Comparison Overview

YIVO Institute for Jewish Research

VS

Military Aviation Museum

YIVO Institute for Jewish Research

15 West 16th Street, New York, NY 10011, US
Last Update: 2025-12-02
Between 750 and 799

The YIVO Institute for Jewish Research is the leading academic center for East European and Russian Jewish Studies, specializing in Yiddish language, literature, and folklore; the Holocaust; and the American Jewish experience. YIVO preserves, studies, shares, and perpetuates knowledge of the history and culture of East European Jewry to advance scholarship, to strengthen community and lay a foundation of self-knowledge and pride for future generations. Founded in 1925 with support from leading intellectuals and scholars like Albert Einstein and Sigmund Freud, YIVO was based in Wilno (now Vilna) until forced by WWII to relocate to New York. YIVO is the only prewar Jewish archives and library to survive the Holocaust. YIVO’s archives and library represent the largest and most comprehensive collection of materials on East European Jewish civilization, and receives upwards of 5,000 on-site visits and requests annually. The YIVO archives’ ~23 million items include sound and music collections, theater and art collections, communal and personal records, photographs and films, manuscripts, diaries, memoirs, and correspondence. YIVO’s library has nearly 400,000 volumes in all European languages, and contains the largest collection of Yiddish-language books, pamphlets, and newspapers. YIVO’s Uriel Weinreich Program in Yiddish Language, Literature, and Culture, was established in 1968 and is the oldest intensive Yiddish language-learning program. YIVO’s rules for transliteration of Yiddish into English are the standard used by most publishers and academics. YIVO offers adult education and Yiddish language programs, research opportunities, and scholarly publications, including YIVO’s Encyclopedia of Jews in Eastern Europe, one of the world’s most comprehensive and free online encyclopedia. YIVO offers lectures, conferences, concerts, theatrical performances, film screenings, and exhibitions, featuring award-winning scholars, writers, performers, artists, and more.

NAICS: 712
NAICS Definition:
Employees: 53
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Military Aviation Museum

1341 Princess Anne Road, Virginia Beach, Virginia, 23457, US
Last Update: 2025-12-01

The Military Aviation Museum is home to one of the largest flying collections of World War I and World War II era military aircraft in the world. The Museum and its incredible assemblage have their roots in a private collection begun by Gerald and Elaine Yagen of Virginia Beach, VA. First opened to the public in 2008, the Museum continues to fly and operate some of the rarest and most important historical military aircraft in the world. With 130 acres of land and almost 5,000 feet of turf runway with adjacent viewing areas, the Museum campus is purposely designed for the operation of vintage military aircraft and the viewing and enjoyment of those aircraft by members of the public. Several structures were transported from the front lines and reassembled on the museum grounds. The Goxhill Watch Tower and Cottbus Hangar are two incredible examples of WWII buildings that truly were there as world events took place. Getting closer than you ever have to stunning restored aircraft from the WWII years is at the core of the Museum experience and is enabled by hundreds of committed, knowledgeable volunteers. A skilled team of mechanics employed at the Fighter Factory, the Museum’s on-field maintenance facility, maintain the aircraft in airworthy condition, and our dedicated volunteer pilots give their time generously to conduct demonstration flights with the aircraft. While WWII is at the heart of our collection, the Museum is also home to Korean War-era aircraft like our AD Skyraider and to an impressive collection of WW1-era Replicas and Originals. Each time one of these airplanes takes to the skies it is helping us fulfill a commitment we all share; to remember what price was paid for our freedom and to learn from the lessons of the WWII years.

NAICS: 712
NAICS Definition:
Employees: 25
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/yivo-institute-for-jewish-research.jpeg
YIVO Institute for Jewish Research
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/military-aviation-museum.jpeg
Military Aviation Museum
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
YIVO Institute for Jewish Research
100%
Compliance Rate
0/4 Standards Verified
Military Aviation Museum
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Museums, Historical Sites, and Zoos Industry Average (This Year)

No incidents recorded for YIVO Institute for Jewish Research in 2025.

Incidents vs Museums, Historical Sites, and Zoos Industry Average (This Year)

No incidents recorded for Military Aviation Museum in 2025.

Incident History — YIVO Institute for Jewish Research (X = Date, Y = Severity)

YIVO Institute for Jewish Research cyber incidents detection timeline including parent company and subsidiaries

Incident History — Military Aviation Museum (X = Date, Y = Severity)

Military Aviation Museum cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/yivo-institute-for-jewish-research.jpeg
YIVO Institute for Jewish Research
Incidents

No Incident

https://images.rankiteo.com/companyimages/military-aviation-museum.jpeg
Military Aviation Museum
Incidents

No Incident

FAQ

YIVO Institute for Jewish Research company demonstrates a stronger AI Cybersecurity Score compared to Military Aviation Museum company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Historically, Military Aviation Museum company has disclosed a higher number of cyber incidents compared to YIVO Institute for Jewish Research company.

In the current year, Military Aviation Museum company and YIVO Institute for Jewish Research company have not reported any cyber incidents.

Neither Military Aviation Museum company nor YIVO Institute for Jewish Research company has reported experiencing a ransomware attack publicly.

Neither Military Aviation Museum company nor YIVO Institute for Jewish Research company has reported experiencing a data breach publicly.

Neither Military Aviation Museum company nor YIVO Institute for Jewish Research company has reported experiencing targeted cyberattacks publicly.

Neither YIVO Institute for Jewish Research company nor Military Aviation Museum company has reported experiencing or disclosing vulnerabilities publicly.

Neither YIVO Institute for Jewish Research nor Military Aviation Museum holds any compliance certifications.

Neither company holds any compliance certifications.

Neither YIVO Institute for Jewish Research company nor Military Aviation Museum company has publicly disclosed detailed information about the number of their subsidiaries.

YIVO Institute for Jewish Research company employs more people globally than Military Aviation Museum company, reflecting its scale as a Museums, Historical Sites, and Zoos.

Neither YIVO Institute for Jewish Research nor Military Aviation Museum holds SOC 2 Type 1 certification.

Neither YIVO Institute for Jewish Research nor Military Aviation Museum holds SOC 2 Type 2 certification.

Neither YIVO Institute for Jewish Research nor Military Aviation Museum holds ISO 27001 certification.

Neither YIVO Institute for Jewish Research nor Military Aviation Museum holds PCI DSS certification.

Neither YIVO Institute for Jewish Research nor Military Aviation Museum holds HIPAA certification.

Neither YIVO Institute for Jewish Research nor Military Aviation Museum holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to 7.1.2-9 and 6.9.13-34, there is a vulnerability in ImageMagick’s Magick++ layer that manifests when Options::fontFamily is invoked with an empty string. Clearing a font family calls RelinquishMagickMemory on _drawInfo->font, freeing the font string but leaving _drawInfo->font pointing to freed memory while _drawInfo->family is set to that (now-invalid) pointer. Any later cleanup or reuse of _drawInfo->font re-frees or dereferences dangling memory. DestroyDrawInfo and other setters (Options::font, Image::font) assume _drawInfo->font remains valid, so destruction or subsequent updates trigger crashes or heap corruption. This vulnerability is fixed in 7.1.2-9 and 6.9.13-34.

Risk Information
cvss3
Base: 4.9
Severity: HIGH
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
Description

FeehiCMS version 2.1.1 has a Remote Code Execution via Unrestricted File Upload in Ad Management. FeehiCMS version 2.1.1 allows authenticated remote attackers to upload files that the server later executes (or stores in an executable location) without sufficient validation, sanitization, or execution restrictions. An authenticated remote attacker can upload a crafted PHP file and cause the application or web server to execute it, resulting in remote code execution (RCE).

Risk Information
cvss3
Base: 6.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Description

PHPGurukul Billing System 1.0 is vulnerable to SQL Injection in the admin/index.php endpoint. Specifically, the username parameter accepts unvalidated user input, which is then concatenated directly into a backend SQL query.

Risk Information
cvss3
Base: 6.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Description

NMIS/BioDose software V22.02 and previous versions contain executable binaries with plain text hard-coded passwords. These hard-coded passwords could allow unauthorized access to both the application and database.

Risk Information
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L
cvss4
Base: 8.4
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

NMIS/BioDose V22.02 and previous versions' installation directory paths by default have insecure file permissions, which in certain deployment scenarios can enable users on client workstations to modify the program executables and libraries.

Risk Information
cvss3
Base: 8.0
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H
cvss4
Base: 7.1
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X