ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

John Pomp is a design-driven artisan manufacturer focused on creating abstracted organic works of furniture and lighting. Inspired by elemental materials in transitory states and informed by almost otherworldly natural phenomena, John Pomp’s work combines molten glass, warped metal, and refracted light to create imaginative, organic forms. Led by designer, artist, and glassblower John Pomp with his partner Anne, a team of over 50 creatives design and make each piece from concept to completion in-house. With a sculptural, experimental approach to design, the work develops through a non-linear process explored through various methods, including abstract glass studies, organic form generating, and process discovery. This approach leads to a designed process rather than a product. Each piece is made from scratch in their 65,000 sqft Philadelphia studio using a combination of modern techniques and old-world craftsmanship. Working out of his studio in Philadelphia, John together with his wife, Anne, and their team of over 40 creatives, design and create each and every piece from concept to completion in-house, providing a proprietary look and feel that can only be achieved by owning the processes that combine to make the studio’s sculptural work. Using these processes as a source of inspiration, rather than a means to an end, the studio explores the relationship between fluid materials. By owning all their manufacturing processes in their Philadelphia studio, they are able to create and customize any piece for their clients.

JOHN POMP A.I CyberSecurity Scoring

JOHN POMP

Company Details

Linkedin ID:

john-pomp-studios

Employees number:

28

Number of followers:

516

NAICS:

337

Industry Type:

Furniture and Home Furnishings Manufacturing

Homepage:

johnpomp.com

IP Addresses:

0

Company ID:

JOH_2745853

Scan Status:

In-progress

AI scoreJOHN POMP Risk Score (AI oriented)

Between 750 and 799

https://images.rankiteo.com/companyimages/john-pomp-studios.jpeg
JOHN POMP Furniture and Home Furnishings Manufacturing
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreJOHN POMP Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/john-pomp-studios.jpeg
JOHN POMP Furniture and Home Furnishings Manufacturing
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

JOHN POMP Company CyberSecurity News & History

Past Incidents
0
Attack Types
0
No data available
Ailogo

JOHN POMP Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for JOHN POMP

Incidents vs Furniture and Home Furnishings Manufacturing Industry Average (This Year)

No incidents recorded for JOHN POMP in 2025.

Incidents vs All-Companies Average (This Year)

No incidents recorded for JOHN POMP in 2025.

Incident Types JOHN POMP vs Furniture and Home Furnishings Manufacturing Industry Avg (This Year)

No incidents recorded for JOHN POMP in 2025.

Incident History — JOHN POMP (X = Date, Y = Severity)

JOHN POMP cyber incidents detection timeline including parent company and subsidiaries

JOHN POMP Company Subsidiaries

SubsidiaryImage

John Pomp is a design-driven artisan manufacturer focused on creating abstracted organic works of furniture and lighting. Inspired by elemental materials in transitory states and informed by almost otherworldly natural phenomena, John Pomp’s work combines molten glass, warped metal, and refracted light to create imaginative, organic forms. Led by designer, artist, and glassblower John Pomp with his partner Anne, a team of over 50 creatives design and make each piece from concept to completion in-house. With a sculptural, experimental approach to design, the work develops through a non-linear process explored through various methods, including abstract glass studies, organic form generating, and process discovery. This approach leads to a designed process rather than a product. Each piece is made from scratch in their 65,000 sqft Philadelphia studio using a combination of modern techniques and old-world craftsmanship. Working out of his studio in Philadelphia, John together with his wife, Anne, and their team of over 40 creatives, design and create each and every piece from concept to completion in-house, providing a proprietary look and feel that can only be achieved by owning the processes that combine to make the studio’s sculptural work. Using these processes as a source of inspiration, rather than a means to an end, the studio explores the relationship between fluid materials. By owning all their manufacturing processes in their Philadelphia studio, they are able to create and customize any piece for their clients.

Loading...
similarCompanies

JOHN POMP Similar Companies

Boyd Sleep

Quality Sleep For A Better Life We embrace our mission statement at every stage of product design and development in order to exceed our customer's expectations. As we celebrate 40 years in business our attention to detail has never wavered. Our goal is to improve the quality of your sleep and that

Office Star Products

Office Star Products is a leading supplier of high quality, best-value furniture. With an extensive selection and in-stock availability, we simplify the furniture buying process, so you can effectively and efficiently save your customers time and money. Our corporate headquarters and main warehous

Stephens Office Systems

Stephens Office Systems has been redefining modern offices since 1977. With over 200 years of team experience, SOS has grown to partner with over 250 manufacturers to pair every client with their ideal office design and furniture solution. Our headquarters in Charlotte houses a 50,000 sq. ft. showro

studio b home

studio b offers luxury designer furniture  for the home in Toronto and around the globe. Founded in 1999 by David Beaton, studio b believes in choosing furniture well, rather than often. studio b represents numerous designer brands including Holly Hunt, Walter Knoll, Baker, Hastens, DEDON and Pau

JORI works with international designers to create beautifully ergonomic, personalised sofas and reclining chairs, manufacturing them with the greatest care in its Belgian workshops. This traditional craftsmanship and the use of materials of the very highest quality guarantee the sublime finish and l

Suter's Handcrafted Furniture

Suter's is guided by our mission to: build furniture that celebrates the natural beauty of wood; continue the lost art of fine woodworking by building furniture that is crafted to withstand the test of time. As builders of fine furniture we continue the teachings of woodworking passed through fro

newsone

JOHN POMP CyberSecurity News

November 28, 2025 09:54 AM
GSMA Study Highlights Rising Cybersecurity Costs for Mobile Operators and Calls for Smarter Regulation

The report warns that poorly designed, misaligned, or overly prescriptive regulation can create unnecessary costs, divert resources from...

November 28, 2025 09:45 AM
Cybersecurity foundations: A strategic addition to university curricula

Cyberthreats aren't slowing down, and in this environment, by implementing cybersecurity programs, universities help their students resist...

November 28, 2025 09:32 AM
Emerging Threats in APAC OT Environments: Lessons from Recent Attacks - Prateek Singh, Lead OT Cybersecurity APAC, Eaton Corp.

This session examines the rapid escalation of OT focused cyberattacks across the Asia Pacific region, drawing on real incidents from manufacturing,...

November 28, 2025 09:23 AM
When Cybersecurity Data Breaches Become Human Crises

Why Cybersecurity Is Now a Survival Issue for NGOs and Civil Society in 2025. At 2:13 a.m., a humanitarian coordination platform went dark.

November 28, 2025 09:16 AM
Global Chemical Industry Cybersecurity Market is projected to reach the value of $28.4 Billion by 2030.

Press release - Virtue Market Research - Global Chemical Industry Cybersecurity Market is projected to reach the value of $28.4 Billion by...

November 28, 2025 09:12 AM
Beijing signals tougher AI, cybersecurity enforcement as amended law nears

Beijing will tighten oversight of artificial intelligence and other fast-moving technologies under its newly amended Cybersecurity Law,...

November 28, 2025 09:09 AM
2N earns official recognition for cybersecurity transparency

2N has been officially recognised by the Common Vulnerabilities and Exposures (CVE) Program as a CVE Numbering Authority (CNA).

November 28, 2025 09:04 AM
AUTOCRYPT Announces Plans to Expand Electric Vehicle Cybersecurity Technologies to MENA Region in 2026

SEOUL, South Korea, Nov. 28, 2025 /PRNewswire/ -- AUTOCRYPT, an end-to-end automotive cybersecurity solution provider, announced that in...

November 28, 2025 09:02 AM
The UK Cybersecurity Bill that could cost organisations millions

The UK Cybersecurity and Resilience Bill signals a major shift in national cyber regulation, strengthening standards to address evolving...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

JOHN POMP CyberSecurity History Information

Official Website of JOHN POMP

The official website of JOHN POMP is http://www.johnpomp.com.

JOHN POMP’s AI-Generated Cybersecurity Score

According to Rankiteo, JOHN POMP’s AI-generated cybersecurity score is 754, reflecting their Fair security posture.

How many security badges does JOHN POMP’ have ?

According to Rankiteo, JOHN POMP currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does JOHN POMP have SOC 2 Type 1 certification ?

According to Rankiteo, JOHN POMP is not certified under SOC 2 Type 1.

Does JOHN POMP have SOC 2 Type 2 certification ?

According to Rankiteo, JOHN POMP does not hold a SOC 2 Type 2 certification.

Does JOHN POMP comply with GDPR ?

According to Rankiteo, JOHN POMP is not listed as GDPR compliant.

Does JOHN POMP have PCI DSS certification ?

According to Rankiteo, JOHN POMP does not currently maintain PCI DSS compliance.

Does JOHN POMP comply with HIPAA ?

According to Rankiteo, JOHN POMP is not compliant with HIPAA regulations.

Does JOHN POMP have ISO 27001 certification ?

According to Rankiteo,JOHN POMP is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of JOHN POMP

JOHN POMP operates primarily in the Furniture and Home Furnishings Manufacturing industry.

Number of Employees at JOHN POMP

JOHN POMP employs approximately 28 people worldwide.

Subsidiaries Owned by JOHN POMP

JOHN POMP presently has no subsidiaries across any sectors.

JOHN POMP’s LinkedIn Followers

JOHN POMP’s official LinkedIn profile has approximately 516 followers.

JOHN POMP’s Presence on Crunchbase

No, JOHN POMP does not have a profile on Crunchbase.

JOHN POMP’s Presence on LinkedIn

Yes, JOHN POMP maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/john-pomp-studios.

Cybersecurity Incidents Involving JOHN POMP

As of November 28, 2025, Rankiteo reports that JOHN POMP has not experienced any cybersecurity incidents.

Number of Peer and Competitor Companies

JOHN POMP has an estimated 2,616 peer or competitor companies worldwide.

JOHN POMP CyberSecurity History Information

How many cyber incidents has JOHN POMP faced ?

Total Incidents: According to Rankiteo, JOHN POMP has faced 0 incidents in the past.

What types of cybersecurity incidents have occurred at JOHN POMP ?

Incident Types: The types of cybersecurity incidents that have occurred include .

Incident Details

What are the most common types of attacks the company has faced ?

Additional Questions

cve

Latest Global CVEs (Not Company-Specific)

Description

ThingsBoard in versions prior to v4.2.1 allows an authenticated user to upload malicious SVG images via the "Image Gallery", leading to a Stored Cross-Site Scripting (XSS) vulnerability. The exploit can be triggered when any user accesses the public API endpoint of the malicious SVG images, or if the malicious images are embedded in an `iframe` element, during a widget creation, deployed to any page of the platform (e.g., dashboards), and accessed during normal operations. The vulnerability resides in the `ImageController`, which fails to restrict the execution of JavaScript code when an image is loaded by the user's browser. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions.

Risk Information
cvss4
Base: 6.2
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:H/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).

Risk Information
cvss3
Base: 9.9
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Description

Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to sanitize team email addresses to be visible only to Team Admins, which allows any authenticated user to view team email addresses via the GET /api/v4/channels/{channel_id}/common_teams endpoint

Risk Information
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Description

Exposure of email service credentials to users without administrative rights in Devolutions Server.This issue affects Devolutions Server: before 2025.2.21, before 2025.3.9.

Description

Exposure of credentials in unintended requests in Devolutions Server.This issue affects Server: through 2025.2.20, through 2025.3.8.

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=john-pomp-studios' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge