Company Details
the-playwrights'-center
37
933
711
pwcenter.org
0
PLA_2239243
In-progress

Playwrights' Center Company CyberSecurity Posture
pwcenter.orgFounded in 1971 by five writers seeking artistic and professional support, the Playwrights' Center today serves more playwrights in more ways than any other organization in the country. One of the nation's most generous and well-respected theater organizations, the Playwrights' Center focuses on both supporting playwrights and promoting new plays to production at theaters across the country. The Center has helped launch the careers of numerous nationally recognized artists, notably August Wilson, Lee Blessing, Suzan-Lori Parks, Jordan Harrison, Carlyle Brown, Craig Lucas, Jeffrey Hatcher, Melanie Marnich, and Kira Obolensky. Work developed through Center programs has been seen nationwide on such stages as the Yale Rep, Woolly Mammoth, Guthrie, Goodman, and many others.
Company Details
the-playwrights'-center
37
933
711
pwcenter.org
0
PLA_2239243
In-progress
Between 750 and 799

Playwrights' Center Global Score (TPRM)XXXX



No incidents recorded for Playwrights' Center in 2025.
No incidents recorded for Playwrights' Center in 2025.
No incidents recorded for Playwrights' Center in 2025.
Playwrights' Center cyber incidents detection timeline including parent company and subsidiaries

Founded in 1971 by five writers seeking artistic and professional support, the Playwrights' Center today serves more playwrights in more ways than any other organization in the country. One of the nation's most generous and well-respected theater organizations, the Playwrights' Center focuses on both supporting playwrights and promoting new plays to production at theaters across the country. The Center has helped launch the careers of numerous nationally recognized artists, notably August Wilson, Lee Blessing, Suzan-Lori Parks, Jordan Harrison, Carlyle Brown, Craig Lucas, Jeffrey Hatcher, Melanie Marnich, and Kira Obolensky. Work developed through Center programs has been seen nationwide on such stages as the Yale Rep, Woolly Mammoth, Guthrie, Goodman, and many others.


Transforming the lives of youth and communities through collaboration and the performing arts! Our Mission: Yes! And... Collaborative Arts (YACA) is a youth-centered organization dedicated to amplifying voices, nurturing agency, and creating community through performing arts experiences. We believe

The Tuscaloosa Amphitheater sits beautifully on 15 acres amidst the banks of the Black Warrior River. Located only minutes away from the University of Alabama campus and blocks from the lively downtown district, the Amphitheater is the largest outdoor theater in West Alabama and a premier location f

Polka Theatre is one of the few venues in the UK which is dedicated to producing and presenting work for young audiences. Its two theatre spaces, the Main Theatre and the Adventure Theatre are designed especially for children so that their first taste of theatre is welcoming and relevant. At Polk

We create stories! Our commitment is to match creative talent with technical standards of the highest caliber to deliver compelling, innovative products for a global audience. We specialize in executive production services across genres, including feature films, shorts, documentaries, commercials

The Limelight Theatre is celebrating 30 years of providing St. Johns County with an ever-evolving destination for artistic expression. As we enter our 30th year of serving the residents and tourists of our area, we continue to look for opportunities to attract larger and more diverse audiences to ou

New Music School is the Premier school for music education in Chicago. NMS provides conservatory level training for students under the age of 18. Mentored and taught by Chicago Symphony Orchestra musicians, renowned collegiate professors, and other world-class faculty, our students are exposed to
.png)
2023 legislative session brings millions in funding to Saint Paul to support public safety, housing, community centers, and public...
Lorenzo Henriquez's play, “Every[Black]Man,” also received the Gary Garrison Regional Award for Playwriting and is one of 16 plays selected for consideration...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Playwrights' Center is http://www.pwcenter.org/.
According to Rankiteo, Playwrights' Center’s AI-generated cybersecurity score is 758, reflecting their Fair security posture.
According to Rankiteo, Playwrights' Center currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Playwrights' Center is not certified under SOC 2 Type 1.
According to Rankiteo, Playwrights' Center does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Playwrights' Center is not listed as GDPR compliant.
According to Rankiteo, Playwrights' Center does not currently maintain PCI DSS compliance.
According to Rankiteo, Playwrights' Center is not compliant with HIPAA regulations.
According to Rankiteo,Playwrights' Center is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Playwrights' Center operates primarily in the Performing Arts industry.
Playwrights' Center employs approximately 37 people worldwide.
Playwrights' Center presently has no subsidiaries across any sectors.
Playwrights' Center’s official LinkedIn profile has approximately 933 followers.
No, Playwrights' Center does not have a profile on Crunchbase.
Yes, Playwrights' Center maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/the-playwrights'-center.
As of December 16, 2025, Rankiteo reports that Playwrights' Center has not experienced any cybersecurity incidents.
Playwrights' Center has an estimated 2,702 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, Playwrights' Center has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
NXLog Agent before 6.11 can load a file specified by the OPENSSL_CONF environment variable.
uriparser through 0.9.9 allows unbounded recursion and stack consumption, as demonstrated by ParseMustBeSegmentNzNc with large input containing many commas.
A vulnerability was detected in Mayan EDMS up to 4.10.1. The affected element is an unknown function of the file /authentication/. The manipulation results in cross site scripting. The attack may be performed from remote. The exploit is now public and may be used. Upgrading to version 4.10.2 is sufficient to fix this issue. You should upgrade the affected component. The vendor confirms that this is "[f]ixed in version 4.10.2". Furthermore, that "[b]ackports for older versions in process and will be out as soon as their respective CI pipelines complete."
MJML through 4.18.0 allows mj-include directory traversal to test file existence and (in the type="css" case) read files. NOTE: this issue exists because of an incomplete fix for CVE-2020-12827.
A half-blind Server Side Request Forgery (SSRF) vulnerability exists in kube-controller-manager when using the in-tree Portworx StorageClass. This vulnerability allows authorized users to leak arbitrary information from unprotected endpoints in the control plane’s host network (including link-local or loopback services).

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.