Comparison Overview

Steve Jackson Games

VS

Manufacturing Business Technology

Steve Jackson Games

undefined, undefined, undefined, undefined, US
Last Update: 2025-11-26
Between 750 and 799

Steve Jackson Games was founded in 1980 by (no surprise here) Steve Jackson. We now publish books, games, and magazines for game fans. Our best-known games include Munchkin, the irreverent game of dungeon crawling; Zombie Dice, the fast-paced game of brain-eating; GURPS, the "Generic Universal RolePlaying System"; OGRE, the classic simulation of future war; Car Wars, about battle on the highways; INWO, the trading card game of world domination; and the original Illuminati game on which INWO was based. We've released a lot of other games, too . . . too many to list right here. We publish Pyramid magazine – the PDF magazine for roleplayers – which supports GURPS in all genres.

NAICS: 511
NAICS Definition: Publishing Industries (except Internet)
Employees: 41
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Manufacturing Business Technology

Madison, US
Last Update: 2025-11-28
Between 700 and 749

Manufacturing Business Technology delivers the latest news, products, and blogs focused on how ERP, CMMS, PLM, e-Commerce, CAM, CAD and other software platforms and related technologies can ensure competitiveness in the age of Big Data and the IIoT. Our dedicated editorial staff uses numerous industry resources to keep the site constantly updated with the latest and most relevant content on all the topics, critical issues, and market sectors relevant to the marketplace. The most vital and engaging of this information is then deployed to our valued readership via our daily Today in Manufacturing Business Technology newsletter.

NAICS: 511
NAICS Definition: Publishing Industries (except Internet)
Employees: 2
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/steve-jackson-games.jpeg
Steve Jackson Games
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/manufacturing-business-technology.jpeg
Manufacturing Business Technology
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Steve Jackson Games
100%
Compliance Rate
0/4 Standards Verified
Manufacturing Business Technology
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Book and Periodical Publishing Industry Average (This Year)

No incidents recorded for Steve Jackson Games in 2025.

Incidents vs Book and Periodical Publishing Industry Average (This Year)

No incidents recorded for Manufacturing Business Technology in 2025.

Incident History — Steve Jackson Games (X = Date, Y = Severity)

Steve Jackson Games cyber incidents detection timeline including parent company and subsidiaries

Incident History — Manufacturing Business Technology (X = Date, Y = Severity)

Manufacturing Business Technology cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/steve-jackson-games.jpeg
Steve Jackson Games
Incidents

No Incident

https://images.rankiteo.com/companyimages/manufacturing-business-technology.jpeg
Manufacturing Business Technology
Incidents

No Incident

FAQ

Steve Jackson Games company demonstrates a stronger AI Cybersecurity Score compared to Manufacturing Business Technology company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Historically, Manufacturing Business Technology company has disclosed a higher number of cyber incidents compared to Steve Jackson Games company.

In the current year, Manufacturing Business Technology company and Steve Jackson Games company have not reported any cyber incidents.

Neither Manufacturing Business Technology company nor Steve Jackson Games company has reported experiencing a ransomware attack publicly.

Neither Manufacturing Business Technology company nor Steve Jackson Games company has reported experiencing a data breach publicly.

Neither Manufacturing Business Technology company nor Steve Jackson Games company has reported experiencing targeted cyberattacks publicly.

Neither Steve Jackson Games company nor Manufacturing Business Technology company has reported experiencing or disclosing vulnerabilities publicly.

Neither Steve Jackson Games nor Manufacturing Business Technology holds any compliance certifications.

Neither company holds any compliance certifications.

Neither Steve Jackson Games company nor Manufacturing Business Technology company has publicly disclosed detailed information about the number of their subsidiaries.

Steve Jackson Games company employs more people globally than Manufacturing Business Technology company, reflecting its scale as a Book and Periodical Publishing.

Neither Steve Jackson Games nor Manufacturing Business Technology holds SOC 2 Type 1 certification.

Neither Steve Jackson Games nor Manufacturing Business Technology holds SOC 2 Type 2 certification.

Neither Steve Jackson Games nor Manufacturing Business Technology holds ISO 27001 certification.

Neither Steve Jackson Games nor Manufacturing Business Technology holds PCI DSS certification.

Neither Steve Jackson Games nor Manufacturing Business Technology holds HIPAA certification.

Neither Steve Jackson Games nor Manufacturing Business Technology holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

ThingsBoard in versions prior to v4.2.1 allows an authenticated user to upload malicious SVG images via the "Image Gallery", leading to a Stored Cross-Site Scripting (XSS) vulnerability. The exploit can be triggered when any user accesses the public API endpoint of the malicious SVG images, or if the malicious images are embedded in an `iframe` element, during a widget creation, deployed to any page of the platform (e.g., dashboards), and accessed during normal operations. The vulnerability resides in the `ImageController`, which fails to restrict the execution of JavaScript code when an image is loaded by the user's browser. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions.

Risk Information
cvss4
Base: 6.2
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:H/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).

Risk Information
cvss3
Base: 9.9
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Description

Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to sanitize team email addresses to be visible only to Team Admins, which allows any authenticated user to view team email addresses via the GET /api/v4/channels/{channel_id}/common_teams endpoint

Risk Information
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Description

Exposure of email service credentials to users without administrative rights in Devolutions Server.This issue affects Devolutions Server: before 2025.2.21, before 2025.3.9.

Description

Exposure of credentials in unintended requests in Devolutions Server.This issue affects Server: through 2025.2.20, through 2025.3.8.