Comparison Overview

MPA Media

VS

ArchitectureAu Products

MPA Media

3080 S. Harbor Blvd., Santa Ana, CA, 92704, US
Last Update: 2025-11-26
Between 750 and 799

MPA Media is the leading integrated publishing company serving alternative health and wellness professions. Recognized as an authoritative source of health and wellness content, we reach more than 160,000 readers with our print publications and approximately 1 million unique visitors online every month. Through our broad range of marketing services and media products we provide total market coverage to alternative health care providers, suppliers and consumers through our portfolio of brands. We extend the power of our print brands with Web sites, e-newsletters and electronic products, as well as research and market intelligence services. We provide our readers, who are well-educated, influential buyers and decision-makers in their professional fields and households, with the information they need to make important purchasing decisions. To our advertisers we provide the content-driven environments necessary to reach and engage their most sought after audiences. In both endeavors, we distinguish ourselves as the premier alternative health publishing company. --

NAICS: 511
NAICS Definition:
Employees: 23
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

ArchitectureAu Products

South Melbourne, Vic, AU, 3205
Last Update: 2025-11-21

ArchitectureAu Products presents the latest products and services, connecting specifiers with suppliers. It is an effective alert to new models, trends, colours and finishes. You’ll find the latest in architectural, building, interior and landscape products, whether for public, commercial, hospitality, health care, educational or residential applications. Explore ArchitectureAu Products online, via email and in print. Endorsed by the Australian Institute of Architects and the Design Institute of Australia. ***Follow Architecture Media for regular updates on all of our print publications, websites, events and awards programs.***

NAICS: 511
NAICS Definition: Publishing Industries (except Internet)
Employees: None
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/mpa-media.jpeg
MPA Media
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/architectureau-products.jpeg
ArchitectureAu Products
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
MPA Media
100%
Compliance Rate
0/4 Standards Verified
ArchitectureAu Products
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Book and Periodical Publishing Industry Average (This Year)

No incidents recorded for MPA Media in 2025.

Incidents vs Book and Periodical Publishing Industry Average (This Year)

No incidents recorded for ArchitectureAu Products in 2025.

Incident History — MPA Media (X = Date, Y = Severity)

MPA Media cyber incidents detection timeline including parent company and subsidiaries

Incident History — ArchitectureAu Products (X = Date, Y = Severity)

ArchitectureAu Products cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/mpa-media.jpeg
MPA Media
Incidents

No Incident

https://images.rankiteo.com/companyimages/architectureau-products.jpeg
ArchitectureAu Products
Incidents

No Incident

FAQ

MPA Media company demonstrates a stronger AI Cybersecurity Score compared to ArchitectureAu Products company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Historically, ArchitectureAu Products company has disclosed a higher number of cyber incidents compared to MPA Media company.

In the current year, ArchitectureAu Products company and MPA Media company have not reported any cyber incidents.

Neither ArchitectureAu Products company nor MPA Media company has reported experiencing a ransomware attack publicly.

Neither ArchitectureAu Products company nor MPA Media company has reported experiencing a data breach publicly.

Neither ArchitectureAu Products company nor MPA Media company has reported experiencing targeted cyberattacks publicly.

Neither MPA Media company nor ArchitectureAu Products company has reported experiencing or disclosing vulnerabilities publicly.

Neither MPA Media nor ArchitectureAu Products holds any compliance certifications.

Neither company holds any compliance certifications.

Neither MPA Media company nor ArchitectureAu Products company has publicly disclosed detailed information about the number of their subsidiaries.

Neither MPA Media nor ArchitectureAu Products holds SOC 2 Type 1 certification.

Neither MPA Media nor ArchitectureAu Products holds SOC 2 Type 2 certification.

Neither MPA Media nor ArchitectureAu Products holds ISO 27001 certification.

Neither MPA Media nor ArchitectureAu Products holds PCI DSS certification.

Neither MPA Media nor ArchitectureAu Products holds HIPAA certification.

Neither MPA Media nor ArchitectureAu Products holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

ThingsBoard in versions prior to v4.2.1 allows an authenticated user to upload malicious SVG images via the "Image Gallery", leading to a Stored Cross-Site Scripting (XSS) vulnerability. The exploit can be triggered when any user accesses the public API endpoint of the malicious SVG images, or if the malicious images are embedded in an `iframe` element, during a widget creation, deployed to any page of the platform (e.g., dashboards), and accessed during normal operations. The vulnerability resides in the `ImageController`, which fails to restrict the execution of JavaScript code when an image is loaded by the user's browser. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions.

Risk Information
cvss4
Base: 6.2
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:H/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).

Risk Information
cvss3
Base: 9.9
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Description

Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to sanitize team email addresses to be visible only to Team Admins, which allows any authenticated user to view team email addresses via the GET /api/v4/channels/{channel_id}/common_teams endpoint

Risk Information
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Description

Exposure of email service credentials to users without administrative rights in Devolutions Server.This issue affects Devolutions Server: before 2025.2.21, before 2025.3.9.

Description

Exposure of credentials in unintended requests in Devolutions Server.This issue affects Server: through 2025.2.20, through 2025.3.8.