Comparison Overview

Historic Hope Plantation

VS

Zoo Atlanta

Historic Hope Plantation

132 Hope House Ln, Windsor, North Carolina, 27983, US
Last Update: 2025-12-03

Restored home of former North Carolina Governor David Stone (1770-1818). Located four miles west of Windsor, NC, the plantation complex offers unique insights to the late 18th and 19th century rural life in Eastern North Carolina and the South. The centerpiece of the plantation is the c. 1803 Hope Mansion.

NAICS: 712
NAICS Definition:
Employees: 3
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Zoo Atlanta

800 Cherokee Ave SE, Atlanta, GA, 30315, US
Last Update: 2025-12-01
Between 750 and 799

Vision We envision a world where wildlife and humans flourish together. Mission We save wildlife and their habitats through conservation, research, education and engaging experiences. Our efforts connect people to animals and inspire conservation action. Values Integrity – We are respectful, honest, transparent and accountable. We expect the same from our industry colleagues and partners. Collaboration – We are inspired by the contributions of the individual and the power of a team. Innovation – We are creative, resourceful and resilient. We celebrate a culture of continuous improvement, and we aspire to be the leader in our field. Passion – We are united in our common commitment to preserve wildlife and serve others. Diversity – We see collective power in our differences and embrace the notion that we all have something to offer. We respect and value the diversity of all life. Stewardship – We are stewards of the animals in our care and all the resources we use. Safety – We are committed to protecting the safety and health of our team members, animals, guests and Members, our community and partners.

NAICS: 712
NAICS Definition: Museums, Historical Sites, and Similar Institutions
Employees: 446
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/historic-hope-plantation.jpeg
Historic Hope Plantation
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/zoo-atlanta.jpeg
Zoo Atlanta
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Historic Hope Plantation
100%
Compliance Rate
0/4 Standards Verified
Zoo Atlanta
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Museums, Historical Sites, and Zoos Industry Average (This Year)

No incidents recorded for Historic Hope Plantation in 2025.

Incidents vs Museums, Historical Sites, and Zoos Industry Average (This Year)

No incidents recorded for Zoo Atlanta in 2025.

Incident History — Historic Hope Plantation (X = Date, Y = Severity)

Historic Hope Plantation cyber incidents detection timeline including parent company and subsidiaries

Incident History — Zoo Atlanta (X = Date, Y = Severity)

Zoo Atlanta cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/historic-hope-plantation.jpeg
Historic Hope Plantation
Incidents

No Incident

https://images.rankiteo.com/companyimages/zoo-atlanta.jpeg
Zoo Atlanta
Incidents

No Incident

FAQ

Historic Hope Plantation company demonstrates a stronger AI Cybersecurity Score compared to Zoo Atlanta company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Historically, Zoo Atlanta company has disclosed a higher number of cyber incidents compared to Historic Hope Plantation company.

In the current year, Zoo Atlanta company and Historic Hope Plantation company have not reported any cyber incidents.

Neither Zoo Atlanta company nor Historic Hope Plantation company has reported experiencing a ransomware attack publicly.

Neither Zoo Atlanta company nor Historic Hope Plantation company has reported experiencing a data breach publicly.

Neither Zoo Atlanta company nor Historic Hope Plantation company has reported experiencing targeted cyberattacks publicly.

Neither Historic Hope Plantation company nor Zoo Atlanta company has reported experiencing or disclosing vulnerabilities publicly.

Neither Historic Hope Plantation nor Zoo Atlanta holds any compliance certifications.

Neither company holds any compliance certifications.

Neither Historic Hope Plantation company nor Zoo Atlanta company has publicly disclosed detailed information about the number of their subsidiaries.

Zoo Atlanta company employs more people globally than Historic Hope Plantation company, reflecting its scale as a Museums, Historical Sites, and Zoos.

Neither Historic Hope Plantation nor Zoo Atlanta holds SOC 2 Type 1 certification.

Neither Historic Hope Plantation nor Zoo Atlanta holds SOC 2 Type 2 certification.

Neither Historic Hope Plantation nor Zoo Atlanta holds ISO 27001 certification.

Neither Historic Hope Plantation nor Zoo Atlanta holds PCI DSS certification.

Neither Historic Hope Plantation nor Zoo Atlanta holds HIPAA certification.

Neither Historic Hope Plantation nor Zoo Atlanta holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

vLLM is an inference and serving engine for large language models (LLMs). Prior to 0.11.1, vllm has a critical remote code execution vector in a config class named Nemotron_Nano_VL_Config. When vllm loads a model config that contains an auto_map entry, the config class resolves that mapping with get_class_from_dynamic_module(...) and immediately instantiates the returned class. This fetches and executes Python from the remote repository referenced in the auto_map string. Crucially, this happens even when the caller explicitly sets trust_remote_code=False in vllm.transformers_utils.config.get_config. In practice, an attacker can publish a benign-looking frontend repo whose config.json points via auto_map to a separate malicious backend repo; loading the frontend will silently run the backend’s code on the victim host. This vulnerability is fixed in 0.11.1.

Risk Information
cvss3
Base: 7.1
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
Description

fastify-reply-from is a Fastify plugin to forward the current HTTP request to another server. Prior to 12.5.0, by crafting a malicious URL, an attacker could access routes that are not allowed, even though the reply.from is defined for specific routes in @fastify/reply-from. This vulnerability is fixed in 12.5.0.

Risk Information
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to 21.0.2, 20.3.15, and 19.2.17, A Stored Cross-Site Scripting (XSS) vulnerability has been identified in the Angular Template Compiler. It occurs because the compiler's internal security schema is incomplete, allowing attackers to bypass Angular's built-in security sanitization. Specifically, the schema fails to classify certain URL-holding attributes (e.g., those that could contain javascript: URLs) as requiring strict URL security, enabling the injection of malicious scripts. This vulnerability is fixed in 21.0.2, 20.3.15, and 19.2.17.

Risk Information
cvss4
Base: 8.5
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Gin-vue-admin is a backstage management system based on vue and gin. In 2.8.6 and earlier, attackers can delete any file on the server at will, causing damage or unavailability of server resources. Attackers can control the 'FileMd5' parameter to delete any file and folder.

Risk Information
cvss4
Base: 8.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Portkey.ai Gateway is a blazing fast AI Gateway with integrated guardrails. Prior to 1.14.0, the gateway determined the destination baseURL by prioritizing the value in the x-portkey-custom-host request header. The proxy route then appends the client-specified path to perform an external fetch. This can be maliciously used by users for SSRF attacks. This vulnerability is fixed in 1.14.0.

Risk Information
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X