Comparison Overview

The Riverside Theatre

VS

Red Bull Theater

The Riverside Theatre

None
Last Update: 2025-12-12

The Riverside Theatre was founded in 1960 on the belief that the arts can be a transforming power in peoples’ lives and is committed to serving as a catalyst for cultural connections and social change. The Riverside Theatre, located at the historic Riverside Church, produces work that promotes and deepens cultural and social awareness. Highlights from the past ten seasons have included: the Katherine Dunham Tribute in honor of her 96th birthday; the Clark Terry Tribute hosted by the late Ossie Davis, with special guests Bill Cosby, Arturo Sandoval, Dianne Reeves, Nicholas Payton and Jon Faddis; the screening of The Rise & Fall of Jim Crow, in collaboration with Thirteen WNET; and the critically acclaimed play Through the Night starring Daniel Beaty. The Theatre’s programming includes: • The New York Family Arts Festival, month-long intercultural performances, workshops, films and crafts designed for the family. • Cultural Animators Series, which presents performance art as a means to reach out into the community and address social issues and concerns. • NuDance Festival is a showcase of the next generation of emerging choreographers. • Youth Theatre Program is a program that instructs young, from ages eight to eighteen. • The African Diaspora Summer Film Series expand the traditional views and perceptions of the Black experience by showcasing films depicting the richness and diversity of the global Black experience.

NAICS: 7111
NAICS Definition: Performing Arts Companies
Employees: 6
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Red Bull Theater

191 Seventh Avenue, Suite 2S, New York, NY 10011, US
Last Update: 2025-12-11
Between 750 and 799

Red Bull Theater is dedicated to the presentation of vital and imaginative productions of heightened language plays and to the development of new plays written in a similar vein. With the Jacobean plays of Shakespeare and his contemporaries as its cornerstone, Red Bull Theater engages the intellect and imagination of today's theatergoers through intimate and evocative stagings of great classic stories. Red Bull Theater takes its name from one of the leading theaters in London during Shakespeare's era, built around 1600. The original Red Bull was often raided by the authorities for performing "drolls"​ when it was illegal to perform plays, and it was the first of the English theaters to reopen after the years of Puritan rule during which plays were banned. Embracing this rejuvenating spirit, Red Bull Theater aims to be in the vanguard of a new classical theater for the new century, creating a home for plays of heightened language and epic expression in intimate, imaginative productions. Shakespeare wrote over half his plays under the rule of King James. Some thirty other major playwrights also flourished during this time, producing hundreds of plays. Compared to the kind of writing for the theater that had been common during Queen Elizabeth's reign, the Jacobean plays differ markedly in their subject matter, language, and style. Red Bull Theater embraces these plays as the cornerstone of its work, aiming to explore plays of a vigorously heightened language, new and old, from many different periods and cultures.

NAICS: 711
NAICS Definition:
Employees: 18
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/the-riverside-theatre.jpeg
The Riverside Theatre
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/red-bull-theater.jpeg
Red Bull Theater
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
The Riverside Theatre
100%
Compliance Rate
0/4 Standards Verified
Red Bull Theater
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Performing Arts Industry Average (This Year)

No incidents recorded for The Riverside Theatre in 2025.

Incidents vs Performing Arts Industry Average (This Year)

No incidents recorded for Red Bull Theater in 2025.

Incident History — The Riverside Theatre (X = Date, Y = Severity)

The Riverside Theatre cyber incidents detection timeline including parent company and subsidiaries

Incident History — Red Bull Theater (X = Date, Y = Severity)

Red Bull Theater cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/the-riverside-theatre.jpeg
The Riverside Theatre
Incidents

No Incident

https://images.rankiteo.com/companyimages/red-bull-theater.jpeg
Red Bull Theater
Incidents

No Incident

FAQ

The Riverside Theatre company demonstrates a stronger AI Cybersecurity Score compared to Red Bull Theater company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Historically, Red Bull Theater company has disclosed a higher number of cyber incidents compared to The Riverside Theatre company.

In the current year, Red Bull Theater company and The Riverside Theatre company have not reported any cyber incidents.

Neither Red Bull Theater company nor The Riverside Theatre company has reported experiencing a ransomware attack publicly.

Neither Red Bull Theater company nor The Riverside Theatre company has reported experiencing a data breach publicly.

Neither Red Bull Theater company nor The Riverside Theatre company has reported experiencing targeted cyberattacks publicly.

Neither The Riverside Theatre company nor Red Bull Theater company has reported experiencing or disclosing vulnerabilities publicly.

Neither The Riverside Theatre nor Red Bull Theater holds any compliance certifications.

Neither company holds any compliance certifications.

Neither The Riverside Theatre company nor Red Bull Theater company has publicly disclosed detailed information about the number of their subsidiaries.

Red Bull Theater company employs more people globally than The Riverside Theatre company, reflecting its scale as a Performing Arts.

Neither The Riverside Theatre nor Red Bull Theater holds SOC 2 Type 1 certification.

Neither The Riverside Theatre nor Red Bull Theater holds SOC 2 Type 2 certification.

Neither The Riverside Theatre nor Red Bull Theater holds ISO 27001 certification.

Neither The Riverside Theatre nor Red Bull Theater holds PCI DSS certification.

Neither The Riverside Theatre nor Red Bull Theater holds HIPAA certification.

Neither The Riverside Theatre nor Red Bull Theater holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

A weakness has been identified in itsourcecode Online Pet Shop Management System 1.0. This vulnerability affects unknown code of the file /pet1/addcnp.php. This manipulation of the argument cnpname causes sql injection. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in Tenda AX9 22.03.01.46. This affects the function image_check of the component httpd. The manipulation results in use of weak hash. It is possible to launch the attack remotely. A high complexity level is associated with this attack. It is indicated that the exploitability is difficult. The exploit has been released to the public and may be exploited.

Risk Information
cvss2
Base: 2.6
Severity: HIGH
AV:N/AC:H/Au:N/C:N/I:P/A:N
cvss3
Base: 3.7
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
cvss4
Base: 6.3
Severity: HIGH
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A weakness has been identified in code-projects Student File Management System 1.0. This issue affects some unknown processing of the file /admin/update_student.php. This manipulation of the argument stud_id causes sql injection. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in code-projects Student File Management System 1.0. This vulnerability affects unknown code of the file /admin/save_user.php. The manipulation of the argument firstname results in sql injection. The attack can be executed remotely. The exploit has been released to the public and may be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was identified in code-projects Student File Management System 1.0. This affects an unknown part of the file /admin/update_user.php. The manipulation of the argument user_id leads to sql injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X