Comparison Overview

ONELOVE PHOTOGRAPHY

VS

Gear&Link Industry Photography

ONELOVE PHOTOGRAPHY

San Francisco Bay Area, US
Last Update: 2025-12-11
Between 750 and 799

We work with our hearts and our hands. In an instant, technological society that is starved for human touch, we consider ourselves artisans of life. Monet and Renoir are our muses. Just like with Impressionism, fascination with light and movement is at the core of our art. onelove is a family. Each photographer has been hand-selected and personally trained by Sara. Only photographers who embody the same intentional warmth and kindness of the onelove aesthetic both in their professional and personal lives shoot for onelove. It is the shared love for our art that unites us. Read more here: http://www.onelove-photo.com/about.cfm

NAICS: 54192
NAICS Definition: Photographic Services
Employees: 18
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Gear&Link Industry Photography

Denver, 80247, US
Last Update: 2025-12-17
Between 750 and 799

The photographs that I capture will demonstrate individuals who are devoted to their careers. Ones who represent; character, knowledge, and most of all passion. It is one thing to know of the industries people go into, although; its another to fully embrace and appreciate it. Wether you are an engineer, diesel technician, beauty stylist, or a nanny you all are a fundamental piece of our society’s evolution and deserves to be show cased as the hero you are. I take pride in capturing the raw beauty of a work environment, no matter how neat or messy it may be, there’s a story that’s to be portrayed. However, it’s important to always include the individual within the frame, because without them, there is no story to tell. Therefore, I am an environmental portrait photographer who seeks amazingly talented individuals in interesting environments. I am already excited to meet who you are and discover what you love to do.

NAICS: 54192
NAICS Definition: Photographic Services
Employees: None
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/onelove-photography.jpeg
ONELOVE PHOTOGRAPHY
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
ONELOVE PHOTOGRAPHY
100%
Compliance Rate
0/4 Standards Verified
Gear&Link Industry Photography
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Photography Industry Average (This Year)

No incidents recorded for ONELOVE PHOTOGRAPHY in 2025.

Incidents vs Photography Industry Average (This Year)

No incidents recorded for Gear&Link Industry Photography in 2025.

Incident History — ONELOVE PHOTOGRAPHY (X = Date, Y = Severity)

ONELOVE PHOTOGRAPHY cyber incidents detection timeline including parent company and subsidiaries

Incident History — Gear&Link Industry Photography (X = Date, Y = Severity)

Gear&Link Industry Photography cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/onelove-photography.jpeg
ONELOVE PHOTOGRAPHY
Incidents

No Incident

https://images.rankiteo.com/companyimages/gear-link.jpeg
Gear&Link Industry Photography
Incidents

No Incident

FAQ

Gear&Link Industry Photography company demonstrates a stronger AI Cybersecurity Score compared to ONELOVE PHOTOGRAPHY company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Historically, Gear&Link Industry Photography company has disclosed a higher number of cyber incidents compared to ONELOVE PHOTOGRAPHY company.

In the current year, Gear&Link Industry Photography company and ONELOVE PHOTOGRAPHY company have not reported any cyber incidents.

Neither Gear&Link Industry Photography company nor ONELOVE PHOTOGRAPHY company has reported experiencing a ransomware attack publicly.

Neither Gear&Link Industry Photography company nor ONELOVE PHOTOGRAPHY company has reported experiencing a data breach publicly.

Neither Gear&Link Industry Photography company nor ONELOVE PHOTOGRAPHY company has reported experiencing targeted cyberattacks publicly.

Neither ONELOVE PHOTOGRAPHY company nor Gear&Link Industry Photography company has reported experiencing or disclosing vulnerabilities publicly.

Neither ONELOVE PHOTOGRAPHY nor Gear&Link Industry Photography holds any compliance certifications.

Neither company holds any compliance certifications.

Neither ONELOVE PHOTOGRAPHY company nor Gear&Link Industry Photography company has publicly disclosed detailed information about the number of their subsidiaries.

Neither ONELOVE PHOTOGRAPHY nor Gear&Link Industry Photography holds SOC 2 Type 1 certification.

Neither ONELOVE PHOTOGRAPHY nor Gear&Link Industry Photography holds SOC 2 Type 2 certification.

Neither ONELOVE PHOTOGRAPHY nor Gear&Link Industry Photography holds ISO 27001 certification.

Neither ONELOVE PHOTOGRAPHY nor Gear&Link Industry Photography holds PCI DSS certification.

Neither ONELOVE PHOTOGRAPHY nor Gear&Link Industry Photography holds HIPAA certification.

Neither ONELOVE PHOTOGRAPHY nor Gear&Link Industry Photography holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

Nagios XI versions prior to 2026R1.1 are vulnerable to local privilege escalation due to an unsafe interaction between sudo permissions and application file permissions. A user‑accessible maintenance script may be executed as root via sudo and includes an application file that is writable by a lower‑privileged user. A local attacker with access to the application account can modify this file to introduce malicious code, which is then executed with elevated privileges when the script is run. Successful exploitation results in arbitrary code execution as the root user.

Risk Information
cvss4
Base: 8.6
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Out of bounds read and write in V8 in Google Chrome prior to 143.0.7499.147 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

Description

Use after free in WebGPU in Google Chrome prior to 143.0.7499.147 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

Description

SIPGO is a library for writing SIP services in the GO language. Starting in version 0.3.0 and prior to version 1.0.0-alpha-1, a nil pointer dereference vulnerability is in the SIPGO library's `NewResponseFromRequest` function that affects all normal SIP operations. The vulnerability allows remote attackers to crash any SIP application by sending a single malformed SIP request without a To header. The vulnerability occurs when SIP message parsing succeeds for a request missing the To header, but the response creation code assumes the To header exists without proper nil checks. This affects routine operations like call setup, authentication, and message handling - not just error cases. This vulnerability affects all SIP applications using the sipgo library, not just specific configurations or edge cases, as long as they make use of the `NewResponseFromRequest` function. Version 1.0.0-alpha-1 contains a patch for the issue.

Risk Information
cvss4
Base: 8.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

GLPI is a free asset and IT management software package. Starting in version 9.1.0 and prior to version 10.0.21, an unauthorized user with an API access can read all knowledge base entries. Users should upgrade to 10.0.21 to receive a patch.

Risk Information
cvss3
Base: 6.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N