Company Details
the-room
14
0
7111
thisistheroom.com
0
THE_4996371
In-progress

The Room Company CyberSecurity Posture
thisistheroom.comPOSTED RULES 1. In The Room things are being made. 2. In The Room the people making these things may have different skills and strengths but are always bonded by their curiosity, enthusiasm and humour. 3. In The Room “things” can mean any number of things (plays, songs, movies, dances, pictures, something we haven’t thought of yet…) in any number of combinations. 4. In The Room no one can say for sure what these things will be until they are done, because making things is a kind of magic, and magic can’t always be controlled. 5. In The Room once these things are “done” (and occasionally when they aren’t) they are shared in exciting and affordable ways with as many people as possible. 6. In The Room things can be challenging and entertaining – both for the people making them and for the people sharing in them after they are made. 7. In The Room the doors and windows are open, and there are often refreshments.
Company Details
the-room
14
0
7111
thisistheroom.com
0
THE_4996371
In-progress
Between 800 and 849

The Room Global Score (TPRM)XXXX



No incidents recorded for The Room in 2025.
No incidents recorded for The Room in 2025.
No incidents recorded for The Room in 2025.
The Room cyber incidents detection timeline including parent company and subsidiaries

POSTED RULES 1. In The Room things are being made. 2. In The Room the people making these things may have different skills and strengths but are always bonded by their curiosity, enthusiasm and humour. 3. In The Room “things” can mean any number of things (plays, songs, movies, dances, pictures, something we haven’t thought of yet…) in any number of combinations. 4. In The Room no one can say for sure what these things will be until they are done, because making things is a kind of magic, and magic can’t always be controlled. 5. In The Room once these things are “done” (and occasionally when they aren’t) they are shared in exciting and affordable ways with as many people as possible. 6. In The Room things can be challenging and entertaining – both for the people making them and for the people sharing in them after they are made. 7. In The Room the doors and windows are open, and there are often refreshments.


Building on a century of tradition, the Mountain Play Association produces enriching theatrical experiences that stimulate creativity, engage our community, and foster a lifelong enjoyment of the performing arts. Our pinnacle event is a spectacular, outdoor production that also nurtures an appreciat

Theatre Forward is an association of institutional nonprofit theatres located in 19 cities across the country. Theatre Forward’s mission is to advance theatre and its communities. We achieve our mission by providing funding and other resources to the country’s leading nonprofit theatres. Theatre Fo

Ruth Eckerd Hall is a 501(c)(3) nonprofit organization nationally recognized Performing Arts Organization. Ruth Eckerd Hall offers traditional and innovative performances and educational experiences that will engage diverse audiences and participants, in order to advance the arts and enrich lives an

Located in the central Southern Tier of New York State, the Clemens Center is the region's premier performing arts center and has been both a historical and cultural staple in Downtown Elmira since 1925. Home to the majestic Powers Theater, an architectural treasure that has been restored to its vau

Oakland Ballet Company is a non-profit, performing arts organization that reflects the diversity of Oakland and the greater East Bay. The mission of the Oakland Ballet Company is to provide accessible, relevant, and exciting dance that inspires and educates all ages of our diverse community. Under
Studio Wayne McGregor is the creative engine of multi award-winning choreographer and director Wayne McGregor’s life-long enquiry into thinking through and with the body. It encompasses his own touring company of dancers, Company Wayne McGregor; creative collaborations across dance, film, music, vis
.png)
Rep. Nick Langworthy and St. Bonaventure President Jeff Gingerich cut through a computer cable to launch the universitys new Cyber...
Escape Room Experience at the 2025 MISA Ontario InfoSec Conference and Trade Show “Local governments sit at the front lines of defending...
Contact Semperis · Semperis's documentary explores increasing cyber conflicts, featuring former intelligence leaders and cybersecurity experts.
Midnight in the War Room gives cybersecurity the cinematic treatment it's long deserved without losing the grit that makes the work authentic.
ROOM Issue 37: Cybersecurity, Cosmic Weather and Europa's Secrets ... The Autumn 2025 issue of ROOM Space Journal of Asgardia has just been...
"Her vision has kept the institution ahead of cyber threats, safeguarding data through teamwork, best practices and innovation," says...
Unauthorised modification (tampering) of this data before or during AI processing can lead to flawed analyses, incorrect decisions and even catastrophic mission...
Takeaways on Cybersecurity Incident Response: · Build a proactive, dynamic response framework · Rehearse under realistic conditions, not just...
Advertise With Us ... Data is a real-time snapshot *Data is delayed at least 15 minutes. Global Business and Financial News, Stock Quotes, and...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of The Room is http://thisistheroom.com.
According to Rankiteo, The Room’s AI-generated cybersecurity score is 811, reflecting their Good security posture.
According to Rankiteo, The Room currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, The Room is not certified under SOC 2 Type 1.
According to Rankiteo, The Room does not hold a SOC 2 Type 2 certification.
According to Rankiteo, The Room is not listed as GDPR compliant.
According to Rankiteo, The Room does not currently maintain PCI DSS compliance.
According to Rankiteo, The Room is not compliant with HIPAA regulations.
According to Rankiteo,The Room is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
The Room operates primarily in the Performing Arts industry.
The Room employs approximately 14 people worldwide.
The Room presently has no subsidiaries across any sectors.
The Room’s official LinkedIn profile has approximately 0 followers.
The Room is classified under the NAICS code 7111, which corresponds to Performing Arts Companies.
No, The Room does not have a profile on Crunchbase.
Yes, The Room maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/the-room.
As of December 14, 2025, Rankiteo reports that The Room has not experienced any cybersecurity incidents.
The Room has an estimated 2,700 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, The Room has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
A weakness has been identified in itsourcecode Online Pet Shop Management System 1.0. This vulnerability affects unknown code of the file /pet1/addcnp.php. This manipulation of the argument cnpname causes sql injection. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited.
A security flaw has been discovered in Tenda AX9 22.03.01.46. This affects the function image_check of the component httpd. The manipulation results in use of weak hash. It is possible to launch the attack remotely. A high complexity level is associated with this attack. It is indicated that the exploitability is difficult. The exploit has been released to the public and may be exploited.
A weakness has been identified in code-projects Student File Management System 1.0. This issue affects some unknown processing of the file /admin/update_student.php. This manipulation of the argument stud_id causes sql injection. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be exploited.
A security flaw has been discovered in code-projects Student File Management System 1.0. This vulnerability affects unknown code of the file /admin/save_user.php. The manipulation of the argument firstname results in sql injection. The attack can be executed remotely. The exploit has been released to the public and may be exploited.
A vulnerability was identified in code-projects Student File Management System 1.0. This affects an unknown part of the file /admin/update_user.php. The manipulation of the argument user_id leads to sql injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.