Comparison Overview

Imajine That

VS

California Surf Museum

Imajine That

354 Merrimack St., Lawrence, MA, 01843, US
Last Update: 2025-12-01
Between 750 and 799

The Imajine That Museum is a Certified B Corporation and a first of its kind family and child interactive play space where human potential has no boundaries. Our unique 12,000 square foot play space located at the Riverwalk in Lawrence, offers an environment where families can create and learn together in a safe and educational manner. Imajine That's "Imagination Stations"​ include a child sized Whole Foods® grocery store, a HUGE dinosaur climbing structure, Between the Lions® literacy area, Peep and the Big Wide World® Science Station, just to name a few. In addition to the museum, Imajine That also offers full day family engagement preschool programs called Imajine That University located at the Riverwalk Lawrence. Imajine That also offers extended learning day programs in the Boston Public Schools and Lawrence Public Schools. Each of the schools Imajine That works with has a customized curriculum to meet the needs of the school and children. Imajine That provides education and enrichment for children in the preschool and elementary years. With a play-based approach, Imajine That follows all National Association for the Education of Young Children (NAEYC) guidelines for developmentally appropriate practices. Practices include an intentional focus on: (1) Social and emotional development (2) Oral language development (speaking, listening, and vocabulary) (3) Early literacy learning (especially phonemic awareness, phonics, and listening comprehension) (4) Exploration of STEM topics through highly engaging interactive play. Art and music are incorporated into many activities. Imajine That uses educational technology from award-winning producers (e.g. the science games from Peep in the Big Wide World produced by WGBH, a PBS affiliate) to enhance learning experiences with iPad technology. And, finally, but very importantly, foundational to the Imajine That approach are physical activity and a healthy way of eating

NAICS: 712
NAICS Definition: Museums, Historical Sites, and Similar Institutions
Employees: 22
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

California Surf Museum

None
Last Update: 2025-12-03
Between 750 and 799

Mission Statement: The California Surf Museum serves as an international repository and resource center on the lifestyle sport of surfing through capturing, preserving, and chronicling its art, culture and heritage for the education and enjoyment of future generations. The California Surf Museum was founded in February 1986 when architect/surfer Stuart Resor appeared in a local newspaper article inviting interested people to found a museum to honor the history of surfing. Thirteen various folks showed up, formed a board of directors, and went to work! Looking for a place to call home, CSM was first based in an Encinitas restaurant (George's, owned by co-founder Jane Schmauss). CSM then had a one-year stint in its own showcase in Moonlight Plaza in Encinitas, then two years in the Promenade Plaza in Pacific Beach. From 1991-1996, CSM was located across the street from Oceanside’s Pier, with a block-sized lot to hold plenty of outdoor events and enjoy amazing sunsets. In 1996, CSM moved inland four blocks to Coast Highway, across from the Oceanside Civic Center. In early 2009, CSM settled into its spacious new premises at 312 Pier View Way. Whew! What a ride Featuring the CSM’s most recent location, once a drug store, on Coast Highway, and its stunning new home.

NAICS: 712
NAICS Definition: Museums, Historical Sites, and Similar Institutions
Employees: 6
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/imajine-that.jpeg
Imajine That
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/california-surf-museum.jpeg
California Surf Museum
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Imajine That
100%
Compliance Rate
0/4 Standards Verified
California Surf Museum
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Museums, Historical Sites, and Zoos Industry Average (This Year)

No incidents recorded for Imajine That in 2025.

Incidents vs Museums, Historical Sites, and Zoos Industry Average (This Year)

No incidents recorded for California Surf Museum in 2025.

Incident History — Imajine That (X = Date, Y = Severity)

Imajine That cyber incidents detection timeline including parent company and subsidiaries

Incident History — California Surf Museum (X = Date, Y = Severity)

California Surf Museum cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/imajine-that.jpeg
Imajine That
Incidents

No Incident

https://images.rankiteo.com/companyimages/california-surf-museum.jpeg
California Surf Museum
Incidents

No Incident

FAQ

Imajine That company demonstrates a stronger AI Cybersecurity Score compared to California Surf Museum company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Historically, California Surf Museum company has disclosed a higher number of cyber incidents compared to Imajine That company.

In the current year, California Surf Museum company and Imajine That company have not reported any cyber incidents.

Neither California Surf Museum company nor Imajine That company has reported experiencing a ransomware attack publicly.

Neither California Surf Museum company nor Imajine That company has reported experiencing a data breach publicly.

Neither California Surf Museum company nor Imajine That company has reported experiencing targeted cyberattacks publicly.

Neither Imajine That company nor California Surf Museum company has reported experiencing or disclosing vulnerabilities publicly.

Neither Imajine That nor California Surf Museum holds any compliance certifications.

Neither company holds any compliance certifications.

Neither Imajine That company nor California Surf Museum company has publicly disclosed detailed information about the number of their subsidiaries.

Imajine That company employs more people globally than California Surf Museum company, reflecting its scale as a Museums, Historical Sites, and Zoos.

Neither Imajine That nor California Surf Museum holds SOC 2 Type 1 certification.

Neither Imajine That nor California Surf Museum holds SOC 2 Type 2 certification.

Neither Imajine That nor California Surf Museum holds ISO 27001 certification.

Neither Imajine That nor California Surf Museum holds PCI DSS certification.

Neither Imajine That nor California Surf Museum holds HIPAA certification.

Neither Imajine That nor California Surf Museum holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

vLLM is an inference and serving engine for large language models (LLMs). Prior to 0.11.1, vllm has a critical remote code execution vector in a config class named Nemotron_Nano_VL_Config. When vllm loads a model config that contains an auto_map entry, the config class resolves that mapping with get_class_from_dynamic_module(...) and immediately instantiates the returned class. This fetches and executes Python from the remote repository referenced in the auto_map string. Crucially, this happens even when the caller explicitly sets trust_remote_code=False in vllm.transformers_utils.config.get_config. In practice, an attacker can publish a benign-looking frontend repo whose config.json points via auto_map to a separate malicious backend repo; loading the frontend will silently run the backend’s code on the victim host. This vulnerability is fixed in 0.11.1.

Risk Information
cvss3
Base: 7.1
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
Description

fastify-reply-from is a Fastify plugin to forward the current HTTP request to another server. Prior to 12.5.0, by crafting a malicious URL, an attacker could access routes that are not allowed, even though the reply.from is defined for specific routes in @fastify/reply-from. This vulnerability is fixed in 12.5.0.

Risk Information
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to 21.0.2, 20.3.15, and 19.2.17, A Stored Cross-Site Scripting (XSS) vulnerability has been identified in the Angular Template Compiler. It occurs because the compiler's internal security schema is incomplete, allowing attackers to bypass Angular's built-in security sanitization. Specifically, the schema fails to classify certain URL-holding attributes (e.g., those that could contain javascript: URLs) as requiring strict URL security, enabling the injection of malicious scripts. This vulnerability is fixed in 21.0.2, 20.3.15, and 19.2.17.

Risk Information
cvss4
Base: 8.5
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Gin-vue-admin is a backstage management system based on vue and gin. In 2.8.6 and earlier, attackers can delete any file on the server at will, causing damage or unavailability of server resources. Attackers can control the 'FileMd5' parameter to delete any file and folder.

Risk Information
cvss4
Base: 8.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Portkey.ai Gateway is a blazing fast AI Gateway with integrated guardrails. Prior to 1.14.0, the gateway determined the destination baseURL by prioritizing the value in the x-portkey-custom-host request header. The proxy route then appends the client-specified path to perform an external fetch. This can be maliciously used by users for SSRF attacks. This vulnerability is fixed in 1.14.0.

Risk Information
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X