Company Details
idcollector
2
20
511
idcollector.com
0
ID._2643730
In-progress

id.collector Company CyberSecurity Posture
idcollector.comid.collector™ works together with you to create a beautifully bound book celebrating your collection. We conduct in house interviews that illuminate and capture the thinking and bravery of building a collection. Coupled with the interview, we curate a selection of images that serve as highlights of your art acquisitions. The result is an elegant hard cover book covering the history and breadth of your collection. Our bound books are also accessible in digital format allowing you to easily share and transport your collection with select curators, museums, and colleagues. id.collector books may be shown and shared on tablets, mobile devices and online. Share a beautiful slideshow of the collection with a friend over lunch. Collections can be digitally loaned to universities for educational purposes or used as a visual reference with an art adviser. id.collector makes it easy to enjoy your collection with others. Our website allows one to access an archive of the art collection to easily search, select and send information. There are built in security measures and copyright protection that insure all digital files are available only for designated use. Our privacy feature and contract insures exclusive access to the collector and collector’s retain all copyright and ownership rights. id.collector is a partnership between Helen Chen and Lizanne Merrill. Both women have extensive experience working within the New York art world and first met facilitating a private sale of an Ai Wei Wei sculpture in 2007. With a Masters in Arts Administration, Helen has focused her career on art publishing, producing high quality exhibition and art catalogs, and collections management for a variety of private collectors. Lizanne has developed an art advisory service offering clients an in-depth knowledge of the emerging and established artwork. She is also an avid collector herself.
Company Details
idcollector
2
20
511
idcollector.com
0
ID._2643730
In-progress
Between 750 and 799

id.collector Global Score (TPRM)XXXX



No incidents recorded for id.collector in 2025.
No incidents recorded for id.collector in 2025.
No incidents recorded for id.collector in 2025.
id.collector cyber incidents detection timeline including parent company and subsidiaries

id.collector™ works together with you to create a beautifully bound book celebrating your collection. We conduct in house interviews that illuminate and capture the thinking and bravery of building a collection. Coupled with the interview, we curate a selection of images that serve as highlights of your art acquisitions. The result is an elegant hard cover book covering the history and breadth of your collection. Our bound books are also accessible in digital format allowing you to easily share and transport your collection with select curators, museums, and colleagues. id.collector books may be shown and shared on tablets, mobile devices and online. Share a beautiful slideshow of the collection with a friend over lunch. Collections can be digitally loaned to universities for educational purposes or used as a visual reference with an art adviser. id.collector makes it easy to enjoy your collection with others. Our website allows one to access an archive of the art collection to easily search, select and send information. There are built in security measures and copyright protection that insure all digital files are available only for designated use. Our privacy feature and contract insures exclusive access to the collector and collector’s retain all copyright and ownership rights. id.collector is a partnership between Helen Chen and Lizanne Merrill. Both women have extensive experience working within the New York art world and first met facilitating a private sale of an Ai Wei Wei sculpture in 2007. With a Masters in Arts Administration, Helen has focused her career on art publishing, producing high quality exhibition and art catalogs, and collections management for a variety of private collectors. Lizanne has developed an art advisory service offering clients an in-depth knowledge of the emerging and established artwork. She is also an avid collector herself.


African Voices, a non-profit arts organization, is devoted to showcasing unique and diverse stories within the African Diaspora through the arts, literature and film. The organization publishes a literary magazine, sponsors book signings, literary readings, professional conferences and workshops for

The 101 Network is a digital publishing platform that delivers a daily dose of knowledge. We believe in the power to inform and entertain. It debuted in 2018 with four verticals — History, Finance, Science, and Living — with a blueprint for rapidly expanding the vertical collection. Redefining what

Know Your Meme is an online encyclopedia and knowledge community dedicated to researching, documenting and explaining the origins, history and evolution of memes and internet culture at large. Founded in December of 2008, Know Your Meme's research is handled by its independent professional editorial

ReaderLink is North America’s largest full-service book distributor. Each year, ReaderLink ships more than 325 million books and drives over $3 billion in sales for our partners. ReaderLink serves over 300 retailers with a combined 100,000 individual storefronts. Our broad customer base is a testa

Valve World Americas Expo and Conference -- https://valveworldexpoamericas.com/ The Valve World Americas Journal is a publication of KCI World. Published 10 times a year, the journal seeks to keep American readers up-to-date with the latest trends, projects, developments and news from the flow con

Part of the University of Oxford. Established in the earliest days of printing, we’ve been home to the inquisitive, the passionate, and the ambitious for the last 500 years. Our mission is clear – to create the highest quality research and education resources and make them available worldwide. Fro
.png)
The key to an effective security strategy lies not in collecting more information, but in focusing on the right data to ensure safety...
New privacy regulations provide insights into California's approach to ADMT, cybersecurity audits, and risk assessments, while amendments...
To celebrate Cybersecurity Month and help your organization build cyber resilience, OpenText is hosting White Hat Hacker Wars.
The election agency is now racing to distribute both backlogged old cards and newly printed ones as the country's presidential election is...
Several collections of login credentials reveal one of the largest data breaches in history, totaling a humongous 16 billion exposed login credentials.
Data breaches affecting millions of users are far too common. Here are some of the biggest, baddest breaches in recent memory.
China suffers its largest data breach ever with 4 billion user records exposed, including WeChat, Alipay, and financial data.
This Review addresses (1) the regulation of privacy and data security, other legislative developments, enforcement actions by federal and state authorities,
(IDAHO FALLS, Idaho) — The Idaho National Laboratory and E Cyclers of Idaho will host several electronic waste collection events at the...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of id.collector is http://idcollector.com/#/home.
According to Rankiteo, id.collector’s AI-generated cybersecurity score is 754, reflecting their Fair security posture.
According to Rankiteo, id.collector currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, id.collector is not certified under SOC 2 Type 1.
According to Rankiteo, id.collector does not hold a SOC 2 Type 2 certification.
According to Rankiteo, id.collector is not listed as GDPR compliant.
According to Rankiteo, id.collector does not currently maintain PCI DSS compliance.
According to Rankiteo, id.collector is not compliant with HIPAA regulations.
According to Rankiteo,id.collector is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
id.collector operates primarily in the Book and Periodical Publishing industry.
id.collector employs approximately 2 people worldwide.
id.collector presently has no subsidiaries across any sectors.
id.collector’s official LinkedIn profile has approximately 20 followers.
No, id.collector does not have a profile on Crunchbase.
Yes, id.collector maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/idcollector.
As of November 28, 2025, Rankiteo reports that id.collector has not experienced any cybersecurity incidents.
id.collector has an estimated 4,881 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, id.collector has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
ThingsBoard in versions prior to v4.2.1 allows an authenticated user to upload malicious SVG images via the "Image Gallery", leading to a Stored Cross-Site Scripting (XSS) vulnerability. The exploit can be triggered when any user accesses the public API endpoint of the malicious SVG images, or if the malicious images are embedded in an `iframe` element, during a widget creation, deployed to any page of the platform (e.g., dashboards), and accessed during normal operations. The vulnerability resides in the `ImageController`, which fails to restrict the execution of JavaScript code when an image is loaded by the user's browser. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions.
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to sanitize team email addresses to be visible only to Team Admins, which allows any authenticated user to view team email addresses via the GET /api/v4/channels/{channel_id}/common_teams endpoint
Exposure of email service credentials to users without administrative rights in Devolutions Server.This issue affects Devolutions Server: before 2025.2.21, before 2025.3.9.
Exposure of credentials in unintended requests in Devolutions Server.This issue affects Server: through 2025.2.20, through 2025.3.8.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.