Company Details
the-center-for-social-inclusion
22
2,098
921
centerforsocialinclusion.org
0
CEN_2674382
In-progress

Center for Social Inclusion Company CyberSecurity Posture
centerforsocialinclusion.orgCenter for Social Inclusion's (CSI) mission is to catalyze communities, government, and other institutions to dismantle structural racial inequity. We craft and apply strategies and tools to transform our nation's policies and practices, in order to achieve racial equity. Our approach is organized into four strategies: POLICY & RESEARCH -- Working with community groups, government, and national organizations to develop policies that advance racial equity. TALKING ABOUT RACE -- Developing and sharing tools to talk about race and shift the dominant narrative. CAPACITY BUILDING -- Building leadership capacity through multi-racial coalition building, convenings, leadership development, and trainings. INSTITUTIONAL CHANGE -- Developing and implementing institutional change strategies to operationalize structural racial equity. Through our four strategies, CSI has developed programs to address racial inequities within specific issue areas and/or sectors. These programs include: - Government Alliance on Race and Equity - Energy Democracy - Food Equity - First Food - Broadband Equity - Transportation Equity - Race to Democracy - Communications Testing - Maya Wiley Fellowship Program - CSI Senior Fellowship
Company Details
the-center-for-social-inclusion
22
2,098
921
centerforsocialinclusion.org
0
CEN_2674382
In-progress
Between 700 and 749

CSI Global Score (TPRM)XXXX



No incidents recorded for Center for Social Inclusion in 2025.
No incidents recorded for Center for Social Inclusion in 2025.
No incidents recorded for Center for Social Inclusion in 2025.
CSI cyber incidents detection timeline including parent company and subsidiaries

Center for Social Inclusion's (CSI) mission is to catalyze communities, government, and other institutions to dismantle structural racial inequity. We craft and apply strategies and tools to transform our nation's policies and practices, in order to achieve racial equity. Our approach is organized into four strategies: POLICY & RESEARCH -- Working with community groups, government, and national organizations to develop policies that advance racial equity. TALKING ABOUT RACE -- Developing and sharing tools to talk about race and shift the dominant narrative. CAPACITY BUILDING -- Building leadership capacity through multi-racial coalition building, convenings, leadership development, and trainings. INSTITUTIONAL CHANGE -- Developing and implementing institutional change strategies to operationalize structural racial equity. Through our four strategies, CSI has developed programs to address racial inequities within specific issue areas and/or sectors. These programs include: - Government Alliance on Race and Equity - Energy Democracy - Food Equity - First Food - Broadband Equity - Transportation Equity - Race to Democracy - Communications Testing - Maya Wiley Fellowship Program - CSI Senior Fellowship


The Child Maintenance and Enforcement Commission is a new organisation established by the Child Maintenance and Other Payments Act 2008, following an in-depth review of child maintenance policy and delivery arrangements in this country. The Commission is responsible for the child maintenance system

La Superintendencia de Sociedades es un organismo técnico, adscrito al Ministerio de Comercio, Industria y Turismo, con personería jurídica, autonomía administrativa y patrimonio propio, mediante el cual el Presidente de la República ejerce la inspección, vigilancia y control de las sociedades merca

The Latino Policy Forum provides analysis with a Latino Perspective and convenes sectors of the community to engage in the policy debate and advocacy activities on issues critical to the region. Our work currently focuses on early childhood education, housing issues that address affordability, acce

Formerly the Public Defender Association, Purpose. Dignity. Action. (PDA) is a nonprofit organization that plants seeds for a world rooted in community and care instead of punishment and neglect. We work with people actively seeking to move past experiences of harm and injury, along with neighborhoo

Convener. Thought Leader. United Voice. Founded in 1984, InterAction is the largest alliance of international NGOs and partners in the United States. We mobilize our Members to think and act collectively to serve the world’s poor and vulnerable, with a shared belief that we can make the world a mor

Action Research works with child welfare systems across the country, providing information, analysis, and support to illuminate paths to better outcomes for children, youth, and families. We partner with government leaders, front-line staff, think tanks, service providers, and foundations to generat
.png)
Research Associate in the Center for Cyber Security, Dr. Muhammad Shafique job in Abu Dhabi, United Arab Emirates with NEW YORK UNIVERSITY ABU DHABI.
Cyber criminality, including extortion and ransomware, is one of the most pervasive cyber threats facing UK organisations.
Protect yourself with trusted cyber security guidance from the NCSC. Learn how to secure your devices, safeguard personal data, and stay secure online.
By Shamina Singh. Artificial intelligence (AI) is a transformative technology that has the potential to revolutionize industries.
In the two years since the last Digital States Survey from the Center for Digital Government, leading states have put resident experience at...
A multidisciplinary RMIT research team partnered with the Australian Women in Security Network to complete the research. RMIT's Centre for Cyber Security...
Mexico's cyber policy has suffered from a lack of political prioritization during the presidency of Andrés Manuel López Obrador.
This paper assesses the level of digital financial inclusion in Namibia and identifies its unique challenges in terms of the regulatory environment.
From participation gaps to differentiated threats and challenges in accessing technology, cyber (still) has a gender problem.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Center for Social Inclusion is http://www.centerforsocialinclusion.org.
According to Rankiteo, Center for Social Inclusion’s AI-generated cybersecurity score is 743, reflecting their Moderate security posture.
According to Rankiteo, Center for Social Inclusion currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Center for Social Inclusion is not certified under SOC 2 Type 1.
According to Rankiteo, Center for Social Inclusion does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Center for Social Inclusion is not listed as GDPR compliant.
According to Rankiteo, Center for Social Inclusion does not currently maintain PCI DSS compliance.
According to Rankiteo, Center for Social Inclusion is not compliant with HIPAA regulations.
According to Rankiteo,Center for Social Inclusion is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Center for Social Inclusion operates primarily in the Public Policy Offices industry.
Center for Social Inclusion employs approximately 22 people worldwide.
Center for Social Inclusion presently has no subsidiaries across any sectors.
Center for Social Inclusion’s official LinkedIn profile has approximately 2,098 followers.
No, Center for Social Inclusion does not have a profile on Crunchbase.
Yes, Center for Social Inclusion maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/the-center-for-social-inclusion.
As of November 28, 2025, Rankiteo reports that Center for Social Inclusion has not experienced any cybersecurity incidents.
Center for Social Inclusion has an estimated 1,024 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, Center for Social Inclusion has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to versions 19.2.16, 20.3.14, and 21.0.1, there is a XSRF token leakage via protocol-relative URLs in angular HTTP clients. The vulnerability is a Credential Leak by App Logic that leads to the unauthorized disclosure of the Cross-Site Request Forgery (XSRF) token to an attacker-controlled domain. Angular's HttpClient has a built-in XSRF protection mechanism that works by checking if a request URL starts with a protocol (http:// or https://) to determine if it is cross-origin. If the URL starts with protocol-relative URL (//), it is incorrectly treated as a same-origin request, and the XSRF token is automatically added to the X-XSRF-TOKEN header. This issue has been patched in versions 19.2.16, 20.3.14, and 21.0.1. A workaround for this issue involves avoiding using protocol-relative URLs (URLs starting with //) in HttpClient requests. All backend communication URLs should be hardcoded as relative paths (starting with a single /) or fully qualified, trusted absolute URLs.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Uncontrolled Recursion vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs. This issue has been patched in version 1.3.2.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Integer Overflow vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures containing OIDs with oversized arcs. These arcs may be decoded as smaller, trusted OIDs due to 32-bit bitwise truncation, enabling the bypass of downstream OID-based security decisions. This issue has been patched in version 1.3.2.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, working with large buffers in Lua scripts can lead to a stack overflow. Users of Lua rules and output scripts may be affected when working with large buffers. This includes a rule passing a large buffer to a Lua script. This issue has been patched in versions 7.0.13 and 8.0.2. A workaround for this issue involves disabling Lua rules and output scripts, or making sure limits, such as stream.depth.reassembly and HTTP response body limits (response-body-limit), are set to less than half the stack size.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. In versions from 8.0.0 to before 8.0.2, a NULL dereference can occur when the entropy keyword is used in conjunction with base64_data. This issue has been patched in version 8.0.2. A workaround involves disabling rules that use entropy in conjunction with base64_data.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.