Comparison Overview

Reynolda House Museum of American Art

VS

Indian Pueblo Cultural Center

Reynolda House Museum of American Art

2250 Reynolda Road, Winston-Salem, NC, 27106, US
Last Update: 2026-01-24
Between 750 and 799

Reynolda House Museum of American Art in Winston-Salem, North Carolina, is recognized as a rare gem among the nation’s cultural institutions. The museum presents an exceptional collection of art by America’s most noted artists in an incomparable setting: the 1917 country home of Katharine and Richard Joshua (R. J.) Reynolds. Spanning 250 years of painting, prints, sculpture, photography and video art, the collection has been guided with the prescient and unerring eye of Barbara Babcock Millhouse, granddaughter of Katharine and R. J. Reynolds. Highlights include important works by Albert Bierstadt, William Merritt Chase, Frederic Edwin Church, Chuck Close, Stuart Davis, Arthur Dove, Martin Johnson Heade, Lee Krasner, Georgia O’Keeffe, Nam June Paik, Martin Puryear, Gilbert Stuart and Grant Wood. In addition to its collection of fine art, Reynolda House Museum of America Art holds decorative arts and estate archive collections and mounts exhibitions from all periods in the 2005 Charles and Mary Babcock Wing. Established in 1967 and now affiliated with Wake Forest University, the museum will mark two anniversaries in 2017—the 50th of its founding and the 100th of the completion of its estate—with major exhibitions and events. The complete Reynolda experience includes Reynolda Gardens, composed of formal gardens, walking trails and wetlands, and Reynolda Village, now an eclectic mix of shops and restaurants in many of the estate’s original buildings.

NAICS: 712
NAICS Definition:
Employees: 58
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Indian Pueblo Cultural Center

2401 12th St NW, Albuquerque, New Mexico, 87104, US
Last Update: 2026-01-23
Between 750 and 799

Founded in 1976 by the 19 Pueblos of New Mexico, the Indian Pueblo Cultural Center (IPCC) is responsible for preserving and perpetuating Pueblo culture, and advancing understanding – by presenting with dignity and respect – the accomplishments and evolving history of the Pueblo people of New Mexico. It is located at the heart of nearly 80 acres of land owned by the 19 Pueblos and governed by the 19 Pueblos District. The non-profit Cultural Center is comprised of museum and gallery space, a collection of murals and other Native arts and artifacts, a library, archives, an education department, and cultural programming and events – each celebrating the Pueblo culture of New Mexico. IPCC is located within a cultural and business district (known as the IPCC Campus) in the heart of Albuquerque. The IPCC Campus is also home to a variety of commercial enterprises (also owned and operated by the 19 Pueblos), which include Pueblo Harvest restaurant, Indian Pueblo Store, event and meeting space, Starbucks at Avanyu Plaza, Four Winds convenience store, two hotels, and more. The mission of the IPCC Campus is to serve as gathering place where Pueblo culture is celebrated through creative and cultural experiences, while providing economic opportunities to Pueblo and local communities.

NAICS: 712
NAICS Definition:
Employees: 81
Subsidiaries: 1
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/reynolda-house-museum-of-american-art.jpeg
Reynolda House Museum of American Art
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/indian-pueblo-cultural-center.jpeg
Indian Pueblo Cultural Center
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Reynolda House Museum of American Art
100%
Compliance Rate
0/4 Standards Verified
Indian Pueblo Cultural Center
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Museums, Historical Sites, and Zoos Industry Average (This Year)

No incidents recorded for Reynolda House Museum of American Art in 2026.

Incidents vs Museums, Historical Sites, and Zoos Industry Average (This Year)

No incidents recorded for Indian Pueblo Cultural Center in 2026.

Incident History — Reynolda House Museum of American Art (X = Date, Y = Severity)

Reynolda House Museum of American Art cyber incidents detection timeline including parent company and subsidiaries

Incident History — Indian Pueblo Cultural Center (X = Date, Y = Severity)

Indian Pueblo Cultural Center cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/reynolda-house-museum-of-american-art.jpeg
Reynolda House Museum of American Art
Incidents

No Incident

https://images.rankiteo.com/companyimages/indian-pueblo-cultural-center.jpeg
Indian Pueblo Cultural Center
Incidents

No Incident

FAQ

Both Reynolda House Museum of American Art company and Indian Pueblo Cultural Center company demonstrate a comparable AI Cybersecurity Score, with strong governance and monitoring frameworks in place.

Historically, Indian Pueblo Cultural Center company has disclosed a higher number of cyber incidents compared to Reynolda House Museum of American Art company.

In the current year, Indian Pueblo Cultural Center company and Reynolda House Museum of American Art company have not reported any cyber incidents.

Neither Indian Pueblo Cultural Center company nor Reynolda House Museum of American Art company has reported experiencing a ransomware attack publicly.

Neither Indian Pueblo Cultural Center company nor Reynolda House Museum of American Art company has reported experiencing a data breach publicly.

Neither Indian Pueblo Cultural Center company nor Reynolda House Museum of American Art company has reported experiencing targeted cyberattacks publicly.

Neither Reynolda House Museum of American Art company nor Indian Pueblo Cultural Center company has reported experiencing or disclosing vulnerabilities publicly.

Neither Reynolda House Museum of American Art nor Indian Pueblo Cultural Center holds any compliance certifications.

Neither company holds any compliance certifications.

Indian Pueblo Cultural Center company has more subsidiaries worldwide compared to Reynolda House Museum of American Art company.

Indian Pueblo Cultural Center company employs more people globally than Reynolda House Museum of American Art company, reflecting its scale as a Museums, Historical Sites, and Zoos.

Neither Reynolda House Museum of American Art nor Indian Pueblo Cultural Center holds SOC 2 Type 1 certification.

Neither Reynolda House Museum of American Art nor Indian Pueblo Cultural Center holds SOC 2 Type 2 certification.

Neither Reynolda House Museum of American Art nor Indian Pueblo Cultural Center holds ISO 27001 certification.

Neither Reynolda House Museum of American Art nor Indian Pueblo Cultural Center holds PCI DSS certification.

Neither Reynolda House Museum of American Art nor Indian Pueblo Cultural Center holds HIPAA certification.

Neither Reynolda House Museum of American Art nor Indian Pueblo Cultural Center holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

Typemill is a flat-file, Markdown-based CMS designed for informational documentation websites. A reflected Cross-Site Scripting (XSS) exists in the login error view template `login.twig` of versions 2.19.1 and below. The `username` value can be echoed back without proper contextual encoding when authentication fails. An attacker can execute script in the login page context. This issue has been fixed in version 2.19.2.

Risk Information
cvss3
Base: 5.4
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
Description

A DOM-based Cross-Site Scripting (XSS) vulnerability exists in the DomainCheckerApp class within domain/script.js of Sourcecodester Domain Availability Checker v1.0. The vulnerability occurs because the application improperly handles user-supplied data in the createResultElement method by using the unsafe innerHTML property to render domain search results.

Description

A Remote Code Execution (RCE) vulnerability exists in Sourcecodester Modern Image Gallery App v1.0 within the gallery/upload.php component. The application fails to properly validate uploaded file contents. Additionally, the application preserves the user-supplied file extension during the save process. This allows an unauthenticated attacker to upload arbitrary PHP code by spoofing the MIME type as an image, leading to full system compromise.

Description

A UNIX symbolic link following issue in the jailer component in Firecracker version v1.13.1 and earlier and 1.14.0 on Linux may allow a local host user with write access to the pre-created jailer directories to overwrite arbitrary host files via a symlink attack during the initialization copy at jailer startup, if the jailer is executed with root privileges. To mitigate this issue, users should upgrade to version v1.13.2 or 1.14.1 or above.

Risk Information
cvss3
Base: 6.0
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
cvss4
Base: 6.0
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

An information disclosure vulnerability exists in the /srvs/membersrv/getCashiers endpoint of the Aptsys gemscms backend platform thru 2025-05-28. This unauthenticated endpoint returns a list of cashier accounts, including names, email addresses, usernames, and passwords hashed using MD5. As MD5 is a broken cryptographic function, the hashes can be easily reversed using public tools, exposing user credentials in plaintext. This allows remote attackers to perform unauthorized logins and potentially gain access to sensitive POS operations or backend functions.