Comparison Overview

Missoula Art Museum

VS

Smart Museum of Art, The University of Chicago

Missoula Art Museum

335 N Pattee St, Missoula, Montana, 59802, US
Last Update: 2026-01-22

Mission: MAM serves the public by engaging audiences and artists in the exploration of contemporary art relevant to the community, state and region. Founded in 1975 and accredited by the American Association of Museums since 1987, MAM has always been a flagship institution in culturally savvy Missoula, Montana. After a $5.3 million capital campaign and grand opening in September 2006, MAM offers a spectacular attraction in the heart of the historic downtown: a fully accessible, free, public museum that boasts six exhibition spaces, a library, education center, and an inviting information lounge. The successful building design has seamlessly fused the 100-year-old Carnegie Library building with a contemporary addition, creating the ideal environment for exhibiting, celebrating, and preserving MAM's growing contemporary art collection. MAM's exhibition program is a broad landscape that serves and represents diverse audiences and creative interests. Each year, 20 to 25 solo and group exhibitions rotate through six state-of-the-art galleries. MAM organizes and rents exhibits, develops programs through community partnerships, and welcomes the opportunity to review exhibition proposals. Admission is free every day, thanks to the generosity of MAM members and donors.

NAICS: 712
NAICS Definition:
Employees: 22
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Smart Museum of Art, The University of Chicago

Last Update: 2026-01-23

The Smart Museum of Art at the University of Chicago is a site for rigorous inquiry and exchange that encourages the examination of complex issues through the lens of art objects and artistic practice. Through strong community and scholarly partnerships, the Museum incorporates diverse ideas, identities, and experiences into its exhibitions and collections, academic initiatives, and public programming. The Smart first opened in 1974.

NAICS: 712
NAICS Definition: Museums, Historical Sites, and Similar Institutions
Employees: 54
Subsidiaries: 16
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/missoula-art-museum.jpeg
Missoula Art Museum
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/smart-museum-of-art.jpeg
Smart Museum of Art, The University of Chicago
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Missoula Art Museum
100%
Compliance Rate
0/4 Standards Verified
Smart Museum of Art, The University of Chicago
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Museums, Historical Sites, and Zoos Industry Average (This Year)

No incidents recorded for Missoula Art Museum in 2026.

Incidents vs Museums, Historical Sites, and Zoos Industry Average (This Year)

No incidents recorded for Smart Museum of Art, The University of Chicago in 2026.

Incident History — Missoula Art Museum (X = Date, Y = Severity)

Missoula Art Museum cyber incidents detection timeline including parent company and subsidiaries

Incident History — Smart Museum of Art, The University of Chicago (X = Date, Y = Severity)

Smart Museum of Art, The University of Chicago cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/missoula-art-museum.jpeg
Missoula Art Museum
Incidents

No Incident

https://images.rankiteo.com/companyimages/smart-museum-of-art.jpeg
Smart Museum of Art, The University of Chicago
Incidents

No Incident

FAQ

Missoula Art Museum company demonstrates a stronger AI Cybersecurity Score compared to Smart Museum of Art, The University of Chicago company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Historically, Smart Museum of Art, The University of Chicago company has disclosed a higher number of cyber incidents compared to Missoula Art Museum company.

In the current year, Smart Museum of Art, The University of Chicago company and Missoula Art Museum company have not reported any cyber incidents.

Neither Smart Museum of Art, The University of Chicago company nor Missoula Art Museum company has reported experiencing a ransomware attack publicly.

Neither Smart Museum of Art, The University of Chicago company nor Missoula Art Museum company has reported experiencing a data breach publicly.

Neither Smart Museum of Art, The University of Chicago company nor Missoula Art Museum company has reported experiencing targeted cyberattacks publicly.

Neither Missoula Art Museum company nor Smart Museum of Art, The University of Chicago company has reported experiencing or disclosing vulnerabilities publicly.

Neither Missoula Art Museum nor Smart Museum of Art, The University of Chicago holds any compliance certifications.

Neither company holds any compliance certifications.

Smart Museum of Art, The University of Chicago company has more subsidiaries worldwide compared to Missoula Art Museum company.

Smart Museum of Art, The University of Chicago company employs more people globally than Missoula Art Museum company, reflecting its scale as a Museums, Historical Sites, and Zoos.

Neither Missoula Art Museum nor Smart Museum of Art, The University of Chicago holds SOC 2 Type 1 certification.

Neither Missoula Art Museum nor Smart Museum of Art, The University of Chicago holds SOC 2 Type 2 certification.

Neither Missoula Art Museum nor Smart Museum of Art, The University of Chicago holds ISO 27001 certification.

Neither Missoula Art Museum nor Smart Museum of Art, The University of Chicago holds PCI DSS certification.

Neither Missoula Art Museum nor Smart Museum of Art, The University of Chicago holds HIPAA certification.

Neither Missoula Art Museum nor Smart Museum of Art, The University of Chicago holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

Improper validation of specified type of input in M365 Copilot allows an unauthorized attacker to disclose information over a network.

Risk Information
cvss3
Base: 9.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
Description

Improper access control in Azure Front Door (AFD) allows an unauthorized attacker to elevate privileges over a network.

Risk Information
cvss3
Base: 9.8
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Description

Azure Entra ID Elevation of Privilege Vulnerability

Risk Information
cvss3
Base: 9.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N
Description

Moonraker is a Python web server providing API access to Klipper 3D printing firmware. In versions 0.9.3 and below, instances configured with the "ldap" component enabled are vulnerable to LDAP search filter injection techniques via the login endpoint. The 401 error response message can be used to determine whether or not a search was successful, allowing for brute force methods to discover LDAP entries on the server such as user IDs and user attributes. This issue has been fixed in version 0.10.0.

Risk Information
cvss4
Base: 2.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Runtipi is a Docker-based, personal homeserver orchestrator that facilitates multiple services on a single server. Versions 3.7.0 and above allow an authenticated user to execute arbitrary system commands on the host server by injecting shell metacharacters into backup filenames. The BackupManager fails to sanitize the filenames of uploaded backups. The system persists user-uploaded files directly to the host filesystem using the raw originalname provided in the request. This allows an attacker to stage a file containing shell metacharacters (e.g., $(id).tar.gz) at a predictable path, which is later referenced during the restore process. The successful storage of the file is what allows the subsequent restore command to reference and execute it. This issue has been fixed in version 4.7.0.

Risk Information
cvss3
Base: 8.0
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H