Comparison Overview

West Australian Ballet

VS

Phoenix Artist Club

West Australian Ballet

134 Whatley Crescent, Maylands, WA, 6051, AU
Last Update: 2025-12-10
Between 750 and 799

In 1952, West Australian Ballet was established by Madame Kira Bousloff – the first professional ballet company formed in Australia that is still in existence today. Since its formation West Australian Ballet has developed an impressive reputation for superior classical and contemporary ballet, and contemporary dance of the highest level. Its repertoire continues to develop steadily; classical ballet forming the foundation, combined with a distinct contemporary outlook on the art form. West Australian Ballet stages everything from full length classical ballets, narrative ballets and shorter works, and encompasses a variety of choreographic styles. The Company is based in Perth and resides at the West Australian Ballet Centre in Maylands. At present the Company consists of 41 full-time dancers. West Australian Ballet offers an extensive program of dance throughout the year, with five major seasons in Perth, one at The Quarry Amphitheatre in City Beach, three at His Majesty’s Theatre, and one at the State Theatre Centre of WA. West Australian Ballet also offers choreographic workshops, adult dance classes, an extensive education program and regularly tours nationally and regionally throughout Western Australia. West Australian Ballet is the only dance company in the state that has an official partnership with its state symphony orchestra; the West Australian Symphony Orchestra. West Australian Ballet is led by Artistic Director Aurélien Scannella.

NAICS: 7111
NAICS Definition: Performing Arts Companies
Employees: 64
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Phoenix Artist Club

1 Phoenix Street, London, undefined, WC2H 8BU, GB
Last Update: 2025-12-13

The Phoenix Artist Club – ‘A hidden gem’ – secreted away down a little side street (used in the opening sequences of ‘Harry Potter’) and tucked beneath The Phoenix Theatre lies this charming escape from the London norm. As featured in many films and TV Productions, Travel Channel’s “The Layover” with Anthony Bourdain, written about by Rupert Everett in “Red Carpets and Other Banana Skins”, visited by Princess Michael of Kent, Kiefer Sutherland, Kiera Knightley, Jude Law, David Soul, John Hurt and Janice Dickinson to name but a few, inspiring screenwriters, authors and poets and refreshing worn out theatre staff from every London Theatre – you can perhaps understand why they want to keep us for themselves! We are the perfect antidote to corporate ‘all the same’ pubs. A private members club, open to the public and theatre goers for afternoon tea, group bookings or just somewhere to relax in old world charm. Also available for daytime events, rehearsals and auditions, we have a versatile space here that retains character whilst also providing all the necessary current technical equipment needed. As the theatre lights dim and stage doors close, everyone that’s anyone in The West End makes their way to ‘The Phoenix’ (sometimes called ‘Shuts’ because it never does!). You can join in the late night fun – simply produce your theatre ticket at the door – and if there’s room – you’re in!

NAICS: 711
NAICS Definition:
Employees: 3
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/west-australian-ballet-wab-.jpeg
West Australian Ballet
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/phoenix-artist-club.jpeg
Phoenix Artist Club
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
West Australian Ballet
100%
Compliance Rate
0/4 Standards Verified
Phoenix Artist Club
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Performing Arts Industry Average (This Year)

No incidents recorded for West Australian Ballet in 2025.

Incidents vs Performing Arts Industry Average (This Year)

No incidents recorded for Phoenix Artist Club in 2025.

Incident History — West Australian Ballet (X = Date, Y = Severity)

West Australian Ballet cyber incidents detection timeline including parent company and subsidiaries

Incident History — Phoenix Artist Club (X = Date, Y = Severity)

Phoenix Artist Club cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/west-australian-ballet-wab-.jpeg
West Australian Ballet
Incidents

No Incident

https://images.rankiteo.com/companyimages/phoenix-artist-club.jpeg
Phoenix Artist Club
Incidents

No Incident

FAQ

Both West Australian Ballet company and Phoenix Artist Club company demonstrate a comparable AI Cybersecurity Score, with strong governance and monitoring frameworks in place.

Historically, Phoenix Artist Club company has disclosed a higher number of cyber incidents compared to West Australian Ballet company.

In the current year, Phoenix Artist Club company and West Australian Ballet company have not reported any cyber incidents.

Neither Phoenix Artist Club company nor West Australian Ballet company has reported experiencing a ransomware attack publicly.

Neither Phoenix Artist Club company nor West Australian Ballet company has reported experiencing a data breach publicly.

Neither Phoenix Artist Club company nor West Australian Ballet company has reported experiencing targeted cyberattacks publicly.

Neither West Australian Ballet company nor Phoenix Artist Club company has reported experiencing or disclosing vulnerabilities publicly.

Neither West Australian Ballet nor Phoenix Artist Club holds any compliance certifications.

Neither company holds any compliance certifications.

Neither West Australian Ballet company nor Phoenix Artist Club company has publicly disclosed detailed information about the number of their subsidiaries.

West Australian Ballet company employs more people globally than Phoenix Artist Club company, reflecting its scale as a Performing Arts.

Neither West Australian Ballet nor Phoenix Artist Club holds SOC 2 Type 1 certification.

Neither West Australian Ballet nor Phoenix Artist Club holds SOC 2 Type 2 certification.

Neither West Australian Ballet nor Phoenix Artist Club holds ISO 27001 certification.

Neither West Australian Ballet nor Phoenix Artist Club holds PCI DSS certification.

Neither West Australian Ballet nor Phoenix Artist Club holds HIPAA certification.

Neither West Australian Ballet nor Phoenix Artist Club holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

A weakness has been identified in itsourcecode Online Pet Shop Management System 1.0. This vulnerability affects unknown code of the file /pet1/addcnp.php. This manipulation of the argument cnpname causes sql injection. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in Tenda AX9 22.03.01.46. This affects the function image_check of the component httpd. The manipulation results in use of weak hash. It is possible to launch the attack remotely. A high complexity level is associated with this attack. It is indicated that the exploitability is difficult. The exploit has been released to the public and may be exploited.

Risk Information
cvss2
Base: 2.6
Severity: HIGH
AV:N/AC:H/Au:N/C:N/I:P/A:N
cvss3
Base: 3.7
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
cvss4
Base: 6.3
Severity: HIGH
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A weakness has been identified in code-projects Student File Management System 1.0. This issue affects some unknown processing of the file /admin/update_student.php. This manipulation of the argument stud_id causes sql injection. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in code-projects Student File Management System 1.0. This vulnerability affects unknown code of the file /admin/save_user.php. The manipulation of the argument firstname results in sql injection. The attack can be executed remotely. The exploit has been released to the public and may be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was identified in code-projects Student File Management System 1.0. This affects an unknown part of the file /admin/update_user.php. The manipulation of the argument user_id leads to sql injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X