Comparison Overview

Jessica Kingsley Publishers, Ltd

VS

Cane Creek Publishers, LLC.

Jessica Kingsley Publishers, Ltd

Carmelite House, 50 Victoria Embankment, London, undefined, EC4Y 0DZ, GB
Last Update: 2025-11-25
Between 750 and 799

For more than 30 years, JKP has been a publisher at the forefront of social change. Our mission is to empower individuals to change society through information and knowledge. We are community-focused and believe in giving people the platform to share their experiences. We publish non-fiction books and resources for professionals, practitioners and the general reader. Our commitment to promoting positive perspectives on difference has established us as a leading voice in several fields; including autism and neurodiversity, arts therapies, social work, mental health and counselling, gender diversity, adoption and fostering, healthcare, and inclusive teaching and learning resources. We also publish children’s books that help young readers to understand big feelings or difficult situations. JKP was founded in 1987 by Jessica Kingsley. In 2004, we opened our Philadelphia office, and in 2006 we launched the Singing Dragon imprint, which specialises in Chinese medicine and complementary therapies. We joined the Hachette Group in 2017, as a division of John Murray Press. In 2020 and 2022, we won The British Book Award for Academic, Educational and Professional Publisher of the Year. In 2022, we acquired Handspring, a publisher specialising in professional books which serve as a springboard for learning about bodywork and movement. Handspring Publishing operates under Singing Dragon, JKP’s imprint.

NAICS: 511
NAICS Definition:
Employees: 132
Subsidiaries: 15
12-month incidents
0
Known data breaches
0
Attack type number
0

Cane Creek Publishers, LLC.

undefined, Asheville, NC, 28730, US
Last Update: 2025-11-26

Cane Creek Publishers, LLC (herein referred to as CCP) is a family owned company located in North Carolina. The establishment of CCP began from the desire of author Timothy Penland and his family to see “The True Night Before Christmas” become a published book. The work, which was written in 1999, had been well received over the years with numerous requests for it to be published. In 2008, the decision to publish “The True Night Before Christmas” was made and CCP was born. Since that time, CCP has concentrated on printing, marketing and distributing “The True Night Before Christmas”. Additionally, the company has published a companion title which tells the true story of Easter. Most recently, CCP has launched two book series by Mr. Penland. Both are children’s picture book series which follow the same contextual format of his earlier Christmas and Easter books. One series retells stories from the Bible, while the other recounts major events and personalities in American history. CCP is also in partnership with Dawson Media, a ministry of NavPress (one of the world’s foremost publishers of Christian material). The partnership allows our products to be printed, marketed, distributed, and sold to a nationwide audience. Through the efforts of CCP and Dawson Media, our products are also available in a variety of specialty gift shops, at our on-line store, and through our direct sales network.

NAICS: 511
NAICS Definition:
Employees: 4
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/jessica-kingsley-publishers-inc..jpeg
Jessica Kingsley Publishers, Ltd
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/cane-creek-publishers-llc..jpeg
Cane Creek Publishers, LLC.
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Jessica Kingsley Publishers, Ltd
100%
Compliance Rate
0/4 Standards Verified
Cane Creek Publishers, LLC.
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Book and Periodical Publishing Industry Average (This Year)

No incidents recorded for Jessica Kingsley Publishers, Ltd in 2025.

Incidents vs Book and Periodical Publishing Industry Average (This Year)

No incidents recorded for Cane Creek Publishers, LLC. in 2025.

Incident History — Jessica Kingsley Publishers, Ltd (X = Date, Y = Severity)

Jessica Kingsley Publishers, Ltd cyber incidents detection timeline including parent company and subsidiaries

Incident History — Cane Creek Publishers, LLC. (X = Date, Y = Severity)

Cane Creek Publishers, LLC. cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/jessica-kingsley-publishers-inc..jpeg
Jessica Kingsley Publishers, Ltd
Incidents

No Incident

https://images.rankiteo.com/companyimages/cane-creek-publishers-llc..jpeg
Cane Creek Publishers, LLC.
Incidents

No Incident

FAQ

Jessica Kingsley Publishers, Ltd company demonstrates a stronger AI Cybersecurity Score compared to Cane Creek Publishers, LLC. company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Historically, Cane Creek Publishers, LLC. company has disclosed a higher number of cyber incidents compared to Jessica Kingsley Publishers, Ltd company.

In the current year, Cane Creek Publishers, LLC. company and Jessica Kingsley Publishers, Ltd company have not reported any cyber incidents.

Neither Cane Creek Publishers, LLC. company nor Jessica Kingsley Publishers, Ltd company has reported experiencing a ransomware attack publicly.

Neither Cane Creek Publishers, LLC. company nor Jessica Kingsley Publishers, Ltd company has reported experiencing a data breach publicly.

Neither Cane Creek Publishers, LLC. company nor Jessica Kingsley Publishers, Ltd company has reported experiencing targeted cyberattacks publicly.

Neither Jessica Kingsley Publishers, Ltd company nor Cane Creek Publishers, LLC. company has reported experiencing or disclosing vulnerabilities publicly.

Neither Jessica Kingsley Publishers, Ltd nor Cane Creek Publishers, LLC. holds any compliance certifications.

Neither company holds any compliance certifications.

Jessica Kingsley Publishers, Ltd company has more subsidiaries worldwide compared to Cane Creek Publishers, LLC. company.

Jessica Kingsley Publishers, Ltd company employs more people globally than Cane Creek Publishers, LLC. company, reflecting its scale as a Book and Periodical Publishing.

Neither Jessica Kingsley Publishers, Ltd nor Cane Creek Publishers, LLC. holds SOC 2 Type 1 certification.

Neither Jessica Kingsley Publishers, Ltd nor Cane Creek Publishers, LLC. holds SOC 2 Type 2 certification.

Neither Jessica Kingsley Publishers, Ltd nor Cane Creek Publishers, LLC. holds ISO 27001 certification.

Neither Jessica Kingsley Publishers, Ltd nor Cane Creek Publishers, LLC. holds PCI DSS certification.

Neither Jessica Kingsley Publishers, Ltd nor Cane Creek Publishers, LLC. holds HIPAA certification.

Neither Jessica Kingsley Publishers, Ltd nor Cane Creek Publishers, LLC. holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

ThingsBoard in versions prior to v4.2.1 allows an authenticated user to upload malicious SVG images via the "Image Gallery", leading to a Stored Cross-Site Scripting (XSS) vulnerability. The exploit can be triggered when any user accesses the public API endpoint of the malicious SVG images, or if the malicious images are embedded in an `iframe` element, during a widget creation, deployed to any page of the platform (e.g., dashboards), and accessed during normal operations. The vulnerability resides in the `ImageController`, which fails to restrict the execution of JavaScript code when an image is loaded by the user's browser. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions.

Risk Information
cvss4
Base: 6.2
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:H/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).

Risk Information
cvss3
Base: 9.9
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Description

Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to sanitize team email addresses to be visible only to Team Admins, which allows any authenticated user to view team email addresses via the GET /api/v4/channels/{channel_id}/common_teams endpoint

Risk Information
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Description

Exposure of email service credentials to users without administrative rights in Devolutions Server.This issue affects Devolutions Server: before 2025.2.21, before 2025.3.9.

Description

Exposure of credentials in unintended requests in Devolutions Server.This issue affects Server: through 2025.2.20, through 2025.3.8.