Comparison Overview

Industrial Equipment News

VS

CQ

Industrial Equipment News

199 E Badger Rd, Madison, Wisconsin, 53713, US
Last Update: 2025-11-27
Between 700 and 749

Since 1933, the industrial sector has looked to IEN for the latest news and information on products, components and equipment. Applying this knowledge to their purchasing decisions has led the industrial engineer to solutions that ensure operational efficiency and cost effectiveness in their manufacturing and product development initiatives. IEN continues in its product-centric traditions by leveraging print, web, video, email, and social media to distribute this vital information. The newly packaged IEN still produces a bi-monthly print publication, but we have also launched a collection of daily e-newsletters supported by a constantly updated, new IEN.com, and a new web series, IEN Now. The brand can also be tracked on Twitter (@IEN_Now), Facebook, YouTube, and LinkedIn. IEN is led by President Tom Lynch, Regional Sales Manager Chuck Marin, Director of Multimedia Eric Sorensen, and the editorial team of Anna Wells, David Mantey, and Jeff Reinke.

NAICS: 511
NAICS Definition:
Employees: 3
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

CQ

1625 Eye St NW, Washington, District of Columbia, undefined, US
Last Update: 2025-11-26
Between 750 and 799

CQ provides essential intelligence and grassroots advocacy resources to take action. As the premier source of timely news, objective facts and analysis, and coverage of elections and the politics of legislation, we keep our fingers on the pulse of the legislative process and give our clients the tools they need to maximize their influence. We are the ultimate insider, and our unmatched network of relationships and expertise has powered the productivity of those who rely on us since 1945.

NAICS: 511
NAICS Definition: Publishing Industries (except Internet)
Employees: 246
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/industrial-equipment-news.jpeg
Industrial Equipment News
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/cq-roll-call-group.jpeg
CQ
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Industrial Equipment News
100%
Compliance Rate
0/4 Standards Verified
CQ
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Book and Periodical Publishing Industry Average (This Year)

No incidents recorded for Industrial Equipment News in 2025.

Incidents vs Book and Periodical Publishing Industry Average (This Year)

No incidents recorded for CQ in 2025.

Incident History — Industrial Equipment News (X = Date, Y = Severity)

Industrial Equipment News cyber incidents detection timeline including parent company and subsidiaries

Incident History — CQ (X = Date, Y = Severity)

CQ cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/industrial-equipment-news.jpeg
Industrial Equipment News
Incidents

No Incident

https://images.rankiteo.com/companyimages/cq-roll-call-group.jpeg
CQ
Incidents

No Incident

FAQ

CQ company demonstrates a stronger AI Cybersecurity Score compared to Industrial Equipment News company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Historically, CQ company has disclosed a higher number of cyber incidents compared to Industrial Equipment News company.

In the current year, CQ company and Industrial Equipment News company have not reported any cyber incidents.

Neither CQ company nor Industrial Equipment News company has reported experiencing a ransomware attack publicly.

Neither CQ company nor Industrial Equipment News company has reported experiencing a data breach publicly.

Neither CQ company nor Industrial Equipment News company has reported experiencing targeted cyberattacks publicly.

Neither Industrial Equipment News company nor CQ company has reported experiencing or disclosing vulnerabilities publicly.

Neither Industrial Equipment News nor CQ holds any compliance certifications.

Neither company holds any compliance certifications.

Neither Industrial Equipment News company nor CQ company has publicly disclosed detailed information about the number of their subsidiaries.

CQ company employs more people globally than Industrial Equipment News company, reflecting its scale as a Book and Periodical Publishing.

Neither Industrial Equipment News nor CQ holds SOC 2 Type 1 certification.

Neither Industrial Equipment News nor CQ holds SOC 2 Type 2 certification.

Neither Industrial Equipment News nor CQ holds ISO 27001 certification.

Neither Industrial Equipment News nor CQ holds PCI DSS certification.

Neither Industrial Equipment News nor CQ holds HIPAA certification.

Neither Industrial Equipment News nor CQ holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

ThingsBoard in versions prior to v4.2.1 allows an authenticated user to upload malicious SVG images via the "Image Gallery", leading to a Stored Cross-Site Scripting (XSS) vulnerability. The exploit can be triggered when any user accesses the public API endpoint of the malicious SVG images, or if the malicious images are embedded in an `iframe` element, during a widget creation, deployed to any page of the platform (e.g., dashboards), and accessed during normal operations. The vulnerability resides in the `ImageController`, which fails to restrict the execution of JavaScript code when an image is loaded by the user's browser. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions.

Risk Information
cvss4
Base: 6.2
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:H/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).

Risk Information
cvss3
Base: 9.9
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Description

Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to sanitize team email addresses to be visible only to Team Admins, which allows any authenticated user to view team email addresses via the GET /api/v4/channels/{channel_id}/common_teams endpoint

Risk Information
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Description

Exposure of email service credentials to users without administrative rights in Devolutions Server.This issue affects Devolutions Server: before 2025.2.21, before 2025.3.9.

Description

Exposure of credentials in unintended requests in Devolutions Server.This issue affects Server: through 2025.2.20, through 2025.3.8.