Comparison Overview

MJH Life Sciences®

VS

Bertelsmann SE & Co. KGaA

MJH Life Sciences®

2 Clarke Dr, Cranbury, New Jersey, 08512, US
Last Update: 2025-11-22

For 25 years, MJH Life Sciences® has established a reputation for embracing agility and offering relevant, practical information that meets the needs of our diverse audience. As the largest privately held medical media company in the United States, we provide integrated communication products, services, education, and research to professionals within health care, animal health, and industry sciences.

NAICS: 51211
NAICS Definition: Motion Picture and Video Production
Employees: 3,594
Subsidiaries: 53
12-month incidents
0
Known data breaches
1
Attack type number
2

Bertelsmann SE & Co. KGaA

Carl-Bertelsmann-Straße 270, Gütersloh, undefined, 33311, DE
Last Update: 2025-11-26

Bertelsmann is a media, services and education company with more than 80,000 employees that operates in about 50 countries around the world. It includes the entertainment group RTL Group, the trade book publisher Penguin Random House, the music company BMG, the service provider Arvato Group, Bertelsmann Marketing Services, the Bertelsmann Education Group and Bertelsmann Investments, an international network of funds. The company generated revenues of €20.2 billion in the 2023 financial year. Bertelsmann stands for creativity and entrepreneurship. This combination promotes first-class media content and innovative service solutions that inspire customers around the world. Bertelsmann aspires to achieve climate neutrality by 2030. www.bertelsmann.com

NAICS: 51211
NAICS Definition: Motion Picture and Video Production
Employees: 19,193
Subsidiaries: 39
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/mjh-life-sciences.jpeg
MJH Life Sciences®
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/bertelsmann.jpeg
Bertelsmann SE & Co. KGaA
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
MJH Life Sciences®
100%
Compliance Rate
0/4 Standards Verified
Bertelsmann SE & Co. KGaA
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Media Production Industry Average (This Year)

No incidents recorded for MJH Life Sciences® in 2025.

Incidents vs Media Production Industry Average (This Year)

No incidents recorded for Bertelsmann SE & Co. KGaA in 2025.

Incident History — MJH Life Sciences® (X = Date, Y = Severity)

MJH Life Sciences® cyber incidents detection timeline including parent company and subsidiaries

Incident History — Bertelsmann SE & Co. KGaA (X = Date, Y = Severity)

Bertelsmann SE & Co. KGaA cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/mjh-life-sciences.jpeg
MJH Life Sciences®
Incidents

Date Detected: 08/2022
Type:Cyber Attack
Blog: Blog

Date Detected: 5/2018
Type:Breach
Attack Vector: Unauthorized Access
Blog: Blog
https://images.rankiteo.com/companyimages/bertelsmann.jpeg
Bertelsmann SE & Co. KGaA
Incidents

No Incident

FAQ

Bertelsmann SE & Co. KGaA company demonstrates a stronger AI Cybersecurity Score compared to MJH Life Sciences® company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

MJH Life Sciences® company has historically faced a number of disclosed cyber incidents, whereas Bertelsmann SE & Co. KGaA company has not reported any.

In the current year, Bertelsmann SE & Co. KGaA company and MJH Life Sciences® company have not reported any cyber incidents.

Neither Bertelsmann SE & Co. KGaA company nor MJH Life Sciences® company has reported experiencing a ransomware attack publicly.

MJH Life Sciences® company has disclosed at least one data breach, while the other Bertelsmann SE & Co. KGaA company has not reported such incidents publicly.

MJH Life Sciences® company has reported targeted cyberattacks, while Bertelsmann SE & Co. KGaA company has not reported such incidents publicly.

Neither MJH Life Sciences® company nor Bertelsmann SE & Co. KGaA company has reported experiencing or disclosing vulnerabilities publicly.

Neither MJH Life Sciences® nor Bertelsmann SE & Co. KGaA holds any compliance certifications.

Neither company holds any compliance certifications.

MJH Life Sciences® company has more subsidiaries worldwide compared to Bertelsmann SE & Co. KGaA company.

Bertelsmann SE & Co. KGaA company employs more people globally than MJH Life Sciences® company, reflecting its scale as a Media Production.

Neither MJH Life Sciences® nor Bertelsmann SE & Co. KGaA holds SOC 2 Type 1 certification.

Neither MJH Life Sciences® nor Bertelsmann SE & Co. KGaA holds SOC 2 Type 2 certification.

Neither MJH Life Sciences® nor Bertelsmann SE & Co. KGaA holds ISO 27001 certification.

Neither MJH Life Sciences® nor Bertelsmann SE & Co. KGaA holds PCI DSS certification.

Neither MJH Life Sciences® nor Bertelsmann SE & Co. KGaA holds HIPAA certification.

Neither MJH Life Sciences® nor Bertelsmann SE & Co. KGaA holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

ThingsBoard in versions prior to v4.2.1 allows an authenticated user to upload malicious SVG images via the "Image Gallery", leading to a Stored Cross-Site Scripting (XSS) vulnerability. The exploit can be triggered when any user accesses the public API endpoint of the malicious SVG images, or if the malicious images are embedded in an `iframe` element, during a widget creation, deployed to any page of the platform (e.g., dashboards), and accessed during normal operations. The vulnerability resides in the `ImageController`, which fails to restrict the execution of JavaScript code when an image is loaded by the user's browser. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions.

Risk Information
cvss4
Base: 6.2
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:H/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).

Risk Information
cvss3
Base: 9.9
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Description

Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to sanitize team email addresses to be visible only to Team Admins, which allows any authenticated user to view team email addresses via the GET /api/v4/channels/{channel_id}/common_teams endpoint

Risk Information
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Description

Exposure of email service credentials to users without administrative rights in Devolutions Server.This issue affects Devolutions Server: before 2025.2.21, before 2025.3.9.

Description

Exposure of credentials in unintended requests in Devolutions Server.This issue affects Server: through 2025.2.20, through 2025.3.8.