Comparison Overview

Pacific Science Center

VS

BUEI (Bermuda Underwater Exploration Institute)

Pacific Science Center

200 Sue Bird Court N., Seattle, 98109, US
Last Update: 2026-01-23

Born in the spirit of innovation at the 1962 World’s Fair in Seattle, the Pacific Science Center (PacSci) has ignited curiosity for more than 60 years. Since its founding as the nation’s first science and technology center, PacSci has worked to expand access to science, serve as a vital resource for educators, and fuel discovery and experimentation as a vibrant community laboratory. PacSci is an independent, not-for-profit institution that serves nearly 1 million people in the Pacific Northwest and beyond each year.

NAICS: 712
NAICS Definition: Museums, Historical Sites, and Similar Institutions
Employees: 213
Subsidiaries: 0
12-month incidents
0
Known data breaches
1
Attack type number
1

BUEI (Bermuda Underwater Exploration Institute)

None
Last Update: 2026-01-22
Between 750 and 799

BUEI is a non-profit organization founded in 1997. BUEI’s mission is “To advance the understanding, appreciation and knowledge of the ocean and to encourage the protection and preservation of the marine environment”. BUEI is open Monday - Friday from 10am-5pm, and Saturday - Sunday from 10am-4pm. Last admission is one hour before closing time. For more information call 292-7219 or visit www.buei.bm. Follow us on Instagram, Twitter, and Facebook: @BUEIBermuda Follow us on TikTok: @thebuei

NAICS: 712
NAICS Definition: Museums, Historical Sites, and Similar Institutions
Employees: 20
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/pacific-science-center.jpeg
Pacific Science Center
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/bermuda-underwater-exploration-institute.jpeg
BUEI (Bermuda Underwater Exploration Institute)
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Pacific Science Center
100%
Compliance Rate
0/4 Standards Verified
BUEI (Bermuda Underwater Exploration Institute)
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Museums, Historical Sites, and Zoos Industry Average (This Year)

No incidents recorded for Pacific Science Center in 2026.

Incidents vs Museums, Historical Sites, and Zoos Industry Average (This Year)

No incidents recorded for BUEI (Bermuda Underwater Exploration Institute) in 2026.

Incident History — Pacific Science Center (X = Date, Y = Severity)

Pacific Science Center cyber incidents detection timeline including parent company and subsidiaries

Incident History — BUEI (Bermuda Underwater Exploration Institute) (X = Date, Y = Severity)

BUEI (Bermuda Underwater Exploration Institute) cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/pacific-science-center.jpeg
Pacific Science Center
Incidents

Date Detected: 6/2017
Type:Breach
Attack Vector: Spear Phishing
Blog: Blog
https://images.rankiteo.com/companyimages/bermuda-underwater-exploration-institute.jpeg
BUEI (Bermuda Underwater Exploration Institute)
Incidents

No Incident

FAQ

BUEI (Bermuda Underwater Exploration Institute) company demonstrates a stronger AI Cybersecurity Score compared to Pacific Science Center company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Pacific Science Center company has historically faced a number of disclosed cyber incidents, whereas BUEI (Bermuda Underwater Exploration Institute) company has not reported any.

In the current year, BUEI (Bermuda Underwater Exploration Institute) company and Pacific Science Center company have not reported any cyber incidents.

Neither BUEI (Bermuda Underwater Exploration Institute) company nor Pacific Science Center company has reported experiencing a ransomware attack publicly.

Pacific Science Center company has disclosed at least one data breach, while the other BUEI (Bermuda Underwater Exploration Institute) company has not reported such incidents publicly.

Neither BUEI (Bermuda Underwater Exploration Institute) company nor Pacific Science Center company has reported experiencing targeted cyberattacks publicly.

Neither Pacific Science Center company nor BUEI (Bermuda Underwater Exploration Institute) company has reported experiencing or disclosing vulnerabilities publicly.

Neither Pacific Science Center nor BUEI (Bermuda Underwater Exploration Institute) holds any compliance certifications.

Neither company holds any compliance certifications.

Neither Pacific Science Center company nor BUEI (Bermuda Underwater Exploration Institute) company has publicly disclosed detailed information about the number of their subsidiaries.

Pacific Science Center company employs more people globally than BUEI (Bermuda Underwater Exploration Institute) company, reflecting its scale as a Museums, Historical Sites, and Zoos.

Neither Pacific Science Center nor BUEI (Bermuda Underwater Exploration Institute) holds SOC 2 Type 1 certification.

Neither Pacific Science Center nor BUEI (Bermuda Underwater Exploration Institute) holds SOC 2 Type 2 certification.

Neither Pacific Science Center nor BUEI (Bermuda Underwater Exploration Institute) holds ISO 27001 certification.

Neither Pacific Science Center nor BUEI (Bermuda Underwater Exploration Institute) holds PCI DSS certification.

Neither Pacific Science Center nor BUEI (Bermuda Underwater Exploration Institute) holds HIPAA certification.

Neither Pacific Science Center nor BUEI (Bermuda Underwater Exploration Institute) holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

Improper validation of specified type of input in M365 Copilot allows an unauthorized attacker to disclose information over a network.

Risk Information
cvss3
Base: 9.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
Description

Improper access control in Azure Front Door (AFD) allows an unauthorized attacker to elevate privileges over a network.

Risk Information
cvss3
Base: 9.8
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Description

Azure Entra ID Elevation of Privilege Vulnerability

Risk Information
cvss3
Base: 9.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N
Description

Moonraker is a Python web server providing API access to Klipper 3D printing firmware. In versions 0.9.3 and below, instances configured with the "ldap" component enabled are vulnerable to LDAP search filter injection techniques via the login endpoint. The 401 error response message can be used to determine whether or not a search was successful, allowing for brute force methods to discover LDAP entries on the server such as user IDs and user attributes. This issue has been fixed in version 0.10.0.

Risk Information
cvss4
Base: 2.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Runtipi is a Docker-based, personal homeserver orchestrator that facilitates multiple services on a single server. Versions 3.7.0 and above allow an authenticated user to execute arbitrary system commands on the host server by injecting shell metacharacters into backup filenames. The BackupManager fails to sanitize the filenames of uploaded backups. The system persists user-uploaded files directly to the host filesystem using the raw originalname provided in the request. This allows an attacker to stage a file containing shell metacharacters (e.g., $(id).tar.gz) at a predictable path, which is later referenced during the restore process. The successful storage of the file is what allows the subsequent restore command to reference and execute it. This issue has been fixed in version 4.7.0.

Risk Information
cvss3
Base: 8.0
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H