Company Details
rockefeller-institute-of-government
55
1,939
54172
rockinst.org
0
ROC_2723789
In-progress

Rockefeller Institute of Government Company CyberSecurity Posture
rockinst.orgThe Rockefeller Institute of Government is a public policy think tank providing cutting-edge, evidence-based policy. Our mission is to improve the capacities of communities, state and local governments, and the federal system to work toward genuine solutions to the nation’s problems. Through rigorous, objective, and accessible analysis and outreach, the Institute gives citizens and governments facts and tools relevant to public decisions. At the Rockefeller Institute of Government we offer: + Complex data analysis + Sophisticated policy design + Intelligent program implementation
Company Details
rockefeller-institute-of-government
55
1,939
54172
rockinst.org
0
ROC_2723789
In-progress
Between 750 and 799

RIG Global Score (TPRM)XXXX



No incidents recorded for Rockefeller Institute of Government in 2025.
No incidents recorded for Rockefeller Institute of Government in 2025.
No incidents recorded for Rockefeller Institute of Government in 2025.
RIG cyber incidents detection timeline including parent company and subsidiaries

The Rockefeller Institute of Government is a public policy think tank providing cutting-edge, evidence-based policy. Our mission is to improve the capacities of communities, state and local governments, and the federal system to work toward genuine solutions to the nation’s problems. Through rigorous, objective, and accessible analysis and outreach, the Institute gives citizens and governments facts and tools relevant to public decisions. At the Rockefeller Institute of Government we offer: + Complex data analysis + Sophisticated policy design + Intelligent program implementation


CAS Grow – Die Ideenschmiede der CAS Software AG. Wir verstehen uns innerhalb der Unternehmensgruppe, zwischen Spezialisten für Beziehungsmanagement und digitale Souveränität, als Inkubator und Pionier auf neuen Wegen. Hier wird gefeilt und experimentiert – die Arbeit bei CAS Grow ähnelt der in ei

Theos is the UK's leading religion and society think tank. We conduct research, publish reports, provide commentary for the media, and hold events on the relationship between religion, particularly Christianity, and society in the contemporary world. We exist to enrich the conversation about the ro

Al-Shabaka: The Palestinian Policy Network was launched in April 2010 as the first and only independent, transnational Palestinian think tank. Our mission is to convene a multidisciplinary, global network of Palestinian analysts to produce critical policy analysis and collectively imagine a new poli

Set up in 1990, ORF seeks to lead and aid policy thinking towards building a strong and prosperous India in a fair and equitable world. It helps discover and inform India’s choices, and carries Indian voices and ideas to forums shaping global debates. ORF provides non-partisan, independent analyses

The Sydney Institute was formally opened on 23 August 1989 at its 41 Phillip Street premises by New South Wales Premier Nick Greiner with supporting remarks from Bob Carr (the then NSW Opposition leader). The Sydney Institute is a privately funded not-for-profit current affairs forum encouraging

CDS is an award-winning, non-partisan, 501(c)(3) think tank devoted to the research and discussion of sustainability, development, and global security. Fostered by young people from across the globe, researchers and decision-makers alike are encouraged to submit reports and opinion articles. CDS is
.png)
The project's organizer called it a way for states to “move from curiosity to capability” and gain “a trusted place to learn, experiment and...
New York City is the latest state or local government this year to launch an initiative aimed at capitalizing on the growing crypto...
Over the next several days, Congress will need to enact 12 appropriation bills, essentially establishing the limits governing the federal...
The Rockefeller Institute of Government is closely monitoring legislative and administrative actions at the federal level that could have...
New York's 2024-25 budget updates school district merger incentives by tying aid to current Foundation Aid levels, nearly tripling funding...
NEW YORK — A key ally of Gov. Kathy Hochul said for the first time Thursday that her “plain, vanilla approach” to the state's outdated...
The Global Women Leaders Network includes former and current heads of state, ministers, and high-level government and private sector representatives.
The new chief data officer will be responsible for developing a comprehensive data strategy aligned with Denver's goals.
Philadelphia Mayor Cherelle Parker announced on Monday that all city employees will be required to return full-time to working in the office this summer.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Rockefeller Institute of Government is http://www.rockinst.org.
According to Rankiteo, Rockefeller Institute of Government’s AI-generated cybersecurity score is 750, reflecting their Fair security posture.
According to Rankiteo, Rockefeller Institute of Government currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Rockefeller Institute of Government is not certified under SOC 2 Type 1.
According to Rankiteo, Rockefeller Institute of Government does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Rockefeller Institute of Government is not listed as GDPR compliant.
According to Rankiteo, Rockefeller Institute of Government does not currently maintain PCI DSS compliance.
According to Rankiteo, Rockefeller Institute of Government is not compliant with HIPAA regulations.
According to Rankiteo,Rockefeller Institute of Government is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Rockefeller Institute of Government operates primarily in the Think Tanks industry.
Rockefeller Institute of Government employs approximately 55 people worldwide.
Rockefeller Institute of Government presently has no subsidiaries across any sectors.
Rockefeller Institute of Government’s official LinkedIn profile has approximately 1,939 followers.
Rockefeller Institute of Government is classified under the NAICS code 54172, which corresponds to Research and Development in the Social Sciences and Humanities.
No, Rockefeller Institute of Government does not have a profile on Crunchbase.
Yes, Rockefeller Institute of Government maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/rockefeller-institute-of-government.
As of December 05, 2025, Rankiteo reports that Rockefeller Institute of Government has not experienced any cybersecurity incidents.
Rockefeller Institute of Government has an estimated 812 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, Rockefeller Institute of Government has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
Sigstore Timestamp Authority is a service for issuing RFC 3161 timestamps. Prior to 2.0.3, Function api.ParseJSONRequest currently splits (via a call to strings.Split) an optionally-provided OID (which is untrusted data) on periods. Similarly, function api.getContentType splits the Content-Type header (which is also untrusted data) on an application string. As a result, in the face of a malicious request with either an excessively long OID in the payload containing many period characters or a malformed Content-Type header, a call to api.ParseJSONRequest or api.getContentType incurs allocations of O(n) bytes (where n stands for the length of the function's argument). This vulnerability is fixed in 2.0.3.
Monkeytype is a minimalistic and customizable typing test. In 25.49.0 and earlier, there is improper handling of user input which allows an attacker to execute malicious javascript on anyone viewing a malicious quote submission. quote.text and quote.source are user input, and they're inserted straight into the DOM. If they contain HTML tags, they will be rendered (after some escaping using quotes and textarea tags).
SysReptor is a fully customizable pentest reporting platform. Prior to 2025.102, there is a Stored Cross-Site Scripting (XSS) vulnerability allows authenticated users to execute malicious JavaScript in the context of other logged-in users by uploading malicious JavaScript files in the web UI. This vulnerability is fixed in 2025.102.
Taiko Alethia is an Ethereum-equivalent, permissionless, based rollup designed to scale Ethereum without compromising its fundamental properties. In 2.3.1 and earlier, TaikoInbox._verifyBatches (packages/protocol/contracts/layer1/based/TaikoInbox.sol:627-678) advanced the local tid to whatever transition matched the current blockHash before knowing whether that batch would actually be verified. When the loop later broke (e.g., cooldown window not yet passed or transition invalidated), the function still wrote that newer tid into batches[lastVerifiedBatchId].verifiedTransitionId after decrementing batchId. Result: the last verified batch could end up pointing at a transition index from the next batch (often zeroed), corrupting the verified chain pointer.
A flaw has been found in youlaitech youlai-mall 1.0.0/2.0.0. Affected is the function getById/updateAddress/deleteAddress of the file /mall-ums/app-api/v1/addresses/. Executing manipulation can lead to improper control of dynamically-identified variables. The attack can be executed remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.