Comparison Overview

New Britain Museum of American Art

VS

OMSI

New Britain Museum of American Art

56 Lexington Street, New Britain, CT, 06052, US
Last Update: 2026-01-22
Between 750 and 799

The New Britain Museum of American Art’s founding in 1903 entitles the institution to be designated the first museum of strictly American art in the country. That year, a $20,000 gift of gold bonds to the museum’s former parent, the New Britain Institute, from industrialist John Butler Talcott, created funds to purchase ”modern oil paintings.” Subsequent purchases, with advice from New York museums and galleries, further defined ”modern” to mean American works of art, now numbering more than 8,300. With particular strengths in colonial portraiture, the Hudson River School, American Impressionism, and the Ash Can School, not to mention the important mural series The Arts of Life in America by Thomas Hart Benton, the museum relies heavily on its permanent collection for exhibitions and programming, yet also displays a significant number of borrowed shows and work by emerging artists. The singular focus on American art and its panoramic view of American artistic achievement make the New Britain Museum of American Art a significant teaching resource available to the local, regional, and national public.

NAICS: 712
NAICS Definition:
Employees: 57
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

OMSI

1945 SE Water Ave., None, Portland, Oregon, US, 97214
Last Update: 2026-01-22
Between 750 and 799

The Oregon Museum of Science and Industry (OMSI) is a nationally-renowned science center providing science learning to a range of audiences. Our programming is guided by OMSI’s long-term vision to promote a healthy, innovative, and sustainable society where everyone is prepared to participate in civic life. OMSI’s science, technology, engineering, art and mathematics (STEAM) programming helps visitors and program participants master 21st-century skills such as critical thinking, problem solving and collaboration. We achieve this vision through exhibits, classes, camps, traveling educators, and adult programs around the state, making OMSI a trusted educational resource to all Oregonians.

NAICS: 712
NAICS Definition: Museums, Historical Sites, and Similar Institutions
Employees: 399
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/new-britain-museum-of-american-art.jpeg
New Britain Museum of American Art
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/omsi.jpeg
OMSI
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
New Britain Museum of American Art
100%
Compliance Rate
0/4 Standards Verified
OMSI
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Museums, Historical Sites, and Zoos Industry Average (This Year)

No incidents recorded for New Britain Museum of American Art in 2026.

Incidents vs Museums, Historical Sites, and Zoos Industry Average (This Year)

No incidents recorded for OMSI in 2026.

Incident History — New Britain Museum of American Art (X = Date, Y = Severity)

New Britain Museum of American Art cyber incidents detection timeline including parent company and subsidiaries

Incident History — OMSI (X = Date, Y = Severity)

OMSI cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/new-britain-museum-of-american-art.jpeg
New Britain Museum of American Art
Incidents

No Incident

https://images.rankiteo.com/companyimages/omsi.jpeg
OMSI
Incidents

No Incident

FAQ

OMSI company demonstrates a stronger AI Cybersecurity Score compared to New Britain Museum of American Art company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Historically, OMSI company has disclosed a higher number of cyber incidents compared to New Britain Museum of American Art company.

In the current year, OMSI company and New Britain Museum of American Art company have not reported any cyber incidents.

Neither OMSI company nor New Britain Museum of American Art company has reported experiencing a ransomware attack publicly.

Neither OMSI company nor New Britain Museum of American Art company has reported experiencing a data breach publicly.

Neither OMSI company nor New Britain Museum of American Art company has reported experiencing targeted cyberattacks publicly.

Neither New Britain Museum of American Art company nor OMSI company has reported experiencing or disclosing vulnerabilities publicly.

Neither New Britain Museum of American Art nor OMSI holds any compliance certifications.

Neither company holds any compliance certifications.

Neither New Britain Museum of American Art company nor OMSI company has publicly disclosed detailed information about the number of their subsidiaries.

OMSI company employs more people globally than New Britain Museum of American Art company, reflecting its scale as a Museums, Historical Sites, and Zoos.

Neither New Britain Museum of American Art nor OMSI holds SOC 2 Type 1 certification.

Neither New Britain Museum of American Art nor OMSI holds SOC 2 Type 2 certification.

Neither New Britain Museum of American Art nor OMSI holds ISO 27001 certification.

Neither New Britain Museum of American Art nor OMSI holds PCI DSS certification.

Neither New Britain Museum of American Art nor OMSI holds HIPAA certification.

Neither New Britain Museum of American Art nor OMSI holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

Improper validation of specified type of input in M365 Copilot allows an unauthorized attacker to disclose information over a network.

Risk Information
cvss3
Base: 9.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
Description

Improper access control in Azure Front Door (AFD) allows an unauthorized attacker to elevate privileges over a network.

Risk Information
cvss3
Base: 9.8
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Description

Azure Entra ID Elevation of Privilege Vulnerability

Risk Information
cvss3
Base: 9.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N
Description

Moonraker is a Python web server providing API access to Klipper 3D printing firmware. In versions 0.9.3 and below, instances configured with the "ldap" component enabled are vulnerable to LDAP search filter injection techniques via the login endpoint. The 401 error response message can be used to determine whether or not a search was successful, allowing for brute force methods to discover LDAP entries on the server such as user IDs and user attributes. This issue has been fixed in version 0.10.0.

Risk Information
cvss4
Base: 2.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Runtipi is a Docker-based, personal homeserver orchestrator that facilitates multiple services on a single server. Versions 3.7.0 and above allow an authenticated user to execute arbitrary system commands on the host server by injecting shell metacharacters into backup filenames. The BackupManager fails to sanitize the filenames of uploaded backups. The system persists user-uploaded files directly to the host filesystem using the raw originalname provided in the request. This allows an attacker to stage a file containing shell metacharacters (e.g., $(id).tar.gz) at a predictable path, which is later referenced during the restore process. The successful storage of the file is what allows the subsequent restore command to reference and execute it. This issue has been fixed in version 4.7.0.

Risk Information
cvss3
Base: 8.0
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H