Comparison Overview

Streetz Ahead

VS

Olympic Ballet Theatre

Streetz Ahead

1 Moira Close, Tottenham, England, N17 6HZ, GB
Last Update: 2025-12-11
Between 750 and 799

Streetz Ahead inspire young people to realise their potential and build their confidence through the power of dance and the magic of performance. We are a registered charity that provides subsidised dance and performance training for over 500 young people per week. Our pledge is to maintain low fees and offer young people a rich and rewarding experience that aims to develop self-confidence through stimulating and inspiring opportunities. Using a team of experienced professionals, we offer specialised courses and projects in performing arts, spoken word, drama, dance, wellbeing and mentoring.

NAICS: 711
NAICS Definition:
Employees: 13
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Olympic Ballet Theatre

700 Main St, Edmonds, Washington, 98020-3032, US
Last Update: 2025-12-12
Between 750 and 799

Olympic Ballet Theatre is a non-profit performing company with estimated audiences of 15,000 annually Including 4,000 school children. In its 35th Season, OBT has become a mainstay of the Snohomish County arts scene. While their emphasis remains on classical ballet, Artistic Directors Mara Vinson and Oleg Gorboulev, former Pacific Northwest Ballet leading artists, bring fresh new works to OBT.

NAICS: 711
NAICS Definition:
Employees: 12
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/streetz-ahead.jpeg
Streetz Ahead
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/olympic-ballet.jpeg
Olympic Ballet Theatre
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Streetz Ahead
100%
Compliance Rate
0/4 Standards Verified
Olympic Ballet Theatre
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Performing Arts Industry Average (This Year)

No incidents recorded for Streetz Ahead in 2025.

Incidents vs Performing Arts Industry Average (This Year)

No incidents recorded for Olympic Ballet Theatre in 2025.

Incident History — Streetz Ahead (X = Date, Y = Severity)

Streetz Ahead cyber incidents detection timeline including parent company and subsidiaries

Incident History — Olympic Ballet Theatre (X = Date, Y = Severity)

Olympic Ballet Theatre cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/streetz-ahead.jpeg
Streetz Ahead
Incidents

No Incident

https://images.rankiteo.com/companyimages/olympic-ballet.jpeg
Olympic Ballet Theatre
Incidents

No Incident

FAQ

Both Streetz Ahead company and Olympic Ballet Theatre company demonstrate a comparable AI Cybersecurity Score, with strong governance and monitoring frameworks in place.

Historically, Olympic Ballet Theatre company has disclosed a higher number of cyber incidents compared to Streetz Ahead company.

In the current year, Olympic Ballet Theatre company and Streetz Ahead company have not reported any cyber incidents.

Neither Olympic Ballet Theatre company nor Streetz Ahead company has reported experiencing a ransomware attack publicly.

Neither Olympic Ballet Theatre company nor Streetz Ahead company has reported experiencing a data breach publicly.

Neither Olympic Ballet Theatre company nor Streetz Ahead company has reported experiencing targeted cyberattacks publicly.

Neither Streetz Ahead company nor Olympic Ballet Theatre company has reported experiencing or disclosing vulnerabilities publicly.

Neither Streetz Ahead nor Olympic Ballet Theatre holds any compliance certifications.

Neither company holds any compliance certifications.

Neither Streetz Ahead company nor Olympic Ballet Theatre company has publicly disclosed detailed information about the number of their subsidiaries.

Streetz Ahead company employs more people globally than Olympic Ballet Theatre company, reflecting its scale as a Performing Arts.

Neither Streetz Ahead nor Olympic Ballet Theatre holds SOC 2 Type 1 certification.

Neither Streetz Ahead nor Olympic Ballet Theatre holds SOC 2 Type 2 certification.

Neither Streetz Ahead nor Olympic Ballet Theatre holds ISO 27001 certification.

Neither Streetz Ahead nor Olympic Ballet Theatre holds PCI DSS certification.

Neither Streetz Ahead nor Olympic Ballet Theatre holds HIPAA certification.

Neither Streetz Ahead nor Olympic Ballet Theatre holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

NXLog Agent before 6.11 can load a file specified by the OPENSSL_CONF environment variable.

Risk Information
cvss3
Base: 8.1
Severity: HIGH
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
Description

uriparser through 0.9.9 allows unbounded recursion and stack consumption, as demonstrated by ParseMustBeSegmentNzNc with large input containing many commas.

Risk Information
cvss3
Base: 2.9
Severity: HIGH
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
Description

A vulnerability was detected in Mayan EDMS up to 4.10.1. The affected element is an unknown function of the file /authentication/. The manipulation results in cross site scripting. The attack may be performed from remote. The exploit is now public and may be used. Upgrading to version 4.10.2 is sufficient to fix this issue. You should upgrade the affected component. The vendor confirms that this is "[f]ixed in version 4.10.2". Furthermore, that "[b]ackports for older versions in process and will be out as soon as their respective CI pipelines complete."

Risk Information
cvss2
Base: 5.0
Severity: LOW
AV:N/AC:L/Au:N/C:N/I:P/A:N
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

MJML through 4.18.0 allows mj-include directory traversal to test file existence and (in the type="css" case) read files. NOTE: this issue exists because of an incomplete fix for CVE-2020-12827.

Risk Information
cvss3
Base: 4.5
Severity: HIGH
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:L
Description

A half-blind Server Side Request Forgery (SSRF) vulnerability exists in kube-controller-manager when using the in-tree Portworx StorageClass. This vulnerability allows authorized users to leak arbitrary information from unprotected endpoints in the control plane’s host network (including link-local or loopback services).

Risk Information
cvss3
Base: 5.8
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N