Comparison Overview

MC Theater

VS

Harlem School of the Arts (HSA)

MC Theater

Polonceaukade 5, Amsterdam, 1014 DA, NL
Last Update: 2025-12-17
Between 800 and 849

MC Theater is thé venue for urban arts. A house for theater, live music, dance and club nights. In MC Theater you will hear and see what's hot, and what will be big soon. MC Theater is built in the Zuiveringshal Oost (purification building) of the old but fully renewed Westergasfabriek - where the gas used to be blown through large boilers. A beautiful merge of an industrial building with modern architecture where now tradition and experiment experiences meet to create vibrant new art forms.

NAICS: 7111
NAICS Definition: Performing Arts Companies
Employees: 8
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Harlem School of the Arts (HSA)

645 Saint Nicholas Ave, New York, NY, US, 10030
Last Update: 2025-12-11
Between 750 and 799

Harlem School of the Arts stands apart among the premier arts institutions in New York City as the sole provider of quality arts education in four different disciplines: Music, Dance, Theatre, Musical Theatre and Visual Arts. HSA enriches the lives of young people and their families in Harlem and the Greater New York City area by providing: unrivaled on-site arts instruction; vital outreach partnerships with New York City schools; quality performances and exhibitions that attract diverse audiences to its dynamic cultural arts facility; and prominent guest artists who actively engage the school’s community in the creative process through workshops and master classes. Through these enriching activities, HSA creates opportunities for both children and adults to fully experience the benefits that the arts can bring to their lives.

NAICS: 7111
NAICS Definition: Performing Arts Companies
Employees: 96
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/mc.jpeg
MC Theater
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/hsanyc.jpeg
Harlem School of the Arts (HSA)
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
MC Theater
100%
Compliance Rate
0/4 Standards Verified
Harlem School of the Arts (HSA)
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Performing Arts Industry Average (This Year)

No incidents recorded for MC Theater in 2025.

Incidents vs Performing Arts Industry Average (This Year)

No incidents recorded for Harlem School of the Arts (HSA) in 2025.

Incident History — MC Theater (X = Date, Y = Severity)

MC Theater cyber incidents detection timeline including parent company and subsidiaries

Incident History — Harlem School of the Arts (HSA) (X = Date, Y = Severity)

Harlem School of the Arts (HSA) cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/mc.jpeg
MC Theater
Incidents

No Incident

https://images.rankiteo.com/companyimages/hsanyc.jpeg
Harlem School of the Arts (HSA)
Incidents

No Incident

FAQ

MC Theater company demonstrates a stronger AI Cybersecurity Score compared to Harlem School of the Arts (HSA) company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Historically, Harlem School of the Arts (HSA) company has disclosed a higher number of cyber incidents compared to MC Theater company.

In the current year, Harlem School of the Arts (HSA) company and MC Theater company have not reported any cyber incidents.

Neither Harlem School of the Arts (HSA) company nor MC Theater company has reported experiencing a ransomware attack publicly.

Neither Harlem School of the Arts (HSA) company nor MC Theater company has reported experiencing a data breach publicly.

Neither Harlem School of the Arts (HSA) company nor MC Theater company has reported experiencing targeted cyberattacks publicly.

Neither MC Theater company nor Harlem School of the Arts (HSA) company has reported experiencing or disclosing vulnerabilities publicly.

Neither MC Theater nor Harlem School of the Arts (HSA) holds any compliance certifications.

Neither company holds any compliance certifications.

Neither MC Theater company nor Harlem School of the Arts (HSA) company has publicly disclosed detailed information about the number of their subsidiaries.

Harlem School of the Arts (HSA) company employs more people globally than MC Theater company, reflecting its scale as a Performing Arts.

Neither MC Theater nor Harlem School of the Arts (HSA) holds SOC 2 Type 1 certification.

Neither MC Theater nor Harlem School of the Arts (HSA) holds SOC 2 Type 2 certification.

Neither MC Theater nor Harlem School of the Arts (HSA) holds ISO 27001 certification.

Neither MC Theater nor Harlem School of the Arts (HSA) holds PCI DSS certification.

Neither MC Theater nor Harlem School of the Arts (HSA) holds HIPAA certification.

Neither MC Theater nor Harlem School of the Arts (HSA) holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

Nagios XI versions prior to 2026R1.1 are vulnerable to local privilege escalation due to an unsafe interaction between sudo permissions and application file permissions. A user‑accessible maintenance script may be executed as root via sudo and includes an application file that is writable by a lower‑privileged user. A local attacker with access to the application account can modify this file to introduce malicious code, which is then executed with elevated privileges when the script is run. Successful exploitation results in arbitrary code execution as the root user.

Risk Information
cvss4
Base: 8.6
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Out of bounds read and write in V8 in Google Chrome prior to 143.0.7499.147 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

Description

Use after free in WebGPU in Google Chrome prior to 143.0.7499.147 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

Description

SIPGO is a library for writing SIP services in the GO language. Starting in version 0.3.0 and prior to version 1.0.0-alpha-1, a nil pointer dereference vulnerability is in the SIPGO library's `NewResponseFromRequest` function that affects all normal SIP operations. The vulnerability allows remote attackers to crash any SIP application by sending a single malformed SIP request without a To header. The vulnerability occurs when SIP message parsing succeeds for a request missing the To header, but the response creation code assumes the To header exists without proper nil checks. This affects routine operations like call setup, authentication, and message handling - not just error cases. This vulnerability affects all SIP applications using the sipgo library, not just specific configurations or edge cases, as long as they make use of the `NewResponseFromRequest` function. Version 1.0.0-alpha-1 contains a patch for the issue.

Risk Information
cvss4
Base: 8.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

GLPI is a free asset and IT management software package. Starting in version 9.1.0 and prior to version 10.0.21, an unauthorized user with an API access can read all knowledge base entries. Users should upgrade to 10.0.21 to receive a patch.

Risk Information
cvss3
Base: 6.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N