Comparison Overview

Hartbeat Ensemble

VS

Mason Gross School of the Arts

Hartbeat Ensemble

360 Farmington Ave, Hartford, CT, US, 06105
Last Update: 2025-12-14

Founded in 2001, HartBeat Ensemble's mission is to create provocative theater that connects our community beyond traditional barriers of race, gender, class and geography. HartBeat Ensemble is the only institution in Hartford that is consistently using theater to speak powerfully across different generations, races, populations and interest groups. As an ensemble of artist-activists, we create as well as present innovative productions based on critical civic issues. HartBeat offers audiences the chance to experience and respond to the work they have just seen through live performance and guided conversations. HartBeat’s original, full-length creative works, including the award-winning Flipside, the critically acclaimed Jimmy & Lorraine, and this year's sold-out hit Pegao by Ensemble member Cin Martinez. HartBeat continues to inspire the next generation of leaders to create change for a better world through its Youth Play Institute. HartBeat is an artist-led, artist-driven company dedicated to building community partnerships and helping to integrate the arts into our community’s civic agenda. We continue to: -serve as an intersection for innovative contemporary art and community engagement, -play a bold leadership role in positioning art as a catalyst for community change and collaborating with others to realize a shared vision for the community and the arts, -provide youth-focused training opportunities that inspire and empower young people to make a difference in their lives and the world around them; -serve as an incubator of non-traditional and contemporary art, and a home for a broad spectrum of CT and other artists; and -share a physical space that is open to artists and community. In 2013, HartBeat moved into the Carriage House Theater which provides an opportunity for HartBeat to produce a season of events that extends beyond our mainstage and education productions and to create a unique space for artists and the community to gather together.

NAICS: 7111
NAICS Definition: Performing Arts Companies
Employees: 18
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Mason Gross School of the Arts

85 George Street, New Brunswick, 08901, US
Last Update: 2025-12-13

Mason Gross School of the Arts is a vibrant community of artists and scholars committed to pursuing excellence, innovation, and inclusivity. Its mission is to create socially relevant art, foster diverse programming and curricula, cultivate community partnerships, and advance the arts through teaching, creative activity, advocacy, and research that contributes to the public good. Comprising approximately 1,000 undergraduate and graduate students across programs in music, theater, dance, filmmaking, art, and design, Mason Gross is housed within Rutgers–New Brunswick, a premier Big Ten research university that serves some 69,000 students and is the flagship campus of Rutgers, The State University of New Jersey. Submit your news: https://go.rutgers.edu/submit-news Sign up for the bi-weekly MGSA events e-blast: https://go.rutgers.edu/MGSAnews Shop MGSA merch: https://go.rutgers.edu/shopmgsa

NAICS: 7111
NAICS Definition: Performing Arts Companies
Employees: 142
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/hartbeat-ensemble.jpeg
Hartbeat Ensemble
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/mason-gross-school-of-the-arts.jpeg
Mason Gross School of the Arts
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Hartbeat Ensemble
100%
Compliance Rate
0/4 Standards Verified
Mason Gross School of the Arts
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Performing Arts Industry Average (This Year)

No incidents recorded for Hartbeat Ensemble in 2025.

Incidents vs Performing Arts Industry Average (This Year)

No incidents recorded for Mason Gross School of the Arts in 2025.

Incident History — Hartbeat Ensemble (X = Date, Y = Severity)

Hartbeat Ensemble cyber incidents detection timeline including parent company and subsidiaries

Incident History — Mason Gross School of the Arts (X = Date, Y = Severity)

Mason Gross School of the Arts cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/hartbeat-ensemble.jpeg
Hartbeat Ensemble
Incidents

No Incident

https://images.rankiteo.com/companyimages/mason-gross-school-of-the-arts.jpeg
Mason Gross School of the Arts
Incidents

No Incident

FAQ

Both Hartbeat Ensemble company and Mason Gross School of the Arts company demonstrate a comparable AI Cybersecurity Score, with strong governance and monitoring frameworks in place.

Historically, Mason Gross School of the Arts company has disclosed a higher number of cyber incidents compared to Hartbeat Ensemble company.

In the current year, Mason Gross School of the Arts company and Hartbeat Ensemble company have not reported any cyber incidents.

Neither Mason Gross School of the Arts company nor Hartbeat Ensemble company has reported experiencing a ransomware attack publicly.

Neither Mason Gross School of the Arts company nor Hartbeat Ensemble company has reported experiencing a data breach publicly.

Neither Mason Gross School of the Arts company nor Hartbeat Ensemble company has reported experiencing targeted cyberattacks publicly.

Neither Hartbeat Ensemble company nor Mason Gross School of the Arts company has reported experiencing or disclosing vulnerabilities publicly.

Neither Hartbeat Ensemble nor Mason Gross School of the Arts holds any compliance certifications.

Neither company holds any compliance certifications.

Neither Hartbeat Ensemble company nor Mason Gross School of the Arts company has publicly disclosed detailed information about the number of their subsidiaries.

Mason Gross School of the Arts company employs more people globally than Hartbeat Ensemble company, reflecting its scale as a Performing Arts.

Neither Hartbeat Ensemble nor Mason Gross School of the Arts holds SOC 2 Type 1 certification.

Neither Hartbeat Ensemble nor Mason Gross School of the Arts holds SOC 2 Type 2 certification.

Neither Hartbeat Ensemble nor Mason Gross School of the Arts holds ISO 27001 certification.

Neither Hartbeat Ensemble nor Mason Gross School of the Arts holds PCI DSS certification.

Neither Hartbeat Ensemble nor Mason Gross School of the Arts holds HIPAA certification.

Neither Hartbeat Ensemble nor Mason Gross School of the Arts holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

A weakness has been identified in itsourcecode Online Pet Shop Management System 1.0. This vulnerability affects unknown code of the file /pet1/addcnp.php. This manipulation of the argument cnpname causes sql injection. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in Tenda AX9 22.03.01.46. This affects the function image_check of the component httpd. The manipulation results in use of weak hash. It is possible to launch the attack remotely. A high complexity level is associated with this attack. It is indicated that the exploitability is difficult. The exploit has been released to the public and may be exploited.

Risk Information
cvss2
Base: 2.6
Severity: HIGH
AV:N/AC:H/Au:N/C:N/I:P/A:N
cvss3
Base: 3.7
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
cvss4
Base: 6.3
Severity: HIGH
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A weakness has been identified in code-projects Student File Management System 1.0. This issue affects some unknown processing of the file /admin/update_student.php. This manipulation of the argument stud_id causes sql injection. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in code-projects Student File Management System 1.0. This vulnerability affects unknown code of the file /admin/save_user.php. The manipulation of the argument firstname results in sql injection. The attack can be executed remotely. The exploit has been released to the public and may be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was identified in code-projects Student File Management System 1.0. This affects an unknown part of the file /admin/update_user.php. The manipulation of the argument user_id leads to sql injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X