Comparison Overview

Service public de Wallonie

VS

State of Florida

Service public de Wallonie

Place Joséphine Charlotte, 2, JAMBES, Wallonie, BE, 5100
Last Update: 2026-01-23
Between 700 and 749

Le Service public de Wallonie (SPW) est l'administration de la Wallonie. Il est composé du Secrétariat général, du SPW Support et du SPW Digital qui exercent des compétences transversales : communication interne et externe, coordination des fonds structurels européens, audit financier et de fonctionnement, chancellerie, géomatique, gestion du personnel, recrutement, formation, gestion des ressources humaines, affaires juridiques, informatique, informatique, gestion mobilière et immobilière... Les autres directions générales sont chargées de la gestion de matières et de compétences spécifiques, en lien direct avec les besoins et les attentes des citoyens, des entreprises, des associations et des pouvoirs locaux. Chacune des directions générales compte plusieurs départements eux-mêmes subdivisés en directions : • SPW Mobilité et Infrastructures • SPW Agriculture, Ressources naturelles et Environnement • SPW Territoire, Logement, Patrimoine et Energie • SPW Intérieur et Action sociale • SPW Economie, Emploi et Recherche • SPW Finances

NAICS: 92
NAICS Definition: Public Administration
Employees: 1,832
Subsidiaries: 0
12-month incidents
0
Known data breaches
1
Attack type number
1

State of Florida

US
Last Update: 2026-01-17
Between 750 and 799

Join Florida’s talented workforce to fulfill your professional goals and achieve a meaningful career. Our talented public servants work hard to serve more than 19 million residents across Florida, and you, too, can realize success in the Sunshine State. Working in Florida’s state government means being responsive to the issues impacting the taxpayers of our state. Florida’s state government boasts both fast-paced work environments in which critical thinking and creative problem-solving are a must as well as steady employment opportunities that prize consistent service to our state’s residents. In some positions, state employment means being able to influence policy decisions and help implement change. In others, state employment means being the reliable resource that our taxpayers have come to expect from Florida’s public servants. All positions offer the ability to gain valuable experience quickly, improving your overall skillset. The State of Florida is seeking individuals with leadership skills, creativity and dedication to their fellow Floridians and individuals who recognize the professional development opportunities and achievements possible through state service. Florida boasts the third largest population in the country and is richly diverse in both population and landscape. With an award-winning park system, warm weather and beautiful bodies of water, Florida is the perfect environment for recreational activities and outdoor enthusiasts. Our favorable tax climate means your income goes further and our business-friendly policies foster private sector growth. Joining Florida’s talented, diverse workforce provides the opportunity to achieve your professional goals while living in a state that values quality of life, culture and recreation. For employment opportunities with the State of Florida, visit https://jobs.myflorida.com.

NAICS: 92
NAICS Definition: Public Administration
Employees: 13,659
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/service-public-de-wallonie.jpeg
Service public de Wallonie
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/state-of-florida.jpeg
State of Florida
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Service public de Wallonie
100%
Compliance Rate
0/4 Standards Verified
State of Florida
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Government Administration Industry Average (This Year)

No incidents recorded for Service public de Wallonie in 2026.

Incidents vs Government Administration Industry Average (This Year)

No incidents recorded for State of Florida in 2026.

Incident History — Service public de Wallonie (X = Date, Y = Severity)

Service public de Wallonie cyber incidents detection timeline including parent company and subsidiaries

Incident History — State of Florida (X = Date, Y = Severity)

State of Florida cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/service-public-de-wallonie.jpeg
Service public de Wallonie
Incidents

Date Detected: 5/2025
Type:Breach
Attack Vector: Exploiting vulnerable, obsolete servers
Motivation: Potentially for future intrusions
Blog: Blog
https://images.rankiteo.com/companyimages/state-of-florida.jpeg
State of Florida
Incidents

No Incident

FAQ

State of Florida company demonstrates a stronger AI Cybersecurity Score compared to Service public de Wallonie company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Service public de Wallonie company has historically faced a number of disclosed cyber incidents, whereas State of Florida company has not reported any.

In the current year, State of Florida company and Service public de Wallonie company have not reported any cyber incidents.

Neither State of Florida company nor Service public de Wallonie company has reported experiencing a ransomware attack publicly.

Service public de Wallonie company has disclosed at least one data breach, while the other State of Florida company has not reported such incidents publicly.

Neither State of Florida company nor Service public de Wallonie company has reported experiencing targeted cyberattacks publicly.

Neither Service public de Wallonie company nor State of Florida company has reported experiencing or disclosing vulnerabilities publicly.

Neither Service public de Wallonie nor State of Florida holds any compliance certifications.

Neither company holds any compliance certifications.

Neither Service public de Wallonie company nor State of Florida company has publicly disclosed detailed information about the number of their subsidiaries.

State of Florida company employs more people globally than Service public de Wallonie company, reflecting its scale as a Government Administration.

Neither Service public de Wallonie nor State of Florida holds SOC 2 Type 1 certification.

Neither Service public de Wallonie nor State of Florida holds SOC 2 Type 2 certification.

Neither Service public de Wallonie nor State of Florida holds ISO 27001 certification.

Neither Service public de Wallonie nor State of Florida holds PCI DSS certification.

Neither Service public de Wallonie nor State of Florida holds HIPAA certification.

Neither Service public de Wallonie nor State of Florida holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

Typemill is a flat-file, Markdown-based CMS designed for informational documentation websites. A reflected Cross-Site Scripting (XSS) exists in the login error view template `login.twig` of versions 2.19.1 and below. The `username` value can be echoed back without proper contextual encoding when authentication fails. An attacker can execute script in the login page context. This issue has been fixed in version 2.19.2.

Risk Information
cvss3
Base: 5.4
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
Description

A DOM-based Cross-Site Scripting (XSS) vulnerability exists in the DomainCheckerApp class within domain/script.js of Sourcecodester Domain Availability Checker v1.0. The vulnerability occurs because the application improperly handles user-supplied data in the createResultElement method by using the unsafe innerHTML property to render domain search results.

Description

A Remote Code Execution (RCE) vulnerability exists in Sourcecodester Modern Image Gallery App v1.0 within the gallery/upload.php component. The application fails to properly validate uploaded file contents. Additionally, the application preserves the user-supplied file extension during the save process. This allows an unauthenticated attacker to upload arbitrary PHP code by spoofing the MIME type as an image, leading to full system compromise.

Description

A UNIX symbolic link following issue in the jailer component in Firecracker version v1.13.1 and earlier and 1.14.0 on Linux may allow a local host user with write access to the pre-created jailer directories to overwrite arbitrary host files via a symlink attack during the initialization copy at jailer startup, if the jailer is executed with root privileges. To mitigate this issue, users should upgrade to version v1.13.2 or 1.14.1 or above.

Risk Information
cvss3
Base: 6.0
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
cvss4
Base: 6.0
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

An information disclosure vulnerability exists in the /srvs/membersrv/getCashiers endpoint of the Aptsys gemscms backend platform thru 2025-05-28. This unauthenticated endpoint returns a list of cashier accounts, including names, email addresses, usernames, and passwords hashed using MD5. As MD5 is a broken cryptographic function, the hashes can be easily reversed using public tools, exposing user credentials in plaintext. This allows remote attackers to perform unauthorized logins and potentially gain access to sensitive POS operations or backend functions.