Comparison Overview

Golf Digest

VS

PT Mizan Pustaka

Golf Digest

One World Trade Center, New York, NY, 10007, US
Last Update: 2025-11-26
Between 750 and 799

Golf Digest is the leading brand in golf, boasting the largest digital audience and print circulation in the game. Our mission is to help people enjoy every aspect of golf, from advice on how to play, what to play, and where to play; to news and analysis on the game’s competitive circuit. Golf Digest is a division of Discovery Golf.

NAICS: 511
NAICS Definition: Publishing Industries (except Internet)
Employees: 247
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

PT Mizan Pustaka

Jl. Cinambo 135, Cisaranten Wetan, Bandung, 40294, ID
Last Update: 2025-11-21

Mizan is a publisher with a maintained reputation and a strong emphasis on high standards of quality. Since its inception in 1983, Mizan has become part of the dynamic development of literature and intellectuals in Indonesia, and has contributed in no small part in inspiring the growth of new publishers in recent decades. As a publishing venture, Mizan strives to maintain a balance between the taste of the market and the responsibility to expand the horizon of society. We want to show the best work in all fields to answer the challenges of the time while remaining true to the believed values. We are open to information from any point of view a long it is presented on a responsible manner and beneficial to humanity. At present, Mizan Pustaka is widely known in Indonesia as a publisher of high quality books on variety of important issues for Indonesians. Mizan Pustaka has 7 production lines, among others Mizan Khazanah Ilmu-Ilmu Islam (“Mizan the Treasure of Islamic Knowledge”, on the developments in Islamic thoughts), Mizan Kronik Zaman Baru (“Mizan Chronicles of the New Era”, on contemporary themes in various areas), Kaifa (practical knowledge and ‘how-to’), Qanita (on active and modern women themes in the developing country) and Mizania (popular Islamic thoughts and piety).

NAICS: 511
NAICS Definition: Publishing Industries (except Internet)
Employees: 161
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/golf-digest.jpeg
Golf Digest
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/pt-mizan-pustaka.jpeg
PT Mizan Pustaka
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Golf Digest
100%
Compliance Rate
0/4 Standards Verified
PT Mizan Pustaka
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Book and Periodical Publishing Industry Average (This Year)

No incidents recorded for Golf Digest in 2025.

Incidents vs Book and Periodical Publishing Industry Average (This Year)

No incidents recorded for PT Mizan Pustaka in 2025.

Incident History — Golf Digest (X = Date, Y = Severity)

Golf Digest cyber incidents detection timeline including parent company and subsidiaries

Incident History — PT Mizan Pustaka (X = Date, Y = Severity)

PT Mizan Pustaka cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/golf-digest.jpeg
Golf Digest
Incidents

No Incident

https://images.rankiteo.com/companyimages/pt-mizan-pustaka.jpeg
PT Mizan Pustaka
Incidents

No Incident

FAQ

Golf Digest company demonstrates a stronger AI Cybersecurity Score compared to PT Mizan Pustaka company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Historically, PT Mizan Pustaka company has disclosed a higher number of cyber incidents compared to Golf Digest company.

In the current year, PT Mizan Pustaka company and Golf Digest company have not reported any cyber incidents.

Neither PT Mizan Pustaka company nor Golf Digest company has reported experiencing a ransomware attack publicly.

Neither PT Mizan Pustaka company nor Golf Digest company has reported experiencing a data breach publicly.

Neither PT Mizan Pustaka company nor Golf Digest company has reported experiencing targeted cyberattacks publicly.

Neither Golf Digest company nor PT Mizan Pustaka company has reported experiencing or disclosing vulnerabilities publicly.

Neither Golf Digest nor PT Mizan Pustaka holds any compliance certifications.

Neither company holds any compliance certifications.

Neither Golf Digest company nor PT Mizan Pustaka company has publicly disclosed detailed information about the number of their subsidiaries.

Golf Digest company employs more people globally than PT Mizan Pustaka company, reflecting its scale as a Book and Periodical Publishing.

Neither Golf Digest nor PT Mizan Pustaka holds SOC 2 Type 1 certification.

Neither Golf Digest nor PT Mizan Pustaka holds SOC 2 Type 2 certification.

Neither Golf Digest nor PT Mizan Pustaka holds ISO 27001 certification.

Neither Golf Digest nor PT Mizan Pustaka holds PCI DSS certification.

Neither Golf Digest nor PT Mizan Pustaka holds HIPAA certification.

Neither Golf Digest nor PT Mizan Pustaka holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

ThingsBoard in versions prior to v4.2.1 allows an authenticated user to upload malicious SVG images via the "Image Gallery", leading to a Stored Cross-Site Scripting (XSS) vulnerability. The exploit can be triggered when any user accesses the public API endpoint of the malicious SVG images, or if the malicious images are embedded in an `iframe` element, during a widget creation, deployed to any page of the platform (e.g., dashboards), and accessed during normal operations. The vulnerability resides in the `ImageController`, which fails to restrict the execution of JavaScript code when an image is loaded by the user's browser. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions.

Risk Information
cvss4
Base: 6.2
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:H/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).

Risk Information
cvss3
Base: 9.9
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Description

Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to sanitize team email addresses to be visible only to Team Admins, which allows any authenticated user to view team email addresses via the GET /api/v4/channels/{channel_id}/common_teams endpoint

Risk Information
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Description

Exposure of email service credentials to users without administrative rights in Devolutions Server.This issue affects Devolutions Server: before 2025.2.21, before 2025.3.9.

Description

Exposure of credentials in unintended requests in Devolutions Server.This issue affects Server: through 2025.2.20, through 2025.3.8.