Company Details
marion-palace-theatre
7
189
711
marionpalace.org
0
MAR_3138514
In-progress

Marion Palace Theatre Company CyberSecurity Posture
marionpalace.orgThe Marion Palace Theatre is a 1928 restored historic theatre seating 1424 in the Eberson-designed atmospheric auditorium. The decor of the original theatre is Moorish revival, complete with a ceiling painted to look like night sky, twinkling lights to replicate stars and a renovated cloud projector. The May Pavilion, a banquet facility and flexible performing space built on to the west side of The Palace, opened in 2008. Both spaces serve to present local, regional, national and international artists in theatre, dance, comedy, variety and all genres of music.
Company Details
marion-palace-theatre
7
189
711
marionpalace.org
0
MAR_3138514
In-progress
Between 750 and 799

MPT Global Score (TPRM)XXXX



No incidents recorded for Marion Palace Theatre in 2025.
No incidents recorded for Marion Palace Theatre in 2025.
No incidents recorded for Marion Palace Theatre in 2025.
MPT cyber incidents detection timeline including parent company and subsidiaries

The Marion Palace Theatre is a 1928 restored historic theatre seating 1424 in the Eberson-designed atmospheric auditorium. The decor of the original theatre is Moorish revival, complete with a ceiling painted to look like night sky, twinkling lights to replicate stars and a renovated cloud projector. The May Pavilion, a banquet facility and flexible performing space built on to the west side of The Palace, opened in 2008. Both spaces serve to present local, regional, national and international artists in theatre, dance, comedy, variety and all genres of music.

Dallas Children’s Theater (DCT) enlightens and entertains with the magic of live theater and classes. Chosen for ages 3 - 93, DCT’s productions include musicals, adaptations of beloved books and meaningful events for today’s teens. Enjoy Red Carpet treatment at opening night parties, after-show auto

The Punta Gorda Symphony began in 1978 as a small chamber group under the direction of Fred Blake. The group consisted of six retirees and two local high school students. From this humble beginning the group expanded in size, competence and repertoire. On May 27, 1987, it became incorporated under t

New York Classical Theatre creates and reinvigorates audiences for the theatre by presenting free productions of popular & forgotten classical plays in public spaces throughout New York City. We are also committed to developing and producing new plays by living playwrights that enrich and expand our

Established as Sawnee School of Ballet in 1990 under the direction of Joan Kall Stewart, Sawnee School of the Arts is recognized in the Forsyth County community for its standard of excellence. SSA, now under the ownership of Courtney Bromwich, is dedicated to providing the highest quality training

City Theatre is Pittsburgh home for new plays. Described by the New York Times as "Pittsburgh's most innovative theater." City Theatre is Pittsburgh second largest theatre company, and is the only theatre to focus it's work on new work, producing on average nine shows a year. The theatre consists o

Founded in 1940, the Utah Symphony has become an eminent presence in the American music scene through its distinctive performances worldwide and its well-known recording legacy. The orchestra became recognized as a leading ensemble largely through the efforts of Maurice Abravanel, its Music Director
.png)
Celebrate 30 years of Casper with $5 screenings at Marion Palace Theatre Oct. 24–26. Tickets are just $5.
Marion Palace Theatre will screen "Downton Abbey: The Grand Finale" on Sept. 27–28. Tickets are just $5 at the door.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Marion Palace Theatre is http://www.marionpalace.org.
According to Rankiteo, Marion Palace Theatre’s AI-generated cybersecurity score is 758, reflecting their Fair security posture.
According to Rankiteo, Marion Palace Theatre currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Marion Palace Theatre is not certified under SOC 2 Type 1.
According to Rankiteo, Marion Palace Theatre does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Marion Palace Theatre is not listed as GDPR compliant.
According to Rankiteo, Marion Palace Theatre does not currently maintain PCI DSS compliance.
According to Rankiteo, Marion Palace Theatre is not compliant with HIPAA regulations.
According to Rankiteo,Marion Palace Theatre is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Marion Palace Theatre operates primarily in the Performing Arts industry.
Marion Palace Theatre employs approximately 7 people worldwide.
Marion Palace Theatre presently has no subsidiaries across any sectors.
Marion Palace Theatre’s official LinkedIn profile has approximately 189 followers.
No, Marion Palace Theatre does not have a profile on Crunchbase.
Yes, Marion Palace Theatre maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/marion-palace-theatre.
As of December 14, 2025, Rankiteo reports that Marion Palace Theatre has not experienced any cybersecurity incidents.
Marion Palace Theatre has an estimated 2,700 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, Marion Palace Theatre has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
A weakness has been identified in itsourcecode Online Pet Shop Management System 1.0. This vulnerability affects unknown code of the file /pet1/addcnp.php. This manipulation of the argument cnpname causes sql injection. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited.
A security flaw has been discovered in Tenda AX9 22.03.01.46. This affects the function image_check of the component httpd. The manipulation results in use of weak hash. It is possible to launch the attack remotely. A high complexity level is associated with this attack. It is indicated that the exploitability is difficult. The exploit has been released to the public and may be exploited.
A weakness has been identified in code-projects Student File Management System 1.0. This issue affects some unknown processing of the file /admin/update_student.php. This manipulation of the argument stud_id causes sql injection. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be exploited.
A security flaw has been discovered in code-projects Student File Management System 1.0. This vulnerability affects unknown code of the file /admin/save_user.php. The manipulation of the argument firstname results in sql injection. The attack can be executed remotely. The exploit has been released to the public and may be exploited.
A vulnerability was identified in code-projects Student File Management System 1.0. This affects an unknown part of the file /admin/update_user.php. The manipulation of the argument user_id leads to sql injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.