Comparison Overview

Regan Atwood P.A.

VS

MPEG LA, a division of Via Licensing Alliance

Regan Atwood P.A.

9905 Old St. Augustine Road, Jacksonville, FL, 32257, US
Last Update: 2025-11-28
Between 750 and 799

Jacksonville, Florida, law firm Regan Atwood P.A. handles complex, high dollar construction law, business law, and real estate law cases for plaintiffs and defendants facing litigation in state and federal courts. When a company is faced with a seven- to eight-figure legal problem, clients expect and demand superior legal performance with responsible actions and answers. Regan Atwood which has offices in Orlando, Florida, is a law firm with decades of experience in handling lawsuits, arbitrations, and negotiations of settlements in cases that last months, or even years. “When you come to us, you don’t need to know what questions to ask,” said Regan Atwood managing partner and attorney Jeffrey C. Regan. "For most business owners, thoughts go directly to costs, and whether or not a lawsuit will take the company down. Hiring the right attorney is the first step towards getting the answers, and towards ending the problem.” Regan Atwood takes on complex, multi-party construction litigation that may involve: • Construction delay claims • Construction liens • Defect claims • Delay and disruption • Insurance bad faith • Non-payment • Payment bond claims • Quality of construction Regan Atwood provides exceptional business litigation representation for issues including: • Breach of contract • Breach of promissory note • Broker liability • Business torts • Fraud • Unfair and deceptive trade practices • Intentional interference with contracts Regan Atwood is highly skilled in handling real estate litigation cases including: • Broker liability • Commercial transaction dispute • Easement disputes • Enforcement of restrictive covenant • Foreclosures (Florida & Georgia) • Quiet title • Undisclosed material defects Regan Atwood P.A. Experience. Integrity. Results.

NAICS: 541
NAICS Definition:
Employees: 5
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

MPEG LA, a division of Via Licensing Alliance

4600 S. Ulster St., Denver, CO, 80237, US
Last Update: 2025-11-27
Between 750 and 799

In May 2023, Via Licensing and MPEG LA united to form a pool of pools - the industry's largest patent pool administrator with dozens of IP licensing programs. Via Licensing Alliance is the collaborative licensing leader, dedicated to accelerating global technology adoption, fostering participation, and generating return on innovation with balanced licensing solutions for innovators and manufacturers of all sizes around the globe. Via LA has operated dozens of licensing programs for a variety of technologies consisting of nearly 50,000 patents in over 130 countries with more than 500 patent holders and nearly 10,000 licensees. Via LA is an independently managed company owned by industry-leading participants with over 25 years of intellectual property licensing leadership.

NAICS: 541
NAICS Definition:
Employees: 21
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/regan-whalen-zebouni-&-atwood-p.a..jpeg
Regan Atwood P.A.
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/mpeg-la-llc.jpeg
MPEG LA, a division of Via Licensing Alliance
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Regan Atwood P.A.
100%
Compliance Rate
0/4 Standards Verified
MPEG LA, a division of Via Licensing Alliance
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Legal Services Industry Average (This Year)

No incidents recorded for Regan Atwood P.A. in 2025.

Incidents vs Legal Services Industry Average (This Year)

No incidents recorded for MPEG LA, a division of Via Licensing Alliance in 2025.

Incident History — Regan Atwood P.A. (X = Date, Y = Severity)

Regan Atwood P.A. cyber incidents detection timeline including parent company and subsidiaries

Incident History — MPEG LA, a division of Via Licensing Alliance (X = Date, Y = Severity)

MPEG LA, a division of Via Licensing Alliance cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/regan-whalen-zebouni-&-atwood-p.a..jpeg
Regan Atwood P.A.
Incidents

No Incident

https://images.rankiteo.com/companyimages/mpeg-la-llc.jpeg
MPEG LA, a division of Via Licensing Alliance
Incidents

No Incident

FAQ

Regan Atwood P.A. company demonstrates a stronger AI Cybersecurity Score compared to MPEG LA, a division of Via Licensing Alliance company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Historically, MPEG LA, a division of Via Licensing Alliance company has disclosed a higher number of cyber incidents compared to Regan Atwood P.A. company.

In the current year, MPEG LA, a division of Via Licensing Alliance company and Regan Atwood P.A. company have not reported any cyber incidents.

Neither MPEG LA, a division of Via Licensing Alliance company nor Regan Atwood P.A. company has reported experiencing a ransomware attack publicly.

Neither MPEG LA, a division of Via Licensing Alliance company nor Regan Atwood P.A. company has reported experiencing a data breach publicly.

Neither MPEG LA, a division of Via Licensing Alliance company nor Regan Atwood P.A. company has reported experiencing targeted cyberattacks publicly.

Neither Regan Atwood P.A. company nor MPEG LA, a division of Via Licensing Alliance company has reported experiencing or disclosing vulnerabilities publicly.

Neither Regan Atwood P.A. nor MPEG LA, a division of Via Licensing Alliance holds any compliance certifications.

Neither company holds any compliance certifications.

Neither Regan Atwood P.A. company nor MPEG LA, a division of Via Licensing Alliance company has publicly disclosed detailed information about the number of their subsidiaries.

MPEG LA, a division of Via Licensing Alliance company employs more people globally than Regan Atwood P.A. company, reflecting its scale as a Legal Services.

Neither Regan Atwood P.A. nor MPEG LA, a division of Via Licensing Alliance holds SOC 2 Type 1 certification.

Neither Regan Atwood P.A. nor MPEG LA, a division of Via Licensing Alliance holds SOC 2 Type 2 certification.

Neither Regan Atwood P.A. nor MPEG LA, a division of Via Licensing Alliance holds ISO 27001 certification.

Neither Regan Atwood P.A. nor MPEG LA, a division of Via Licensing Alliance holds PCI DSS certification.

Neither Regan Atwood P.A. nor MPEG LA, a division of Via Licensing Alliance holds HIPAA certification.

Neither Regan Atwood P.A. nor MPEG LA, a division of Via Licensing Alliance holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

A vulnerability was determined in motogadget mo.lock Ignition Lock up to 20251125. Affected by this vulnerability is an unknown functionality of the component NFC Handler. Executing manipulation can lead to use of hard-coded cryptographic key . The physical device can be targeted for the attack. A high complexity level is associated with this attack. The exploitation appears to be difficult. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 1.2
Severity: HIGH
AV:L/AC:H/Au:N/C:P/I:N/A:N
cvss3
Base: 2.0
Severity: HIGH
CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
cvss4
Base: 1.0
Severity: HIGH
CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

OrangeHRM is a comprehensive human resource management (HRM) system. From version 5.0 to 5.7, the interview attachment retrieval endpoint in the Recruitment module serves files based solely on an authenticated session and user-supplied identifiers, without verifying whether the requester has permission to access the associated interview record. Because the server does not perform any recruitment-level authorization checks, an ESS-level user with no access to recruitment workflows can directly request interview attachment URLs and receive the corresponding files. This exposes confidential interview documents—including candidate CVs, evaluations, and supporting files—to unauthorized users. The issue arises from relying on predictable object identifiers and session presence rather than validating the user’s association with the relevant recruitment process. This issue has been patched in version 5.8.

Risk Information
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

OrangeHRM is a comprehensive human resource management (HRM) system. From version 5.0 to 5.7, the application’s recruitment attachment retrieval endpoint does not enforce the required authorization checks before serving candidate files. Even users restricted to ESS-level access, who have no permission to view the Recruitment module, can directly access candidate attachment URLs. When an authenticated request is made to the attachment endpoint, the system validates the session but does not confirm that the requesting user has the necessary recruitment permissions. As a result, any authenticated user can download CVs and other uploaded documents for arbitrary candidates by issuing direct requests to the attachment endpoint, leading to unauthorized exposure of sensitive applicant data. This issue has been patched in version 5.8.

Risk Information
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

OrangeHRM is a comprehensive human resource management (HRM) system. From version 5.0 to 5.7, the application does not invalidate existing sessions when a user is disabled or when a password change occurs, allowing active session cookies to remain valid indefinitely. As a result, a disabled user, or an attacker using a compromised account, can continue to access protected pages and perform operations as long as a prior session remains active. Because the server performs no session revocation or session-store cleanup during these critical state changes, disabling an account or updating credentials has no effect on already-established sessions. This makes administrative disable actions ineffective and allows unauthorized users to retain full access even after an account is closed or a password is reset, exposing the system to prolonged unauthorized use and significantly increasing the impact of account takeover scenarios. This issue has been patched in version 5.8.

Risk Information
cvss4
Base: 8.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

OrangeHRM is a comprehensive human resource management (HRM) system. From version 5.0 to 5.7, the password reset workflow does not enforce that the username submitted in the final reset request matches the account for which the reset process was originally initiated. After obtaining a valid reset link for any account they can receive email for, an attacker can alter the username parameter in the final reset request to target a different user. Because the system accepts the supplied username without verification, the attacker can set a new password for any chosen account, including privileged accounts, resulting in full account takeover. This issue has been patched in version 5.8.

Risk Information
cvss4
Base: 8.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X