Comparison Overview

Symphony in C

VS

Soho Playhouse

Symphony in C

576 Haddon Ave., Collingswood, NJ, US, 08108
Last Update: 2025-12-14
Between 750 and 799

Symphony in C is a world class symphony orchestra that provides training for tomorrow's orchestra musicians, music directors, composers, and soloists; well-rounded, artistically excellent performances for a variety of audiences, and access to classical music and education programs for children, particularly those in its home community of Camden, New Jersey.

NAICS: 7111
NAICS Definition: Performing Arts Companies
Employees: 48
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Soho Playhouse

15 Vandam Street, New York City, NY, 10013, US
Last Update: 2025-12-10
Between 750 and 799

Preserving and producing Off-Broadway's intimate storytelling. In recent years, we have been home to Phoebe Waller-Bridge's Fleabag, Hannah Gadsby, and Daniel Sloss. We are also home to the Fringe Encore Series, choosing the top Fringe shows from around the world and giving them a full off-Broadway run. Under the management of Darren Lee Cole, the SoHo Playhouse serves the downtown theater community as an historic 199 seat Off Broadway venue. The Huron Club below is an intimate 55 seat cabaret and bar steeped in the history of Old New York. The SoHo Playhouse stands on land that was once Richmond Hill, a colonial mansion that served as headquarters for General George Washington and later home to Aaron Burr. Purchased from Burr in 1817, the land was then developed into federalist-style row houses by fur magnate John Jacob Astor. 15 Van Dam Street, was designated at the Huron Club, a popular meeting house and night club for the Democratic Party. The turn of the century brought the Tammany Hall machine to the Huron Club. Prominent regulars included "Battery" Dan Finn and the infamous Jimmy "Beau James" Walker, known as "The night Mayor" due to his predilection for jazz clubs and chorus girls. The main floor was transformed into a theater in the 1920's, and in the 60's operated as the Village South, home to Playwrights Unit Workshop under the direction of Edward Albee. It was on this stage that Mr. Albee produced many first works of Terrance Mcnally, John Guare, Lanford Wilson, Sam Shephard, AR Gurney and Leroi Jones. We are currently expanding to Las Vegas.

NAICS: 711
NAICS Definition:
Employees: 16
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/symphony-in-c.jpeg
Symphony in C
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/soho-playhouse.jpeg
Soho Playhouse
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Symphony in C
100%
Compliance Rate
0/4 Standards Verified
Soho Playhouse
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Performing Arts Industry Average (This Year)

No incidents recorded for Symphony in C in 2025.

Incidents vs Performing Arts Industry Average (This Year)

No incidents recorded for Soho Playhouse in 2025.

Incident History — Symphony in C (X = Date, Y = Severity)

Symphony in C cyber incidents detection timeline including parent company and subsidiaries

Incident History — Soho Playhouse (X = Date, Y = Severity)

Soho Playhouse cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/symphony-in-c.jpeg
Symphony in C
Incidents

No Incident

https://images.rankiteo.com/companyimages/soho-playhouse.jpeg
Soho Playhouse
Incidents

No Incident

FAQ

Symphony in C company demonstrates a stronger AI Cybersecurity Score compared to Soho Playhouse company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Historically, Soho Playhouse company has disclosed a higher number of cyber incidents compared to Symphony in C company.

In the current year, Soho Playhouse company and Symphony in C company have not reported any cyber incidents.

Neither Soho Playhouse company nor Symphony in C company has reported experiencing a ransomware attack publicly.

Neither Soho Playhouse company nor Symphony in C company has reported experiencing a data breach publicly.

Neither Soho Playhouse company nor Symphony in C company has reported experiencing targeted cyberattacks publicly.

Neither Symphony in C company nor Soho Playhouse company has reported experiencing or disclosing vulnerabilities publicly.

Neither Symphony in C nor Soho Playhouse holds any compliance certifications.

Neither company holds any compliance certifications.

Neither Symphony in C company nor Soho Playhouse company has publicly disclosed detailed information about the number of their subsidiaries.

Symphony in C company employs more people globally than Soho Playhouse company, reflecting its scale as a Performing Arts.

Neither Symphony in C nor Soho Playhouse holds SOC 2 Type 1 certification.

Neither Symphony in C nor Soho Playhouse holds SOC 2 Type 2 certification.

Neither Symphony in C nor Soho Playhouse holds ISO 27001 certification.

Neither Symphony in C nor Soho Playhouse holds PCI DSS certification.

Neither Symphony in C nor Soho Playhouse holds HIPAA certification.

Neither Symphony in C nor Soho Playhouse holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

A weakness has been identified in itsourcecode Online Pet Shop Management System 1.0. This vulnerability affects unknown code of the file /pet1/addcnp.php. This manipulation of the argument cnpname causes sql injection. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in Tenda AX9 22.03.01.46. This affects the function image_check of the component httpd. The manipulation results in use of weak hash. It is possible to launch the attack remotely. A high complexity level is associated with this attack. It is indicated that the exploitability is difficult. The exploit has been released to the public and may be exploited.

Risk Information
cvss2
Base: 2.6
Severity: HIGH
AV:N/AC:H/Au:N/C:N/I:P/A:N
cvss3
Base: 3.7
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
cvss4
Base: 6.3
Severity: HIGH
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A weakness has been identified in code-projects Student File Management System 1.0. This issue affects some unknown processing of the file /admin/update_student.php. This manipulation of the argument stud_id causes sql injection. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in code-projects Student File Management System 1.0. This vulnerability affects unknown code of the file /admin/save_user.php. The manipulation of the argument firstname results in sql injection. The attack can be executed remotely. The exploit has been released to the public and may be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was identified in code-projects Student File Management System 1.0. This affects an unknown part of the file /admin/update_user.php. The manipulation of the argument user_id leads to sql injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X