Company Details
tara-books
7
3,123
511
tarabooks.com
0
TAR_5965360
In-progress

Tara Books Company CyberSecurity Posture
tarabooks.comTara Books is an independent publisher of predominantly visual books based in Chennai, India. We are a collective of writers, designers and book makers, and generate most of our titles in-house. We also work with creative professionals from India and abroad. Our engagement with the rich diversity of Indian folk and tribal art is particularly well known. We have brought many of these traditions into the book for the first time, by combining them with contemporary design and fine production. The image is central to our books. Visual language is a form of communication, and it has the ability to cut through barriers of class, caste and region. Several of our artists are from communities that continue to endure exploitation and inequality, and the books we have created with them bring in completely new perspectives for the reader. We experiment with the form of the book: from content and design, to paper and printing. We’re particularly well known for our books made completely by hand, which are printed and bound in our special book making workshop. These exquisite editions have won critical acclaim and recognition. We have also won major international awards for our books and publishing endeavour, the latest one being the Best Children's Publisher of the Year Award for Asia at the Bologna Book Fair 2013. Our vision of publishing is that of a genuinely collaborative process, relying on dialogue and mutuality. Publishing is a genuinely collaborative process for us.
Company Details
tara-books
7
3,123
511
tarabooks.com
0
TAR_5965360
In-progress
Between 700 and 749

Tara Books Global Score (TPRM)XXXX



No incidents recorded for Tara Books in 2025.
No incidents recorded for Tara Books in 2025.
No incidents recorded for Tara Books in 2025.
Tara Books cyber incidents detection timeline including parent company and subsidiaries

Tara Books is an independent publisher of predominantly visual books based in Chennai, India. We are a collective of writers, designers and book makers, and generate most of our titles in-house. We also work with creative professionals from India and abroad. Our engagement with the rich diversity of Indian folk and tribal art is particularly well known. We have brought many of these traditions into the book for the first time, by combining them with contemporary design and fine production. The image is central to our books. Visual language is a form of communication, and it has the ability to cut through barriers of class, caste and region. Several of our artists are from communities that continue to endure exploitation and inequality, and the books we have created with them bring in completely new perspectives for the reader. We experiment with the form of the book: from content and design, to paper and printing. We’re particularly well known for our books made completely by hand, which are printed and bound in our special book making workshop. These exquisite editions have won critical acclaim and recognition. We have also won major international awards for our books and publishing endeavour, the latest one being the Best Children's Publisher of the Year Award for Asia at the Bologna Book Fair 2013. Our vision of publishing is that of a genuinely collaborative process, relying on dialogue and mutuality. Publishing is a genuinely collaborative process for us.


Since 1950, Chiriotti Editori is an Italian publishing house specialised in technical magazines for the food and beverage industries. There are 8 leading magazines, two of them in English, that cover the entire food sector: “Industrie Alimentari”, “Industrie delle Bevande”, “Ingredienti Alimentari”,

Editoria e comunicazione studio pym offre la curatela di libri a pacchetto completo (copertina, progetto grafico e illustrazioni, editing e revisione, ghostwriting, traduzione, rapporto con autori, traduttori o curatori, stesura testi cover, redazione, correzione bozze, realizzazione indici, impa

The Permissions Group, Inc. is a copyright and permissions consulting company with more than 15 years of experience negotiating rights and permissions. Our company's goal is to provide a full range of rights-related services. We have extensive experience obtaining the rights to print material, photo

Sheen is the ultimate beauty guide, featuring the latest trends from hair to fashion. Sheen Magazine is The Ultimate Beauty Guide for the modern day woman. The southern national lifestyle and beauty publication is the preeminent voice for the American beauty on new trends, techniques, and produc

Helsinki University Press (HUP) is a scholarly Open Access publisher of peer reviewed books and journals. We publish monographs and edited volumes from all academic fields. HUP’s books are free to download in pdf and Epub as well as free to read in our in-browser reader. We offer the academic com

The Worcester Business Journal is the region's definitive source for business news. Every two weeks, we deliver news and opinion in print for the Central Massachusetts business community. Every day we deliver the news business leaders need through our website, WBJournal.com and our email newsletter,
.png)
Bellevue-based Tanium names Tara Ryan as CMO. The cybersecurity firm protects 34M devices for clients like Barclays and Honeywell.
Kolhapur: Senior writer, researcher, folk literature scholar and president of the 98th Akhil Bharatiya Marathi Sahitya Sanmelan Dr Tara...
Dustin Heywood, chief architect of IBM's global intelligence agency X-Force, says artificial intelligence is changing the cybersecurity game.
The automotive industry is in a state of change. While the EU will no longer permit gasoline or diesel-fueled vehicles from 2035 onward,...
Cyber security professional, Tara Whitehead finds balance in her lifestyle with sleep-ins, a love of sport, and making time for herself to rejuvenate.
Boost to cybersecurity ties, says senior Australian High Commission official Tara Cavanagh.
PRNewswire/ -- Tara Taylor believes that cybersecurity education is for everyone, and embraces that philosophy every day in her teaching and...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Tara Books is https://www.tarabooks.com/.
According to Rankiteo, Tara Books’s AI-generated cybersecurity score is 749, reflecting their Moderate security posture.
According to Rankiteo, Tara Books currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Tara Books is not certified under SOC 2 Type 1.
According to Rankiteo, Tara Books does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Tara Books is not listed as GDPR compliant.
According to Rankiteo, Tara Books does not currently maintain PCI DSS compliance.
According to Rankiteo, Tara Books is not compliant with HIPAA regulations.
According to Rankiteo,Tara Books is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Tara Books operates primarily in the Book and Periodical Publishing industry.
Tara Books employs approximately 7 people worldwide.
Tara Books presently has no subsidiaries across any sectors.
Tara Books’s official LinkedIn profile has approximately 3,123 followers.
Tara Books is classified under the NAICS code 511, which corresponds to Publishing Industries (except Internet).
No, Tara Books does not have a profile on Crunchbase.
Yes, Tara Books maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/tara-books.
As of November 28, 2025, Rankiteo reports that Tara Books has not experienced any cybersecurity incidents.
Tara Books has an estimated 4,881 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, Tara Books has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
ThingsBoard in versions prior to v4.2.1 allows an authenticated user to upload malicious SVG images via the "Image Gallery", leading to a Stored Cross-Site Scripting (XSS) vulnerability. The exploit can be triggered when any user accesses the public API endpoint of the malicious SVG images, or if the malicious images are embedded in an `iframe` element, during a widget creation, deployed to any page of the platform (e.g., dashboards), and accessed during normal operations. The vulnerability resides in the `ImageController`, which fails to restrict the execution of JavaScript code when an image is loaded by the user's browser. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions.
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to sanitize team email addresses to be visible only to Team Admins, which allows any authenticated user to view team email addresses via the GET /api/v4/channels/{channel_id}/common_teams endpoint
Exposure of email service credentials to users without administrative rights in Devolutions Server.This issue affects Devolutions Server: before 2025.2.21, before 2025.3.9.
Exposure of credentials in unintended requests in Devolutions Server.This issue affects Server: through 2025.2.20, through 2025.3.8.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.