Comparison Overview

Malashock Dance

VS

Purdue Convocations

Malashock Dance

2650 Truxtun Road, Suite 202, San Diego, CA, 92106, US
Last Update: 2025-12-09

Our Mission The mission of Malashock Dance is to illuminate the power of dance as an invaluable part of the human experience. It is a gathering place for artists to create new work, connect with audiences, and offer unique educational opportunities. We believe dance belongs to everyone. Our Values Sourcing our decisions in our values aligns our behaviors with those values and enables us to show up in ways that are genuine, authentic and inspiring.We light up with passion and excellence. At every level of the organization, we demonstrate an insatiable desire to explore dance from every angle, then share it with others. People thrive when they feel they belong. First and foremost, its about creating spaces where people feel welcome and wanted. It means designing inclusivity – regardless of race, ability, background – into everything we create, which in turn creates space for growth, empowerment, and bravery to expand and grow. Our artists, teachers, students, and patrons are part of a community where they matter. Dance expands human connections. Malashock Dance brings individuals together to innovate, create, learn, and share their experiences. Our Purpose Create a gathering place for artists to expand what dance can do. Produce events that connect creators, performers, and audiences Nurture dance as a tool for life-long learning. Our History Since 1988 Malashock Dance has been an active contributor to the vibrancy of San Diego’s cultural life and provides professional concert dance performances, dance training for all ages, and educational outreach programming for thousands of individuals each year. Its incredible team of teachers, staff, and dancers have local, regional, and national impact and provide life-changing programs for individuals from all walks of life. Performance The Company’s impressive track record includes the performance of 100 original dance works, and is in its 35th consecutive Season of producing original modern dance performances.

NAICS: 711
NAICS Definition:
Employees: 16
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Purdue Convocations

712 3rd St, West Lafayette, 47907, US
Last Update: 2025-12-11
Between 750 and 799

Initiated in 1902, Purdue Convocations is among the oldest collegiate performing arts presenters in the United States. With an artistic eye and entrepreneurial flair, Convocations brings a diverse array of world-class performances and intellectual encounters—including collaborations with an ever-widening circle of partners—fulfilling our mission by connecting them to our academic, local, and regional audiences through engaging educational opportunities. MISSION Purdue Convocations catalyzes the curriculum, energizes the community, and distinguishes Purdue through powerful performances, illuminating discourse, and extraordinary learning encounters. VISION Purdue Convocations is to be a leader and a partner in making the performing arts essential to everyone’s life. HISTORY Purdue University has a rich history of bringing concerts, lectures and performances to campus. In 1902 the “Lecture and Concert Course” was first offered, creating the earliest evidence of what is now Purdue Convocations. Over the years and decades the names and formats have changed, but one thing has remained constant: the desire to expand the Purdue experience beyond the classroom.

NAICS: 7111
NAICS Definition: Performing Arts Companies
Employees: 15
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/malashock-dance.jpeg
Malashock Dance
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/purdue-convocations.jpeg
Purdue Convocations
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Malashock Dance
100%
Compliance Rate
0/4 Standards Verified
Purdue Convocations
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Performing Arts Industry Average (This Year)

No incidents recorded for Malashock Dance in 2025.

Incidents vs Performing Arts Industry Average (This Year)

No incidents recorded for Purdue Convocations in 2025.

Incident History — Malashock Dance (X = Date, Y = Severity)

Malashock Dance cyber incidents detection timeline including parent company and subsidiaries

Incident History — Purdue Convocations (X = Date, Y = Severity)

Purdue Convocations cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/malashock-dance.jpeg
Malashock Dance
Incidents

No Incident

https://images.rankiteo.com/companyimages/purdue-convocations.jpeg
Purdue Convocations
Incidents

No Incident

FAQ

Malashock Dance company demonstrates a stronger AI Cybersecurity Score compared to Purdue Convocations company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Historically, Purdue Convocations company has disclosed a higher number of cyber incidents compared to Malashock Dance company.

In the current year, Purdue Convocations company and Malashock Dance company have not reported any cyber incidents.

Neither Purdue Convocations company nor Malashock Dance company has reported experiencing a ransomware attack publicly.

Neither Purdue Convocations company nor Malashock Dance company has reported experiencing a data breach publicly.

Neither Purdue Convocations company nor Malashock Dance company has reported experiencing targeted cyberattacks publicly.

Neither Malashock Dance company nor Purdue Convocations company has reported experiencing or disclosing vulnerabilities publicly.

Neither Malashock Dance nor Purdue Convocations holds any compliance certifications.

Neither company holds any compliance certifications.

Neither Malashock Dance company nor Purdue Convocations company has publicly disclosed detailed information about the number of their subsidiaries.

Malashock Dance company employs more people globally than Purdue Convocations company, reflecting its scale as a Performing Arts.

Neither Malashock Dance nor Purdue Convocations holds SOC 2 Type 1 certification.

Neither Malashock Dance nor Purdue Convocations holds SOC 2 Type 2 certification.

Neither Malashock Dance nor Purdue Convocations holds ISO 27001 certification.

Neither Malashock Dance nor Purdue Convocations holds PCI DSS certification.

Neither Malashock Dance nor Purdue Convocations holds HIPAA certification.

Neither Malashock Dance nor Purdue Convocations holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

A weakness has been identified in itsourcecode Online Pet Shop Management System 1.0. This vulnerability affects unknown code of the file /pet1/addcnp.php. This manipulation of the argument cnpname causes sql injection. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in Tenda AX9 22.03.01.46. This affects the function image_check of the component httpd. The manipulation results in use of weak hash. It is possible to launch the attack remotely. A high complexity level is associated with this attack. It is indicated that the exploitability is difficult. The exploit has been released to the public and may be exploited.

Risk Information
cvss2
Base: 2.6
Severity: HIGH
AV:N/AC:H/Au:N/C:N/I:P/A:N
cvss3
Base: 3.7
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
cvss4
Base: 6.3
Severity: HIGH
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A weakness has been identified in code-projects Student File Management System 1.0. This issue affects some unknown processing of the file /admin/update_student.php. This manipulation of the argument stud_id causes sql injection. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in code-projects Student File Management System 1.0. This vulnerability affects unknown code of the file /admin/save_user.php. The manipulation of the argument firstname results in sql injection. The attack can be executed remotely. The exploit has been released to the public and may be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was identified in code-projects Student File Management System 1.0. This affects an unknown part of the file /admin/update_user.php. The manipulation of the argument user_id leads to sql injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X