Company Details
usherin
None employees
16
7111
usher-in.com
0
USH_9065855
In-progress

UsherIN Company CyberSecurity Posture
usher-in.comUsherIN is a web and mobile platform connecting the performing arts and their audience. We seek to offer an affordable solution for arts organizations to join the digital landscape while providing audiences with a dynamic and customized patron experience. Our mission is to streamline the "show-going" experience into one easy to use web and mobile platform. UsherIN supports audiences in discovering events based on their location as well as tailoring events & organizations to their preferences. Allowing audiences the ability to purchase tickets, pre-order concessions, restaurant and transportation recommendations as well as view interactive show programs and curated customized digital content before, during and after the curtain has come down. As a networking tool, UsherIN offers audiences the ability to “follow” their favorite organizations and artists, allowing performing arts organizations the ability to directly and consistently connect with their target market. Through seamless integration with our database, we aim to make it easier for organizations to fulfill marketing, production, and administrative initiatives, in addition to directly connecting with artists in the industry. Our hope is to unite our arts community nationally through interactive technology.
Company Details
usherin
None employees
16
7111
usher-in.com
0
USH_9065855
In-progress
Between 750 and 799

UsherIN Global Score (TPRM)XXXX



No incidents recorded for UsherIN in 2025.
No incidents recorded for UsherIN in 2025.
No incidents recorded for UsherIN in 2025.
UsherIN cyber incidents detection timeline including parent company and subsidiaries

UsherIN is a web and mobile platform connecting the performing arts and their audience. We seek to offer an affordable solution for arts organizations to join the digital landscape while providing audiences with a dynamic and customized patron experience. Our mission is to streamline the "show-going" experience into one easy to use web and mobile platform. UsherIN supports audiences in discovering events based on their location as well as tailoring events & organizations to their preferences. Allowing audiences the ability to purchase tickets, pre-order concessions, restaurant and transportation recommendations as well as view interactive show programs and curated customized digital content before, during and after the curtain has come down. As a networking tool, UsherIN offers audiences the ability to “follow” their favorite organizations and artists, allowing performing arts organizations the ability to directly and consistently connect with their target market. Through seamless integration with our database, we aim to make it easier for organizations to fulfill marketing, production, and administrative initiatives, in addition to directly connecting with artists in the industry. Our hope is to unite our arts community nationally through interactive technology.


Originally formed as a non-profit organization in 1983, Santa Barbara Center for the Performing Arts reinvigorated in 1997 with the vision of creating a world class performing arts center to serve Santa Barbara and the region. We started by renovating one of the city's historic downtown theatres, Th

Carmen has been working with some of the most affluent showchoirs in the country to develop the best scoring system in the world. Our system consists of detailed categories developed after years of study and consultation with the top showchoir judges in America. Our research revealed the need for e

Baryshnikov Arts Center is the realization of a long-held vision by artistic director Mikhail Baryshnikov who sought to build an arts center in Manhattan that would serve as a gathering place for artists from all disciplines. Baryshnikov Arts Center's opening in 2005 heralded the launch of this miss

We work with 15–25 year olds, co-creating projects that put young voices in charge. Whether it’s taking part or leading the way, we back young people to shape the future of the arts - and beyond. We’re rooted in Croydon and support young creatives across the UK. Whether it’s a project round the co

Overture Center for the Arts is a stunning architectural landmark in the heart of Madison’s thriving cultural arts district. In addition to housing nine resident organizations and presenting more than 200 performances, art exhibitions, and educational and community events each year, Overture offers

The Arts Unite Foundation exists to create unity and improve quality of life throughout the world through cultural exchanges and education in and exposure to the arts. The Arts Unite Foundation was started as a way to provide music education to individuals and schools that couldn’t afford the instr
.png)
India's Digital Personal Data Protection Act (DPDP) is no longer an impending reform but an unfolding reality—and enterprises are only...
Artificial intelligence helps state and local agencies deliver always-on citizen service, streamline operations and generate ROI.
The Pre-Crime Paradox: AI-Powered Security Systems Usher in a 'Minority Report' Era.
New Delhi: President Droupadi Murmu on Tuesday conveyed warm 'Rosh Hashanah' greetings to her Israeli counterpart, Isaac Herzog,...
Fleet (fleetdm.com), the open device management company, today announced it has raised $27M in Series B funding, bringing its total funding...
Zero Networks, the cybersecurity company reclaiming microsegmentation to finally deliver on its promise, today announced it raised $55 million in Series C...
SailPoint research has revealed that 96% of tech professionals see AI agents as growing security threats but 98% plan to expand their use of...
Rapid7's Chrstiaan Beek has written proof-of-concept code for ransomware that can attack your CPU, and warns of future threats that could lock your drive until...
As the cloud services authorization program readies for a revamp geared toward the private sector, commercial AI providers are in...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of UsherIN is http://www.usher-in.com.
According to Rankiteo, UsherIN’s AI-generated cybersecurity score is 762, reflecting their Fair security posture.
According to Rankiteo, UsherIN currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, UsherIN is not certified under SOC 2 Type 1.
According to Rankiteo, UsherIN does not hold a SOC 2 Type 2 certification.
According to Rankiteo, UsherIN is not listed as GDPR compliant.
According to Rankiteo, UsherIN does not currently maintain PCI DSS compliance.
According to Rankiteo, UsherIN is not compliant with HIPAA regulations.
According to Rankiteo,UsherIN is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
UsherIN operates primarily in the Performing Arts industry.
UsherIN employs approximately None employees people worldwide.
UsherIN presently has no subsidiaries across any sectors.
UsherIN’s official LinkedIn profile has approximately 16 followers.
UsherIN is classified under the NAICS code 7111, which corresponds to Performing Arts Companies.
No, UsherIN does not have a profile on Crunchbase.
Yes, UsherIN maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/usherin.
As of December 14, 2025, Rankiteo reports that UsherIN has not experienced any cybersecurity incidents.
UsherIN has an estimated 2,700 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, UsherIN has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
A weakness has been identified in itsourcecode Online Pet Shop Management System 1.0. This vulnerability affects unknown code of the file /pet1/addcnp.php. This manipulation of the argument cnpname causes sql injection. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited.
A security flaw has been discovered in Tenda AX9 22.03.01.46. This affects the function image_check of the component httpd. The manipulation results in use of weak hash. It is possible to launch the attack remotely. A high complexity level is associated with this attack. It is indicated that the exploitability is difficult. The exploit has been released to the public and may be exploited.
A weakness has been identified in code-projects Student File Management System 1.0. This issue affects some unknown processing of the file /admin/update_student.php. This manipulation of the argument stud_id causes sql injection. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be exploited.
A security flaw has been discovered in code-projects Student File Management System 1.0. This vulnerability affects unknown code of the file /admin/save_user.php. The manipulation of the argument firstname results in sql injection. The attack can be executed remotely. The exploit has been released to the public and may be exploited.
A vulnerability was identified in code-projects Student File Management System 1.0. This affects an unknown part of the file /admin/update_user.php. The manipulation of the argument user_id leads to sql injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.