Comparison Overview

SELFRAY

VS

Women in Construction Program

SELFRAY

244 Fifth Avenue, 2nd Floor, New York, 10001, US
Last Update: 2025-12-16
Between 750 and 799

Company Overview: SelfRAY is a dynamic platform dedicated to empowering young adults on the brink of graduation or recent graduates by connecting them with experienced mentors and securing paid internships that foster both professional and personal growth. Leveraging the power of AI and cutting-edge technologies, SelfRAY enhances productivity and ensures a seamless experience for its users. Our Mission: At SelfRAY, our mission is to help young adults discover their true passions and strengths through personalized mentorship and hands-on internship opportunities. We believe that the right guidance and practical experience are crucial for success in today’s competitive job market. What We Offer: Mentorship Programs: Access to a network of seasoned professionals who provide invaluable insights, advice, and industry connections. Paid Internships: Opportunities to gain practical experience and financial support while learning and growing in a professional setting. AI-Driven Tools: Innovative technologies that boost productivity and streamline the process of finding the perfect mentorship and internship match. Personal Growth: Programs and resources designed to help young adults uncover their personal passions and build on their strengths. Why Choose SelfRAY: Comprehensive Support: From mentorship to internship placements, we provide end-to-end support to ensure a rewarding experience. Innovative Technology: Our AI-driven platform makes the journey towards professional growth efficient and effective. Growth Opportunities: With access to exclusive opportunities, our users are well-equipped to excel in their respective fields. Join SelfRAY and take the first step towards a bright and successful future! Visit us at https://www.selfray.com/ for more information.

NAICS: 6115
NAICS Definition: Technical and Trade Schools
Employees: 31
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Women in Construction Program

684 Walker St, Biloxi, 39530, US
Last Update: 2025-12-19

The Women in Construction (WinC) program at Moore Community House is a pre-apprenticeship job training program that provides career and technical training that qualifies participants for employment in advanced manufacturing and the construction skilled craft trades. This innovative program combines classroom and hands-on learning, with the opportunity for participants to earn nationally recognized credentials.

NAICS: 6115
NAICS Definition: Technical and Trade Schools
Employees: None
Subsidiaries: 1
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/selfray.jpeg
SELFRAY
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/women-in-construction-program.jpeg
Women in Construction Program
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
SELFRAY
100%
Compliance Rate
0/4 Standards Verified
Women in Construction Program
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Technical and Vocational Training Industry Average (This Year)

No incidents recorded for SELFRAY in 2025.

Incidents vs Technical and Vocational Training Industry Average (This Year)

No incidents recorded for Women in Construction Program in 2025.

Incident History — SELFRAY (X = Date, Y = Severity)

SELFRAY cyber incidents detection timeline including parent company and subsidiaries

Incident History — Women in Construction Program (X = Date, Y = Severity)

Women in Construction Program cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/selfray.jpeg
SELFRAY
Incidents

No Incident

https://images.rankiteo.com/companyimages/women-in-construction-program.jpeg
Women in Construction Program
Incidents

No Incident

FAQ

Both SELFRAY company and Women in Construction Program company demonstrate a comparable AI Cybersecurity Score, with strong governance and monitoring frameworks in place.

Historically, Women in Construction Program company has disclosed a higher number of cyber incidents compared to SELFRAY company.

In the current year, Women in Construction Program company and SELFRAY company have not reported any cyber incidents.

Neither Women in Construction Program company nor SELFRAY company has reported experiencing a ransomware attack publicly.

Neither Women in Construction Program company nor SELFRAY company has reported experiencing a data breach publicly.

Neither Women in Construction Program company nor SELFRAY company has reported experiencing targeted cyberattacks publicly.

Neither SELFRAY company nor Women in Construction Program company has reported experiencing or disclosing vulnerabilities publicly.

Neither SELFRAY nor Women in Construction Program holds any compliance certifications.

Neither company holds any compliance certifications.

Women in Construction Program company has more subsidiaries worldwide compared to SELFRAY company.

Neither SELFRAY nor Women in Construction Program holds SOC 2 Type 1 certification.

Neither SELFRAY nor Women in Construction Program holds SOC 2 Type 2 certification.

Neither SELFRAY nor Women in Construction Program holds ISO 27001 certification.

Neither SELFRAY nor Women in Construction Program holds PCI DSS certification.

Neither SELFRAY nor Women in Construction Program holds HIPAA certification.

Neither SELFRAY nor Women in Construction Program holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

A vulnerability has been found in SeaCMS up to 13.3. The affected element is an unknown function of the file js/player/dmplayer/dmku/class/mysqli.class.php. Such manipulation of the argument page/limit leads to sql injection. The attack can be executed remotely. The exploit has been disclosed to the public and may be used.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in HappyDevs TempTool allows Stored XSS.This issue affects TempTool: from n/a through 1.3.1.

Risk Information
cvss3
Base: 6.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L
Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Tormorten WP Microdata allows Stored XSS.This issue affects WP Microdata: from n/a through 1.0.

Risk Information
cvss3
Base: 6.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L
Description

Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in HappyDevs TempTool allows Retrieve Embedded Sensitive Data.This issue affects TempTool: from n/a through 1.3.1.

Risk Information
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Description

A vulnerability has been found in Tenda FH1201 1.2.0.14(408). Affected is the function sprintf of the file /goform/SetIpBind. Such manipulation of the argument page leads to stack-based buffer overflow. The attack may be performed from remote. The exploit has been disclosed to the public and may be used.

Risk Information
cvss2
Base: 9.0
Severity: LOW
AV:N/AC:L/Au:S/C:C/I:C/A:C
cvss3
Base: 8.8
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
cvss4
Base: 7.4
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X