Comparison Overview

Roundhouse Aquarium Teaching Center

VS

Hoyt Arboretum Friends

Roundhouse Aquarium Teaching Center

Manhattan Beach, CA, US, 90267
Last Update: 2025-12-01

Located in beautiful downtown Manhattan Beach, California, the Roundhouse Aquarium educates and inspires people of all generations from around the world. It is managed and operated by Oceanographic Teaching Stations, Inc. (OTS), a nonprofit oceanic and environmental organization established in 1979 to promote the study of the oceans, tidelands, and beaches of Southern California. Our programs are designed to connect and engage visitors and students to the oceans through hands-on interactive experiences with marine life and habitats of southern California, and to inspire them to become good stewards of our environment.

NAICS: 712
NAICS Definition: Museums, Historical Sites, and Similar Institutions
Employees: 13
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Hoyt Arboretum Friends

4000 SW Fairview Blvd, Portland, OR, 97221, US
Last Update: 2025-11-27
Between 750 and 799

Hoyt Arboretum is a living museum of trees located in Washington Park in SW Portland, free for the public to enjoy. We offer year-round access to 12 miles of trails, 189 acres of forest, and more than 2,300 species of plants and trees from around the world. 500,000 people are estimated to use Hoyt Arboretum as a living classroom, outdoor gym, and spiritual sanctuary every year. At the heart of the Arboretum is the Visitor Center, a “busy hive of activity,” which offers a gift shop and complimentary hot drinks. There’s also the Bill deWeese Classroom, where one can join public tours, expert-led presentations, and classes on everything from wildlife tracking to botanical illustration. Our Magnolia, Maple and Conifer collections are nationally recognized, and at least 67 of our species are listed as rare or endangered in the wild. The Arboretum is supported by Hoyt Arboretum Friends, a membership-based, 501(c)(3) nonprofit organization working in partnership with Portland Parks & Recreation. The mission of Hoyt Arboretum Friends is to maintain and improve Hoyt Arboretum and its collection for all people through advocacy, resources, awareness and education. Donations to Hoyt Arboretum Friends directly impact species conservation, community science, and accessible recreation for all visitors as well as education programs for youth and adults.

NAICS: 712
NAICS Definition:
Employees: 15
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/roundhouse-aquarium-teaching-center.jpeg
Roundhouse Aquarium Teaching Center
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/hoyt-arboretum-friends.jpeg
Hoyt Arboretum Friends
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Roundhouse Aquarium Teaching Center
100%
Compliance Rate
0/4 Standards Verified
Hoyt Arboretum Friends
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Museums, Historical Sites, and Zoos Industry Average (This Year)

No incidents recorded for Roundhouse Aquarium Teaching Center in 2025.

Incidents vs Museums, Historical Sites, and Zoos Industry Average (This Year)

No incidents recorded for Hoyt Arboretum Friends in 2025.

Incident History — Roundhouse Aquarium Teaching Center (X = Date, Y = Severity)

Roundhouse Aquarium Teaching Center cyber incidents detection timeline including parent company and subsidiaries

Incident History — Hoyt Arboretum Friends (X = Date, Y = Severity)

Hoyt Arboretum Friends cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/roundhouse-aquarium-teaching-center.jpeg
Roundhouse Aquarium Teaching Center
Incidents

No Incident

https://images.rankiteo.com/companyimages/hoyt-arboretum-friends.jpeg
Hoyt Arboretum Friends
Incidents

No Incident

FAQ

Roundhouse Aquarium Teaching Center company demonstrates a stronger AI Cybersecurity Score compared to Hoyt Arboretum Friends company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Historically, Hoyt Arboretum Friends company has disclosed a higher number of cyber incidents compared to Roundhouse Aquarium Teaching Center company.

In the current year, Hoyt Arboretum Friends company and Roundhouse Aquarium Teaching Center company have not reported any cyber incidents.

Neither Hoyt Arboretum Friends company nor Roundhouse Aquarium Teaching Center company has reported experiencing a ransomware attack publicly.

Neither Hoyt Arboretum Friends company nor Roundhouse Aquarium Teaching Center company has reported experiencing a data breach publicly.

Neither Hoyt Arboretum Friends company nor Roundhouse Aquarium Teaching Center company has reported experiencing targeted cyberattacks publicly.

Neither Roundhouse Aquarium Teaching Center company nor Hoyt Arboretum Friends company has reported experiencing or disclosing vulnerabilities publicly.

Neither Roundhouse Aquarium Teaching Center nor Hoyt Arboretum Friends holds any compliance certifications.

Neither company holds any compliance certifications.

Neither Roundhouse Aquarium Teaching Center company nor Hoyt Arboretum Friends company has publicly disclosed detailed information about the number of their subsidiaries.

Hoyt Arboretum Friends company employs more people globally than Roundhouse Aquarium Teaching Center company, reflecting its scale as a Museums, Historical Sites, and Zoos.

Neither Roundhouse Aquarium Teaching Center nor Hoyt Arboretum Friends holds SOC 2 Type 1 certification.

Neither Roundhouse Aquarium Teaching Center nor Hoyt Arboretum Friends holds SOC 2 Type 2 certification.

Neither Roundhouse Aquarium Teaching Center nor Hoyt Arboretum Friends holds ISO 27001 certification.

Neither Roundhouse Aquarium Teaching Center nor Hoyt Arboretum Friends holds PCI DSS certification.

Neither Roundhouse Aquarium Teaching Center nor Hoyt Arboretum Friends holds HIPAA certification.

Neither Roundhouse Aquarium Teaching Center nor Hoyt Arboretum Friends holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

vLLM is an inference and serving engine for large language models (LLMs). Prior to 0.11.1, vllm has a critical remote code execution vector in a config class named Nemotron_Nano_VL_Config. When vllm loads a model config that contains an auto_map entry, the config class resolves that mapping with get_class_from_dynamic_module(...) and immediately instantiates the returned class. This fetches and executes Python from the remote repository referenced in the auto_map string. Crucially, this happens even when the caller explicitly sets trust_remote_code=False in vllm.transformers_utils.config.get_config. In practice, an attacker can publish a benign-looking frontend repo whose config.json points via auto_map to a separate malicious backend repo; loading the frontend will silently run the backend’s code on the victim host. This vulnerability is fixed in 0.11.1.

Risk Information
cvss3
Base: 7.1
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
Description

fastify-reply-from is a Fastify plugin to forward the current HTTP request to another server. Prior to 12.5.0, by crafting a malicious URL, an attacker could access routes that are not allowed, even though the reply.from is defined for specific routes in @fastify/reply-from. This vulnerability is fixed in 12.5.0.

Risk Information
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to 21.0.2, 20.3.15, and 19.2.17, A Stored Cross-Site Scripting (XSS) vulnerability has been identified in the Angular Template Compiler. It occurs because the compiler's internal security schema is incomplete, allowing attackers to bypass Angular's built-in security sanitization. Specifically, the schema fails to classify certain URL-holding attributes (e.g., those that could contain javascript: URLs) as requiring strict URL security, enabling the injection of malicious scripts. This vulnerability is fixed in 21.0.2, 20.3.15, and 19.2.17.

Risk Information
cvss4
Base: 8.5
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Gin-vue-admin is a backstage management system based on vue and gin. In 2.8.6 and earlier, attackers can delete any file on the server at will, causing damage or unavailability of server resources. Attackers can control the 'FileMd5' parameter to delete any file and folder.

Risk Information
cvss4
Base: 8.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Portkey.ai Gateway is a blazing fast AI Gateway with integrated guardrails. Prior to 1.14.0, the gateway determined the destination baseURL by prioritizing the value in the x-portkey-custom-host request header. The proxy route then appends the client-specified path to perform an external fetch. This can be maliciously used by users for SSRF attacks. This vulnerability is fixed in 1.14.0.

Risk Information
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X