Comparison Overview

The Performance Poetry Preservation Project

VS

PACE Theatre Company

The Performance Poetry Preservation Project

26 Mellen Street, Dorchester, Massachusetts, 02124, US
Last Update: 2025-12-09

P4 is a community-supported, grass-roots effort that protects and preserves the recorded history of the poetry slam movement. P4 possesses a living, growing, and carefully curated performance poetry archive, and our ambition is to collect and catalog a broad representation of the slam poetry movement. We believe in the power of the poetry slam to change lives, and we are dedicated to preserving the great poetry that crosses hundreds of slam stages, all over the world. Whatever your interest in performance poetry, we're here for YOU! For Poets and Organizers, we provide a dedicated home for the poetry performances you have created and/or captured. The spontaneous, grass-roots and do-it-yourself nature of the Poetry Slam movement means that large volumes of this artform—including artist-made products (chapbooks, cds) and recordings of live performances are at risk of being lost if not collected or adequately archived. We want to be that home. If you are a poet or organizer who want to learn more contact us! For Scholars and Poetry Fans, we provide an easily accessible and highly searchable archive of our rich archive of poetry performances, hopefully encouraging exploration, discovery and cross-pollination. If you are a scholar who is looking for the best way to use the archive for your research, contact us! We at P4 believe in the power of the poetry slam to change lives. Thanks to the rapid advance of technology, without a concerted effort, the legacy of a modern performance poetry movement is at risk of being lost. P4 was founded to tackle this problem, by creating a digital home dedicated to preserving and showcasing the great poetry that has crossed hundreds of slam stages around the globe.

NAICS: 711
NAICS Definition:
Employees: 2
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

PACE Theatre Company

Spires Drama Studios, Paisley, Renfrewshire, PA1 2DA, GB
Last Update: 2025-12-12
Between 750 and 799

PACE Theatre Company, based in Paisley, was founded in 1988 and is a registered charity specialising in work with young people. It focuses on developing and nurturing young creative talent through performing arts experiences. It runs PACE Youth Theatre, the largest youth theatre in the UK with over 1,000 young people attending each week, and produces the annual pantomime at Paisley Arts Centre along with other professional theatre and touring productions. It manages the Wynd Auditorium venue in Paisley and has rehearsal facilities in Spires Studios. It is our aim is to create an inclusive and welcoming environment in which young people can thrive.

NAICS: 711
NAICS Definition:
Employees: 16
Subsidiaries: 2
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/the-performance-poetry-preservation-project.jpeg
The Performance Poetry Preservation Project
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/pace-theatre-company-limited.jpeg
PACE Theatre Company
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
The Performance Poetry Preservation Project
100%
Compliance Rate
0/4 Standards Verified
PACE Theatre Company
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Performing Arts Industry Average (This Year)

No incidents recorded for The Performance Poetry Preservation Project in 2025.

Incidents vs Performing Arts Industry Average (This Year)

No incidents recorded for PACE Theatre Company in 2025.

Incident History — The Performance Poetry Preservation Project (X = Date, Y = Severity)

The Performance Poetry Preservation Project cyber incidents detection timeline including parent company and subsidiaries

Incident History — PACE Theatre Company (X = Date, Y = Severity)

PACE Theatre Company cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/the-performance-poetry-preservation-project.jpeg
The Performance Poetry Preservation Project
Incidents

No Incident

https://images.rankiteo.com/companyimages/pace-theatre-company-limited.jpeg
PACE Theatre Company
Incidents

No Incident

FAQ

The Performance Poetry Preservation Project company demonstrates a stronger AI Cybersecurity Score compared to PACE Theatre Company company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Historically, PACE Theatre Company company has disclosed a higher number of cyber incidents compared to The Performance Poetry Preservation Project company.

In the current year, PACE Theatre Company company and The Performance Poetry Preservation Project company have not reported any cyber incidents.

Neither PACE Theatre Company company nor The Performance Poetry Preservation Project company has reported experiencing a ransomware attack publicly.

Neither PACE Theatre Company company nor The Performance Poetry Preservation Project company has reported experiencing a data breach publicly.

Neither PACE Theatre Company company nor The Performance Poetry Preservation Project company has reported experiencing targeted cyberattacks publicly.

Neither The Performance Poetry Preservation Project company nor PACE Theatre Company company has reported experiencing or disclosing vulnerabilities publicly.

Neither The Performance Poetry Preservation Project nor PACE Theatre Company holds any compliance certifications.

Neither company holds any compliance certifications.

PACE Theatre Company company has more subsidiaries worldwide compared to The Performance Poetry Preservation Project company.

PACE Theatre Company company employs more people globally than The Performance Poetry Preservation Project company, reflecting its scale as a Performing Arts.

Neither The Performance Poetry Preservation Project nor PACE Theatre Company holds SOC 2 Type 1 certification.

Neither The Performance Poetry Preservation Project nor PACE Theatre Company holds SOC 2 Type 2 certification.

Neither The Performance Poetry Preservation Project nor PACE Theatre Company holds ISO 27001 certification.

Neither The Performance Poetry Preservation Project nor PACE Theatre Company holds PCI DSS certification.

Neither The Performance Poetry Preservation Project nor PACE Theatre Company holds HIPAA certification.

Neither The Performance Poetry Preservation Project nor PACE Theatre Company holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

NXLog Agent before 6.11 can load a file specified by the OPENSSL_CONF environment variable.

Risk Information
cvss3
Base: 8.1
Severity: HIGH
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
Description

uriparser through 0.9.9 allows unbounded recursion and stack consumption, as demonstrated by ParseMustBeSegmentNzNc with large input containing many commas.

Risk Information
cvss3
Base: 2.9
Severity: HIGH
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
Description

A vulnerability was detected in Mayan EDMS up to 4.10.1. The affected element is an unknown function of the file /authentication/. The manipulation results in cross site scripting. The attack may be performed from remote. The exploit is now public and may be used. Upgrading to version 4.10.2 is sufficient to fix this issue. You should upgrade the affected component. The vendor confirms that this is "[f]ixed in version 4.10.2". Furthermore, that "[b]ackports for older versions in process and will be out as soon as their respective CI pipelines complete."

Risk Information
cvss2
Base: 5.0
Severity: LOW
AV:N/AC:L/Au:N/C:N/I:P/A:N
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

MJML through 4.18.0 allows mj-include directory traversal to test file existence and (in the type="css" case) read files. NOTE: this issue exists because of an incomplete fix for CVE-2020-12827.

Risk Information
cvss3
Base: 4.5
Severity: HIGH
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:L
Description

A half-blind Server Side Request Forgery (SSRF) vulnerability exists in kube-controller-manager when using the in-tree Portworx StorageClass. This vulnerability allows authorized users to leak arbitrary information from unprotected endpoints in the control plane’s host network (including link-local or loopback services).

Risk Information
cvss3
Base: 5.8
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N