

GCPI cyber incidents detection timeline including parent company and subsidiaries

GCPI Company Subsidiaries

SubsidiaryImage

Georgetown Center on Poverty and Inequality expands economic security and opportunity and advances racial and gender equity for everyone in the U.S. through research, analysis, and ambitious policy ideas. We bridge academia and policy to equip policymakers and advocates with rigorous research, trusted analysis, and innovative policy solutions needed to make change. Our ideas are backed by evidence and data and rooted in the lived experiences of people affected by poverty.

Loading...
similarCompanies

GCPI Similar Companies

The Mentor Group

Mentor Group is a non-profit 501(c)(3) research institute for constitutional and political exchanges. From its inception to today, Mentor has focused on promoting the principles of justice and rule of law, ensuring that our economy provides strong foundations of fairness and openness for participat

The Free Enterprise Institute

The Free Enterprise Institute forms conservative leaders through the study of the history and principles of the American Republic and its roots in Western Civilization. We accomplish our mission through our sponsorship of The Imaginative Conservative ( www.TheImaginativeConservative.org) and our edu

Foundation for Compassionate Societies

One of the most serious deficits in the world today is the lack of compassion. Caring, kindness, sharing, empathy, and generosity all capture the essence of compassion. They all spring from the desire to minimize suffering. The Foundation for Compassionate Societies and its website can be a refuge f

China Development Research Foundation

The China Development Research Foundation is a non-profit institution that seeks to improve social and economic development in China through applied policy research, training, and informed dialogue. Initiated by the Development Research Centre of the State Council of the People’s Republic of China,

The Learning Forum

A trusted network of senior leaders ready to share insights and experiences. The Learning Forum (TLF) Executive Council Network is a member-driven research and networking organization for senior executives of large multinational and government organizations. TLF member firms include over 300 or

HUPR

The Research Centre for Human Potential - HUPR is dedicated to advancing human potential and performance. Through applied research and innovation, it explores human capabilities in a transdisciplinary approach where art intersects with science to push the boundaries of innovation. The centre focus

newsone

GCPI CyberSecurity News

September 25, 2025 07:00 AM
What Does a Federal Government Shutdown Mean for Women's Healthcare? A Stealthy Rollback of Coverage

Congress faces a shutdown, as lawmakers debate whether or not to extend the subsidies that millions rely on for affordable health coverage.

September 09, 2025 07:00 AM
Inflation quashed household income gains in 2024, census finds

The U.S. Census Bureau found that the richest Americans' income rose last year, and women and Black people lost ground.

July 04, 2025 07:00 AM
Trump’s big bill achieved what conservatives have been trying to do for decades

The massive legislation that Trump plans to sign Friday will make his campaign promises a reality by extending tax cuts enacted during his first term.

June 03, 2025 07:00 AM
Medicaid Matters for Young Children and Their Families

Medicaid, along with the Children's Health Insurance Program (CHIP), covers more than 40% of the nation's young children under age six,...

June 03, 2025 07:00 AM
Women Depend on Medicaid Across the Lifespan

Women comprise the majority of the adult Medicaid population, covering 19% of women ages 19-64 compared to 14% of men in 2023.

January 27, 2025 09:41 PM
Cara Brumfield

Cara Brumfield is the Vice President for Housing and Income Security. Prior to joining CBPP, Cara managed and provided strategic direction for the Georgetown...

January 18, 2025 08:00 AM
Georgetown study says half of Arkansas children in rural counties covered by Medicaid or CHIP

More than half of the Arkansas children living in rural counties were covered by Medicaid or the Children's Health Insurance Program (CHIP) in 2023, a new...

December 19, 2024 08:00 AM
Indivar Dutta-Gupta Joins the National Academy of Social Insurance as Distinguished Visiting Fellow

For Immediate Release | December 19, 2024. WASHINGTON, DC — The National Academy of Social Insurance is excited to welcome Indivar Dutta-Gupta as a...

October 08, 2024 07:00 AM
Child Welfare Systems’ Challenges: Differentiating Between Poverty and Neglect

BPC's Differentiating Poverty from Neglect work group will meet frequently over the next 18-24 months to assess how to best define and...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

GCPI CyberSecurity History Information

Official Website of Georgetown Center on Poverty & Inequality

The official website of Georgetown Center on Poverty & Inequality is http://www.georgetownpoverty.org.

Georgetown Center on Poverty & Inequality’s AI-Generated Cybersecurity Score

According to Rankiteo, Georgetown Center on Poverty & Inequality’s AI-generated cybersecurity score is 749, reflecting their Moderate security posture.

How many security badges does Georgetown Center on Poverty & Inequality’ have ?

According to Rankiteo, Georgetown Center on Poverty & Inequality currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does Georgetown Center on Poverty & Inequality have SOC 2 Type 1 certification ?

According to Rankiteo, Georgetown Center on Poverty & Inequality is not certified under SOC 2 Type 1.

Does Georgetown Center on Poverty & Inequality have SOC 2 Type 2 certification ?

According to Rankiteo, Georgetown Center on Poverty & Inequality does not hold a SOC 2 Type 2 certification.

Does Georgetown Center on Poverty & Inequality comply with GDPR ?

According to Rankiteo, Georgetown Center on Poverty & Inequality is not listed as GDPR compliant.

Does Georgetown Center on Poverty & Inequality have PCI DSS certification ?

According to Rankiteo, Georgetown Center on Poverty & Inequality does not currently maintain PCI DSS compliance.

Does Georgetown Center on Poverty & Inequality comply with HIPAA ?

According to Rankiteo, Georgetown Center on Poverty & Inequality is not compliant with HIPAA regulations.

Does Georgetown Center on Poverty & Inequality have ISO 27001 certification ?

According to Rankiteo,Georgetown Center on Poverty & Inequality is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Georgetown Center on Poverty & Inequality

Georgetown Center on Poverty & Inequality operates primarily in the Think Tanks industry.

Number of Employees at Georgetown Center on Poverty & Inequality

Georgetown Center on Poverty & Inequality employs approximately 18 people worldwide.

Subsidiaries Owned by Georgetown Center on Poverty & Inequality

Georgetown Center on Poverty & Inequality presently has no subsidiaries across any sectors.

Georgetown Center on Poverty & Inequality’s LinkedIn Followers

Georgetown Center on Poverty & Inequality’s official LinkedIn profile has approximately 1,903 followers.

Georgetown Center on Poverty & Inequality’s Presence on Crunchbase

No, Georgetown Center on Poverty & Inequality does not have a profile on Crunchbase.

Georgetown Center on Poverty & Inequality’s Presence on LinkedIn

Yes, Georgetown Center on Poverty & Inequality maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/georgetown-center-on-poverty-and-inequality.

Cybersecurity Incidents Involving Georgetown Center on Poverty & Inequality

As of December 05, 2025, Rankiteo reports that Georgetown Center on Poverty & Inequality has not experienced any cybersecurity incidents.

Number of Peer and Competitor Companies

Georgetown Center on Poverty & Inequality has an estimated 812 peer or competitor companies worldwide.

Georgetown Center on Poverty & Inequality CyberSecurity History Information

How many cyber incidents has Georgetown Center on Poverty & Inequality faced ?

Total Incidents: According to Rankiteo, Georgetown Center on Poverty & Inequality has faced 0 incidents in the past.

What types of cybersecurity incidents have occurred at Georgetown Center on Poverty & Inequality ?

Incident Types: The types of cybersecurity incidents that have occurred include .

Incident Details

What are the most common types of attacks the company has faced ?

Additional Questions

cve

Latest Global CVEs (Not Company-Specific)

Description

MCP Server Kubernetes is an MCP Server that can connect to a Kubernetes cluster and manage it. Prior to 2.9.8, there is a security issue exists in the exec_in_pod tool of the mcp-server-kubernetes MCP Server. The tool accepts user-provided commands in both array and string formats. When a string format is provided, it is passed directly to shell interpretation (sh -c) without input validation, allowing shell metacharacters to be interpreted. This vulnerability can be exploited through direct command injection or indirect prompt injection attacks, where AI agents may execute commands without explicit user intent. This vulnerability is fixed in 2.9.8.

Risk Information
cvss3
Base: 6.4
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
Description

XML external entity (XXE) injection in eyoucms v1.7.1 allows remote attackers to cause a denial of service via crafted body of a POST request.

Description

An issue was discovered in Fanvil x210 V2 2.12.20 allowing unauthenticated attackers on the local network to access administrative functions of the device (e.g. file upload, firmware update, reboot...) via a crafted authentication bypass.

Description

Cal.com is open-source scheduling software. Prior to 5.9.8, A flaw in the login credentials provider allows an attacker to bypass password verification when a TOTP code is provided, potentially gaining unauthorized access to user accounts. This issue exists due to problematic conditional logic in the authentication flow. This vulnerability is fixed in 5.9.8.

Risk Information
cvss4
Base: 9.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Rhino is an open-source implementation of JavaScript written entirely in Java. Prior to 1.8.1, 1.7.15.1, and 1.7.14.1, when an application passed an attacker controlled float poing number into the toFixed() function, it might lead to high CPU consumption and a potential Denial of Service. Small numbers go through this call stack: NativeNumber.numTo > DToA.JS_dtostr > DToA.JS_dtoa > DToA.pow5mult where pow5mult attempts to raise 5 to a ridiculous power. This vulnerability is fixed in 1.8.1, 1.7.15.1, and 1.7.14.1.

Risk Information
cvss4
Base: 5.5
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=georgetown-center-on-poverty-and-inequality' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge