Comparison Overview

Superior Labels Inc

VS

Walsworth

Superior Labels Inc

2390 Cumberland Square Dr., None, Bettendorf, IA, US, 52722
Last Update: 2025-12-11

Since 1995, Superior Labels Inc. has grown steadily from its humble beginning as a one-product, home-based business to a multi-million dollar business. Today, Superior Labels offers numerous custom label products, personalized address labels and rubber stamps through www.RubberStamps.net. In June 2011, Superior Labels acquired Rubber Stamp Management of Browns Point, WA. The acquisition brings together a leading rubber stamp and label manufacturer with a prominent online craft and scrapbook retailer. Addicted to Rubber Stamps is a wholly-owned subsidiary of Superior Labels.

NAICS: 323
NAICS Definition: Printing and Related Support Activities
Employees: 13
Subsidiaries: 0
12-month incidents
0
Known data breaches
1
Attack type number
1

Walsworth

306 N Kansas Ave, None, Marceline, Missouri, US, 64658
Last Update: 2025-12-10
Between 650 and 699

Established in 1937, Walsworth is a family-owned commercial printer that offers end-to-end print and digital solutions. We have extensive experience in printing yearbooks, book printing, catalog printing, magazine printing, digital editions and more. Our print capabilities include sheetfed, sheetfed UV, and web, among others. Our binding option, include options for case-bound, perfect-bound, perfect case bound, saddle stitch and coil-bound projects. Our dedicated team will ensure your project comes out looking exactly the way you want it to. Walsworth is a top-five book printer, a top-five magazine printer, a top-three yearbook printer and the only family-owned printer of yearbooks. We are a full-service commercial printer large enough to offer comprehensive solutions including vast shipping, logistics and fulfillment, yet small enough to provide personalized service. We have four printing facilities across the Midwest - Marceline, Missouri; Fulton, Missouri; Saint Joseph, Michigan and Ripon, Wisconsin. If you are interested in learning more about Walsworth, please reach out to us.

NAICS: 323
NAICS Definition: Printing and Related Support Activities
Employees: 772
Subsidiaries: 0
12-month incidents
0
Known data breaches
2
Attack type number
1

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/superior-labels-inc.jpeg
Superior Labels Inc
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/walsworth-publishing.jpeg
Walsworth
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Superior Labels Inc
100%
Compliance Rate
0/4 Standards Verified
Walsworth
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Printing Services Industry Average (This Year)

No incidents recorded for Superior Labels Inc in 2025.

Incidents vs Printing Services Industry Average (This Year)

No incidents recorded for Walsworth in 2025.

Incident History — Superior Labels Inc (X = Date, Y = Severity)

Superior Labels Inc cyber incidents detection timeline including parent company and subsidiaries

Incident History — Walsworth (X = Date, Y = Severity)

Walsworth cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/superior-labels-inc.jpeg
Superior Labels Inc
Incidents

Date Detected: 11/2015
Type:Breach
Attack Vector: Unauthorized Access
Blog: Blog
https://images.rankiteo.com/companyimages/walsworth-publishing.jpeg
Walsworth
Incidents

Date Detected: 2/2024
Type:Breach
Blog: Blog

Date Detected: 12/2023
Type:Breach
Blog: Blog

FAQ

Superior Labels Inc company demonstrates a stronger AI Cybersecurity Score compared to Walsworth company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Walsworth company has faced a higher number of disclosed cyber incidents historically compared to Superior Labels Inc company.

In the current year, Walsworth company and Superior Labels Inc company have not reported any cyber incidents.

Neither Walsworth company nor Superior Labels Inc company has reported experiencing a ransomware attack publicly.

Both Walsworth company and Superior Labels Inc company have disclosed experiencing at least one data breach.

Neither Walsworth company nor Superior Labels Inc company has reported experiencing targeted cyberattacks publicly.

Neither Superior Labels Inc company nor Walsworth company has reported experiencing or disclosing vulnerabilities publicly.

Neither Superior Labels Inc nor Walsworth holds any compliance certifications.

Neither company holds any compliance certifications.

Neither Superior Labels Inc company nor Walsworth company has publicly disclosed detailed information about the number of their subsidiaries.

Walsworth company employs more people globally than Superior Labels Inc company, reflecting its scale as a Printing Services.

Neither Superior Labels Inc nor Walsworth holds SOC 2 Type 1 certification.

Neither Superior Labels Inc nor Walsworth holds SOC 2 Type 2 certification.

Neither Superior Labels Inc nor Walsworth holds ISO 27001 certification.

Neither Superior Labels Inc nor Walsworth holds PCI DSS certification.

Neither Superior Labels Inc nor Walsworth holds HIPAA certification.

Neither Superior Labels Inc nor Walsworth holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

Nagios XI versions prior to 2026R1.1 are vulnerable to local privilege escalation due to an unsafe interaction between sudo permissions and application file permissions. A user‑accessible maintenance script may be executed as root via sudo and includes an application file that is writable by a lower‑privileged user. A local attacker with access to the application account can modify this file to introduce malicious code, which is then executed with elevated privileges when the script is run. Successful exploitation results in arbitrary code execution as the root user.

Risk Information
cvss4
Base: 8.6
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Out of bounds read and write in V8 in Google Chrome prior to 143.0.7499.147 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

Description

Use after free in WebGPU in Google Chrome prior to 143.0.7499.147 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

Description

SIPGO is a library for writing SIP services in the GO language. Starting in version 0.3.0 and prior to version 1.0.0-alpha-1, a nil pointer dereference vulnerability is in the SIPGO library's `NewResponseFromRequest` function that affects all normal SIP operations. The vulnerability allows remote attackers to crash any SIP application by sending a single malformed SIP request without a To header. The vulnerability occurs when SIP message parsing succeeds for a request missing the To header, but the response creation code assumes the To header exists without proper nil checks. This affects routine operations like call setup, authentication, and message handling - not just error cases. This vulnerability affects all SIP applications using the sipgo library, not just specific configurations or edge cases, as long as they make use of the `NewResponseFromRequest` function. Version 1.0.0-alpha-1 contains a patch for the issue.

Risk Information
cvss4
Base: 8.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

GLPI is a free asset and IT management software package. Starting in version 9.1.0 and prior to version 10.0.21, an unauthorized user with an API access can read all knowledge base entries. Users should upgrade to 10.0.21 to receive a patch.

Risk Information
cvss3
Base: 6.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N