ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

id.collector™ works together with you to create a beautifully bound book celebrating your collection. We conduct in house interviews that illuminate and capture the thinking and bravery of building a collection. Coupled with the interview, we curate a selection of images that serve as highlights of your art acquisitions. The result is an elegant hard cover book covering the history and breadth of your collection. Our bound books are also accessible in digital format allowing you to easily share and transport your collection with select curators, museums, and colleagues. id.collector books may be shown and shared on tablets, mobile devices and online. Share a beautiful slideshow of the collection with a friend over lunch. Collections can be digitally loaned to universities for educational purposes or used as a visual reference with an art adviser. id.collector makes it easy to enjoy your collection with others. Our website allows one to access an archive of the art collection to easily search, select and send information. There are built in security measures and copyright protection that insure all digital files are available only for designated use. Our privacy feature and contract insures exclusive access to the collector and collector’s retain all copyright and ownership rights. id.collector is a partnership between Helen Chen and Lizanne Merrill. Both women have extensive experience working within the New York art world and first met facilitating a private sale of an Ai Wei Wei sculpture in 2007. With a Masters in Arts Administration, Helen has focused her career on art publishing, producing high quality exhibition and art catalogs, and collections management for a variety of private collectors. Lizanne has developed an art advisory service offering clients an in-depth knowledge of the emerging and established artwork. She is also an avid collector herself.

id.collector A.I CyberSecurity Scoring

id.collector

Company Details

Linkedin ID:

idcollector

Employees number:

2

Number of followers:

20

NAICS:

511

Industry Type:

Book and Periodical Publishing

Homepage:

idcollector.com

IP Addresses:

0

Company ID:

ID._2643730

Scan Status:

In-progress

AI scoreid.collector Risk Score (AI oriented)

Between 750 and 799

https://images.rankiteo.com/companyimages/idcollector.jpeg
id.collector Book and Periodical Publishing
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreid.collector Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/idcollector.jpeg
id.collector Book and Periodical Publishing
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

id.collector Company CyberSecurity News & History

Past Incidents
0
Attack Types
0
No data available
Ailogo

id.collector Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for id.collector

Incidents vs Book and Periodical Publishing Industry Average (This Year)

No incidents recorded for id.collector in 2025.

Incidents vs All-Companies Average (This Year)

No incidents recorded for id.collector in 2025.

Incident Types id.collector vs Book and Periodical Publishing Industry Avg (This Year)

No incidents recorded for id.collector in 2025.

Incident History — id.collector (X = Date, Y = Severity)

id.collector cyber incidents detection timeline including parent company and subsidiaries

id.collector Company Subsidiaries

SubsidiaryImage

id.collector™ works together with you to create a beautifully bound book celebrating your collection. We conduct in house interviews that illuminate and capture the thinking and bravery of building a collection. Coupled with the interview, we curate a selection of images that serve as highlights of your art acquisitions. The result is an elegant hard cover book covering the history and breadth of your collection. Our bound books are also accessible in digital format allowing you to easily share and transport your collection with select curators, museums, and colleagues. id.collector books may be shown and shared on tablets, mobile devices and online. Share a beautiful slideshow of the collection with a friend over lunch. Collections can be digitally loaned to universities for educational purposes or used as a visual reference with an art adviser. id.collector makes it easy to enjoy your collection with others. Our website allows one to access an archive of the art collection to easily search, select and send information. There are built in security measures and copyright protection that insure all digital files are available only for designated use. Our privacy feature and contract insures exclusive access to the collector and collector’s retain all copyright and ownership rights. id.collector is a partnership between Helen Chen and Lizanne Merrill. Both women have extensive experience working within the New York art world and first met facilitating a private sale of an Ai Wei Wei sculpture in 2007. With a Masters in Arts Administration, Helen has focused her career on art publishing, producing high quality exhibition and art catalogs, and collections management for a variety of private collectors. Lizanne has developed an art advisory service offering clients an in-depth knowledge of the emerging and established artwork. She is also an avid collector herself.

Loading...
similarCompanies

id.collector Similar Companies

African Voices Communications, Inc.

African Voices, a non-profit arts organization, is devoted to showcasing unique and diverse stories within the African Diaspora through the arts, literature and film. The organization publishes a literary magazine, sponsors book signings, literary readings, professional conferences and workshops for

101 Network

The 101 Network is a digital publishing platform that delivers a daily dose of knowledge. We believe in the power to inform and entertain. It debuted in 2018 with four verticals — History, Finance, Science, and Living — with a blueprint for rapidly expanding the vertical collection. Redefining what

Know Your Meme

Know Your Meme is an online encyclopedia and knowledge community dedicated to researching, documenting and explaining the origins, history and evolution of memes and internet culture at large. Founded in December of 2008, Know Your Meme's research is handled by its independent professional editorial

ReaderLink

ReaderLink is North America’s largest full-service book distributor. Each year, ReaderLink ships more than 325 million books and drives over $3 billion in sales for our partners. ReaderLink serves over 300 retailers with a combined 100,000 individual storefronts. Our broad customer base is a testa

Valve World Americas

Valve World Americas Expo and Conference -- https://valveworldexpoamericas.com/ The Valve World Americas Journal is a publication of KCI World. Published 10 times a year, the journal seeks to keep American readers up-to-date with the latest trends, projects, developments and news from the flow con

Oxford University Press

Part of the University of Oxford. Established in the earliest days of printing, we’ve been home to the inquisitive, the passionate, and the ambitious for the last 500 years. Our mission is clear – to create the highest quality research and education resources and make them available worldwide. Fro

newsone

id.collector CyberSecurity News

October 29, 2025 07:00 AM
Rethinking Data Collection in Identity Security

The key to an effective security strategy lies not in collecting more information, but in focusing on the right data to ensure safety...

October 22, 2025 07:00 AM
Navigating New Obligations Under the CCPA’s Updated Regulations

New privacy regulations provide insights into California's approach to ADMT, cybersecurity audits, and risk assessments, while amendments...

October 02, 2025 07:00 AM
Cybersecurity Awareness Month: Identity, AI, and the Future of Your Cyber Defense

To celebrate Cybersecurity Month and help your organization build cyber resilience, OpenText is hosting White Hat Hacker Wars.

September 11, 2025 07:00 AM
Cameroon signals urgency on biometric voter ID collection as presidential vote nears

The election agency is now racing to distribute both backlogged old cards and newly printed ones as the country's presidential election is...

June 18, 2025 07:00 AM
16 billion passwords exposed in record-breaking data breach: are you affected?

Several collections of login credentials reveal one of the largest data breaches in history, totaling a humongous 16 billion exposed login credentials.

June 12, 2025 07:00 AM
The 20 biggest data breaches of the 21st century

Data breaches affecting millions of users are far too common. Here are some of the biggest, baddest breaches in recent memory.

June 05, 2025 07:00 AM
Largest ever data leak exposes over 4 billion user records

China suffers its largest data breach ever with 4 billion user records exposed, including WeChat, Alipay, and financial data.

March 14, 2025 07:00 AM
U.S. Cybersecurity and Data Privacy Review and Outlook – 2025

This Review addresses (1) the regulation of privacy and data security, other legislative developments, enforcement actions by federal and state authorities,

February 06, 2025 08:00 AM
Electronics recycling available in Idaho Falls: INL, E Cyclers hosting collection events

(IDAHO FALLS, Idaho) — The Idaho National Laboratory and E Cyclers of Idaho will host several electronic waste collection events at the...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

id.collector CyberSecurity History Information

Official Website of id.collector

The official website of id.collector is http://idcollector.com/#/home.

id.collector’s AI-Generated Cybersecurity Score

According to Rankiteo, id.collector’s AI-generated cybersecurity score is 754, reflecting their Fair security posture.

How many security badges does id.collector’ have ?

According to Rankiteo, id.collector currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does id.collector have SOC 2 Type 1 certification ?

According to Rankiteo, id.collector is not certified under SOC 2 Type 1.

Does id.collector have SOC 2 Type 2 certification ?

According to Rankiteo, id.collector does not hold a SOC 2 Type 2 certification.

Does id.collector comply with GDPR ?

According to Rankiteo, id.collector is not listed as GDPR compliant.

Does id.collector have PCI DSS certification ?

According to Rankiteo, id.collector does not currently maintain PCI DSS compliance.

Does id.collector comply with HIPAA ?

According to Rankiteo, id.collector is not compliant with HIPAA regulations.

Does id.collector have ISO 27001 certification ?

According to Rankiteo,id.collector is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of id.collector

id.collector operates primarily in the Book and Periodical Publishing industry.

Number of Employees at id.collector

id.collector employs approximately 2 people worldwide.

Subsidiaries Owned by id.collector

id.collector presently has no subsidiaries across any sectors.

id.collector’s LinkedIn Followers

id.collector’s official LinkedIn profile has approximately 20 followers.

id.collector’s Presence on Crunchbase

No, id.collector does not have a profile on Crunchbase.

id.collector’s Presence on LinkedIn

Yes, id.collector maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/idcollector.

Cybersecurity Incidents Involving id.collector

As of November 28, 2025, Rankiteo reports that id.collector has not experienced any cybersecurity incidents.

Number of Peer and Competitor Companies

id.collector has an estimated 4,881 peer or competitor companies worldwide.

id.collector CyberSecurity History Information

How many cyber incidents has id.collector faced ?

Total Incidents: According to Rankiteo, id.collector has faced 0 incidents in the past.

What types of cybersecurity incidents have occurred at id.collector ?

Incident Types: The types of cybersecurity incidents that have occurred include .

Incident Details

What are the most common types of attacks the company has faced ?

Additional Questions

cve

Latest Global CVEs (Not Company-Specific)

Description

ThingsBoard in versions prior to v4.2.1 allows an authenticated user to upload malicious SVG images via the "Image Gallery", leading to a Stored Cross-Site Scripting (XSS) vulnerability. The exploit can be triggered when any user accesses the public API endpoint of the malicious SVG images, or if the malicious images are embedded in an `iframe` element, during a widget creation, deployed to any page of the platform (e.g., dashboards), and accessed during normal operations. The vulnerability resides in the `ImageController`, which fails to restrict the execution of JavaScript code when an image is loaded by the user's browser. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions.

Risk Information
cvss4
Base: 6.2
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:H/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).

Risk Information
cvss3
Base: 9.9
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Description

Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to sanitize team email addresses to be visible only to Team Admins, which allows any authenticated user to view team email addresses via the GET /api/v4/channels/{channel_id}/common_teams endpoint

Risk Information
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Description

Exposure of email service credentials to users without administrative rights in Devolutions Server.This issue affects Devolutions Server: before 2025.2.21, before 2025.3.9.

Description

Exposure of credentials in unintended requests in Devolutions Server.This issue affects Server: through 2025.2.20, through 2025.3.8.

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=idcollector' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge