Comparison Overview

Institute for State Effectiveness

VS

CEPR - Centre for Economic Policy Research

Institute for State Effectiveness

1050 30th St. NW, Washington, DC, DC, 20007, US
Last Update: 2025-12-01
Between 700 and 749

The Institute for State Effectiveness (ISE) is a non-governmental organization based in Washington, D.C. that seeks to address the challenge of accountability and governance through a system-building approach across governments, markets and people. We believe that underlying many of today’s challenges is a systemic crisis in accountability and effectiveness of governance. We believe the opportunity lies in creating approaches to equip leaders and managers with the knowledge, skills and tools to create inclusive policies and accountable institutions. Our years of field work in frontier and emerging countries, leading teams and developing programs at the World Bank, and studying “what works” around the world, led us to discover a set of approaches that work. Today we are focused on developing and systematizing this know-how to support leaders and organizations at the forefront of policy design and implementation. We aim to make cutting-edge methodologies, tools and rigorous metrics available to the global community, by sharing methods that are less costly yet more impactful than many current approaches. Twitter: https://twitter.com/effectivestates

NAICS: 541
NAICS Definition:
Employees: 15
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

CEPR - Centre for Economic Policy Research

33 Great Sutton Street, 2nd floor, London, GB, EC1V 0DX
Last Update: 2025-12-03
Between 750 and 799

CEPR is an independent, non‐partisan, pan‐European non‐profit organization. Its mission is to enhance the quality of policy decisions through providing policy‐relevant research, based soundly in economic theory, to policymakers, the private sector and civil society. The results of the research conducted by the Centre's network of over 1,700 affiliated researchers are disseminated through a variety of publications, public meeting, workshops and conferences. Twitter: @cepr_org YouTube: VOXViewsCEPR Facebook: https://www.facebook.com/cepr.org/

NAICS: 54172
NAICS Definition: Research and Development in the Social Sciences and Humanities
Employees: 184
Subsidiaries: 1
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/institute-for-state-effectiveness.jpeg
Institute for State Effectiveness
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/centre-for-economic-policy-research.jpeg
CEPR - Centre for Economic Policy Research
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Institute for State Effectiveness
100%
Compliance Rate
0/4 Standards Verified
CEPR - Centre for Economic Policy Research
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Think Tanks Industry Average (This Year)

No incidents recorded for Institute for State Effectiveness in 2025.

Incidents vs Think Tanks Industry Average (This Year)

No incidents recorded for CEPR - Centre for Economic Policy Research in 2025.

Incident History — Institute for State Effectiveness (X = Date, Y = Severity)

Institute for State Effectiveness cyber incidents detection timeline including parent company and subsidiaries

Incident History — CEPR - Centre for Economic Policy Research (X = Date, Y = Severity)

CEPR - Centre for Economic Policy Research cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/institute-for-state-effectiveness.jpeg
Institute for State Effectiveness
Incidents

No Incident

https://images.rankiteo.com/companyimages/centre-for-economic-policy-research.jpeg
CEPR - Centre for Economic Policy Research
Incidents

No Incident

FAQ

CEPR - Centre for Economic Policy Research company demonstrates a stronger AI Cybersecurity Score compared to Institute for State Effectiveness company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Historically, CEPR - Centre for Economic Policy Research company has disclosed a higher number of cyber incidents compared to Institute for State Effectiveness company.

In the current year, CEPR - Centre for Economic Policy Research company and Institute for State Effectiveness company have not reported any cyber incidents.

Neither CEPR - Centre for Economic Policy Research company nor Institute for State Effectiveness company has reported experiencing a ransomware attack publicly.

Neither CEPR - Centre for Economic Policy Research company nor Institute for State Effectiveness company has reported experiencing a data breach publicly.

Neither CEPR - Centre for Economic Policy Research company nor Institute for State Effectiveness company has reported experiencing targeted cyberattacks publicly.

Neither Institute for State Effectiveness company nor CEPR - Centre for Economic Policy Research company has reported experiencing or disclosing vulnerabilities publicly.

Neither Institute for State Effectiveness nor CEPR - Centre for Economic Policy Research holds any compliance certifications.

Neither company holds any compliance certifications.

CEPR - Centre for Economic Policy Research company has more subsidiaries worldwide compared to Institute for State Effectiveness company.

CEPR - Centre for Economic Policy Research company employs more people globally than Institute for State Effectiveness company, reflecting its scale as a Think Tanks.

Neither Institute for State Effectiveness nor CEPR - Centre for Economic Policy Research holds SOC 2 Type 1 certification.

Neither Institute for State Effectiveness nor CEPR - Centre for Economic Policy Research holds SOC 2 Type 2 certification.

Neither Institute for State Effectiveness nor CEPR - Centre for Economic Policy Research holds ISO 27001 certification.

Neither Institute for State Effectiveness nor CEPR - Centre for Economic Policy Research holds PCI DSS certification.

Neither Institute for State Effectiveness nor CEPR - Centre for Economic Policy Research holds HIPAA certification.

Neither Institute for State Effectiveness nor CEPR - Centre for Economic Policy Research holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

Sigstore Timestamp Authority is a service for issuing RFC 3161 timestamps. Prior to 2.0.3, Function api.ParseJSONRequest currently splits (via a call to strings.Split) an optionally-provided OID (which is untrusted data) on periods. Similarly, function api.getContentType splits the Content-Type header (which is also untrusted data) on an application string. As a result, in the face of a malicious request with either an excessively long OID in the payload containing many period characters or a malformed Content-Type header, a call to api.ParseJSONRequest or api.getContentType incurs allocations of O(n) bytes (where n stands for the length of the function's argument). This vulnerability is fixed in 2.0.3.

Risk Information
cvss3
Base: 7.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Description

Monkeytype is a minimalistic and customizable typing test. In 25.49.0 and earlier, there is improper handling of user input which allows an attacker to execute malicious javascript on anyone viewing a malicious quote submission. quote.text and quote.source are user input, and they're inserted straight into the DOM. If they contain HTML tags, they will be rendered (after some escaping using quotes and textarea tags).

Risk Information
cvss4
Base: 7.1
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

SysReptor is a fully customizable pentest reporting platform. Prior to 2025.102, there is a Stored Cross-Site Scripting (XSS) vulnerability allows authenticated users to execute malicious JavaScript in the context of other logged-in users by uploading malicious JavaScript files in the web UI. This vulnerability is fixed in 2025.102.

Risk Information
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N
Description

Taiko Alethia is an Ethereum-equivalent, permissionless, based rollup designed to scale Ethereum without compromising its fundamental properties. In 2.3.1 and earlier, TaikoInbox._verifyBatches (packages/protocol/contracts/layer1/based/TaikoInbox.sol:627-678) advanced the local tid to whatever transition matched the current blockHash before knowing whether that batch would actually be verified. When the loop later broke (e.g., cooldown window not yet passed or transition invalidated), the function still wrote that newer tid into batches[lastVerifiedBatchId].verifiedTransitionId after decrementing batchId. Result: the last verified batch could end up pointing at a transition index from the next batch (often zeroed), corrupting the verified chain pointer.

Risk Information
cvss4
Base: 8.0
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A flaw has been found in youlaitech youlai-mall 1.0.0/2.0.0. Affected is the function getById/updateAddress/deleteAddress of the file /mall-ums/app-api/v1/addresses/. Executing manipulation can lead to improper control of dynamically-identified variables. The attack can be executed remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 6.5
Severity: LOW
AV:N/AC:L/Au:S/C:P/I:P/A:P
cvss3
Base: 6.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X