Comparison Overview

The Daily Progress & Central Virginia Media Group. A Division of BH Media Holdings, Inc.

VS

Greystone Books

The Daily Progress & Central Virginia Media Group. A Division of BH Media Holdings, Inc.

685 W Rio Rd, Charlottesville, Virginia, 22901, US
Last Update: 2025-11-26

The Daily Progress is the sole daily newspaper in the vicinity of Charlottesville, Virginia. It has been published daily since September 14, 1892. The paper was founded by James Hubert Lindsay and his brother Frank Lindsay. The Progress was initially published six days a week; the first Sunday edition was printed in September 1968. Lindsay's family owned the paper for 78 years. On November 30, 1970, the family announced a sale to the Worrell Newspaper group, which took over on January 1, 1971. Richmond-based Media General bought the newspaper in 1995. BH Media Group, a subsidiary of Berkshire Hathaway, purchased The Daily Progress and other Media General newspapers on May 17, 2012.

NAICS: 511
NAICS Definition:
Employees: 22
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Greystone Books

343 Railway Street, Vancouver, BC, V6A 1A4, CA
Last Update: 2025-11-26

Greystone Books is a trade book publisher that focuses on high-quality non-fiction books that appeal to regional, national, and international readers. The company is a leading publisher of books about nature and the environment, travel and adventure, sports, and current issues, as well as books that are exceptional literary expressions of personal passions. Almost half of the books originated by Greystone sell overseas, and licensed editions are sold in more than fifteen countries. Digital editions of Greystone books are also available from all major e-book retailers. Greystone publishes a wide range of thought-provoking and gifted Canadian and international authors, including David Suzuki, Candace Savage, Charlotte Gill, Andrew Nikiforuk, Mike Berners-Lee, Julie Angus, Brian Brett, Wayne Grady, Merilyn Simonds, Allan Casey, Wade Davis, Anita Albus, Harry Thurston, Lorna Crozier, Jane Christmas, and Paul Quarrington, among many others. Reflecting a commitment to protecting the environment, Greystone uses ancient-forest-friendly, chlorine-free,100 percent post-consumer paper in the majority of its books.

NAICS: 511
NAICS Definition:
Employees: 29
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/the-daily-progress.jpeg
The Daily Progress & Central Virginia Media Group. A Division of BH Media Holdings, Inc.
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/greystone-books.jpeg
Greystone Books
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
The Daily Progress & Central Virginia Media Group. A Division of BH Media Holdings, Inc.
100%
Compliance Rate
0/4 Standards Verified
Greystone Books
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Book and Periodical Publishing Industry Average (This Year)

No incidents recorded for The Daily Progress & Central Virginia Media Group. A Division of BH Media Holdings, Inc. in 2025.

Incidents vs Book and Periodical Publishing Industry Average (This Year)

No incidents recorded for Greystone Books in 2025.

Incident History — The Daily Progress & Central Virginia Media Group. A Division of BH Media Holdings, Inc. (X = Date, Y = Severity)

The Daily Progress & Central Virginia Media Group. A Division of BH Media Holdings, Inc. cyber incidents detection timeline including parent company and subsidiaries

Incident History — Greystone Books (X = Date, Y = Severity)

Greystone Books cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/the-daily-progress.jpeg
The Daily Progress & Central Virginia Media Group. A Division of BH Media Holdings, Inc.
Incidents

No Incident

https://images.rankiteo.com/companyimages/greystone-books.jpeg
Greystone Books
Incidents

No Incident

FAQ

The Daily Progress & Central Virginia Media Group. A Division of BH Media Holdings, Inc. company demonstrates a stronger AI Cybersecurity Score compared to Greystone Books company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Historically, Greystone Books company has disclosed a higher number of cyber incidents compared to The Daily Progress & Central Virginia Media Group. A Division of BH Media Holdings, Inc. company.

In the current year, Greystone Books company and The Daily Progress & Central Virginia Media Group. A Division of BH Media Holdings, Inc. company have not reported any cyber incidents.

Neither Greystone Books company nor The Daily Progress & Central Virginia Media Group. A Division of BH Media Holdings, Inc. company has reported experiencing a ransomware attack publicly.

Neither Greystone Books company nor The Daily Progress & Central Virginia Media Group. A Division of BH Media Holdings, Inc. company has reported experiencing a data breach publicly.

Neither Greystone Books company nor The Daily Progress & Central Virginia Media Group. A Division of BH Media Holdings, Inc. company has reported experiencing targeted cyberattacks publicly.

Neither The Daily Progress & Central Virginia Media Group. A Division of BH Media Holdings, Inc. company nor Greystone Books company has reported experiencing or disclosing vulnerabilities publicly.

Neither The Daily Progress & Central Virginia Media Group. A Division of BH Media Holdings, Inc. nor Greystone Books holds any compliance certifications.

Neither company holds any compliance certifications.

Neither The Daily Progress & Central Virginia Media Group. A Division of BH Media Holdings, Inc. company nor Greystone Books company has publicly disclosed detailed information about the number of their subsidiaries.

Greystone Books company employs more people globally than The Daily Progress & Central Virginia Media Group. A Division of BH Media Holdings, Inc. company, reflecting its scale as a Book and Periodical Publishing.

Neither The Daily Progress & Central Virginia Media Group. A Division of BH Media Holdings, Inc. nor Greystone Books holds SOC 2 Type 1 certification.

Neither The Daily Progress & Central Virginia Media Group. A Division of BH Media Holdings, Inc. nor Greystone Books holds SOC 2 Type 2 certification.

Neither The Daily Progress & Central Virginia Media Group. A Division of BH Media Holdings, Inc. nor Greystone Books holds ISO 27001 certification.

Neither The Daily Progress & Central Virginia Media Group. A Division of BH Media Holdings, Inc. nor Greystone Books holds PCI DSS certification.

Neither The Daily Progress & Central Virginia Media Group. A Division of BH Media Holdings, Inc. nor Greystone Books holds HIPAA certification.

Neither The Daily Progress & Central Virginia Media Group. A Division of BH Media Holdings, Inc. nor Greystone Books holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

ThingsBoard in versions prior to v4.2.1 allows an authenticated user to upload malicious SVG images via the "Image Gallery", leading to a Stored Cross-Site Scripting (XSS) vulnerability. The exploit can be triggered when any user accesses the public API endpoint of the malicious SVG images, or if the malicious images are embedded in an `iframe` element, during a widget creation, deployed to any page of the platform (e.g., dashboards), and accessed during normal operations. The vulnerability resides in the `ImageController`, which fails to restrict the execution of JavaScript code when an image is loaded by the user's browser. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions.

Risk Information
cvss4
Base: 6.2
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:H/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).

Risk Information
cvss3
Base: 9.9
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Description

Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to sanitize team email addresses to be visible only to Team Admins, which allows any authenticated user to view team email addresses via the GET /api/v4/channels/{channel_id}/common_teams endpoint

Risk Information
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Description

Exposure of email service credentials to users without administrative rights in Devolutions Server.This issue affects Devolutions Server: before 2025.2.21, before 2025.3.9.

Description

Exposure of credentials in unintended requests in Devolutions Server.This issue affects Server: through 2025.2.20, through 2025.3.8.