Comparison Overview

The TJX Companies, Inc.

VS

Nordstrom

The TJX Companies, Inc.

770 Cochituate Road, Framingham, MA, 01701, US
Last Update: 2025-12-10
Between 800 and 849

TJX is the leading off-price apparel and home fashions retailer in the U.S. and worldwide, with four global home offices, seven brands, nearly 4,700 stores in nine countries, and five distinctive branded e-commerce sites. As Associates, we make a difference with our contributions—collaborating in delighting shoppers with hidden treasures.

NAICS: 43
NAICS Definition: Retail Trade
Employees: 49,448
Subsidiaries: 3
12-month incidents
0
Known data breaches
0
Attack type number
0

Nordstrom

1600 7th Ave, Seattle, Washington, US, 98101
Last Update: 2025-12-09
Between 750 and 799

At Nordstrom, we empower our employees to set their sights high and blaze their own trails. This is a place where your success and growth are truly a result of your own efforts and achievements. Our teams are made up of motivated people who work hard to become leaders within the company, at all levels of the organization. These well-traveled paths show how hard work, loyalty, a competitive spirit and your unwavering commitment to the customer can take you and your career to new places. In addition to being a great place to have a career, we’re also committed to respecting the environment and supporting our communities. To learn more, check out NordstromCares.com. Interested in joining the Nordstrom team? See some of our current opportunities under our Careers tab or visit careers.nordstrom.com to apply today.

NAICS: 43
NAICS Definition: Retail Trade
Employees: 46,897
Subsidiaries: 1
12-month incidents
0
Known data breaches
1
Attack type number
1

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/tjx.jpeg
The TJX Companies, Inc.
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/nordstrom.jpeg
Nordstrom
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
The TJX Companies, Inc.
100%
Compliance Rate
0/4 Standards Verified
Nordstrom
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Retail Industry Average (This Year)

No incidents recorded for The TJX Companies, Inc. in 2025.

Incidents vs Retail Industry Average (This Year)

No incidents recorded for Nordstrom in 2025.

Incident History — The TJX Companies, Inc. (X = Date, Y = Severity)

The TJX Companies, Inc. cyber incidents detection timeline including parent company and subsidiaries

Incident History — Nordstrom (X = Date, Y = Severity)

Nordstrom cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/tjx.jpeg
The TJX Companies, Inc.
Incidents

No Incident

https://images.rankiteo.com/companyimages/nordstrom.jpeg
Nordstrom
Incidents

Date Detected: 10/2018
Type:Breach
Attack Vector: Improper handling of employee data
Blog: Blog

FAQ

The TJX Companies, Inc. company demonstrates a stronger AI Cybersecurity Score compared to Nordstrom company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Nordstrom company has historically faced a number of disclosed cyber incidents, whereas The TJX Companies, Inc. company has not reported any.

In the current year, Nordstrom company and The TJX Companies, Inc. company have not reported any cyber incidents.

Neither Nordstrom company nor The TJX Companies, Inc. company has reported experiencing a ransomware attack publicly.

Nordstrom company has disclosed at least one data breach, while The TJX Companies, Inc. company has not reported such incidents publicly.

Neither Nordstrom company nor The TJX Companies, Inc. company has reported experiencing targeted cyberattacks publicly.

Neither The TJX Companies, Inc. company nor Nordstrom company has reported experiencing or disclosing vulnerabilities publicly.

Neither The TJX Companies, Inc. nor Nordstrom holds any compliance certifications.

Neither company holds any compliance certifications.

The TJX Companies, Inc. company has more subsidiaries worldwide compared to Nordstrom company.

The TJX Companies, Inc. company employs more people globally than Nordstrom company, reflecting its scale as a Retail.

Neither The TJX Companies, Inc. nor Nordstrom holds SOC 2 Type 1 certification.

Neither The TJX Companies, Inc. nor Nordstrom holds SOC 2 Type 2 certification.

Neither The TJX Companies, Inc. nor Nordstrom holds ISO 27001 certification.

Neither The TJX Companies, Inc. nor Nordstrom holds PCI DSS certification.

Neither The TJX Companies, Inc. nor Nordstrom holds HIPAA certification.

Neither The TJX Companies, Inc. nor Nordstrom holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

A weakness has been identified in itsourcecode Online Pet Shop Management System 1.0. This vulnerability affects unknown code of the file /pet1/addcnp.php. This manipulation of the argument cnpname causes sql injection. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in Tenda AX9 22.03.01.46. This affects the function image_check of the component httpd. The manipulation results in use of weak hash. It is possible to launch the attack remotely. A high complexity level is associated with this attack. It is indicated that the exploitability is difficult. The exploit has been released to the public and may be exploited.

Risk Information
cvss2
Base: 2.6
Severity: HIGH
AV:N/AC:H/Au:N/C:N/I:P/A:N
cvss3
Base: 3.7
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
cvss4
Base: 6.3
Severity: HIGH
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A weakness has been identified in code-projects Student File Management System 1.0. This issue affects some unknown processing of the file /admin/update_student.php. This manipulation of the argument stud_id causes sql injection. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in code-projects Student File Management System 1.0. This vulnerability affects unknown code of the file /admin/save_user.php. The manipulation of the argument firstname results in sql injection. The attack can be executed remotely. The exploit has been released to the public and may be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was identified in code-projects Student File Management System 1.0. This affects an unknown part of the file /admin/update_user.php. The manipulation of the argument user_id leads to sql injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X