Comparison Overview

AT&T

VS

Rogers Communications

AT&T

208 S. Akard Street, Dallas, 75202, US
Last Update: 2026-04-02
Between 0 and 549

We understand that our customers want an easier, less complicated life. We’re using our network, labs, products, services, and people to create a world where everything works together seamlessly, and life is better as a result. How will we continue to drive for this excellence in innovation? With you. Our people, and their passion to succeed, are at the heart of what we do. Today, we’re poised to connect millions of people with their world, delivering the human benefits of technology in ways that defy the imaginable. What are you dreaming of doing with your career? Find stories about our talent, career advice, opportunities, company news, and innovations here on LinkedIn. To learn more about joining AT&T, visit: http://www.att.jobs We provide in some of our posts links to articles or posts from third-party websites unaffiliated with AT&T. In doing so, AT&T is not adopting, endorsing or otherwise approving the content of those articles or posts. AT&T is providing this content for your information only.

NAICS: 517
NAICS Definition: Telecommunications
Employees: 178,894
Subsidiaries: 6
12-month incidents
3
Known data breaches
22
Attack type number
3

Rogers Communications

333 Bloor Street East, Toronto, Ontario, CA, M4W 1G9
Last Update: 2026-04-01
Between 600 and 649

Rogers is Canada’s communications and entertainment company, driven to connect and entertain Canadians. For more information, please visit rogers.com or investors.rogers.com. Déterminée à connecter et à divertir les Canadiens et Canadiennes, Rogers est la référence canadienne en matière de communications et de divertissement. Pour en savoir plus, visitez rogers.com ou investisseurs.rogers.com. This LinkedIn company page is moderated. For more info, please review our commenting policy here: http://roge.rs/2ofPXLN

NAICS: 517
NAICS Definition: Telecommunications
Employees: 28,375
Subsidiaries: 9
12-month incidents
2
Known data breaches
1
Attack type number
2

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/att.jpeg
AT&T
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/rogers-communications.jpeg
Rogers Communications
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
AT&T
100%
Compliance Rate
0/4 Standards Verified
Rogers Communications
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Telecommunications Industry Average (This Year)

AT&T has 66.67% more incidents than the average of same-industry companies with at least one recorded incident.

Incidents vs Telecommunications Industry Average (This Year)

Rogers Communications has 11.11% more incidents than the average of same-industry companies with at least one recorded incident.

Incident History — AT&T (X = Date, Y = Severity)

AT&T cyber incidents detection timeline including parent company and subsidiaries

Incident History — Rogers Communications (X = Date, Y = Severity)

Rogers Communications cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/att.jpeg
AT&T
Incidents

Date Detected: 3/2026
Type:Breach
Blog: Blog

Date Detected: 2/2026
Type:Cyber Attack
Attack Vector: Supply-chain infiltration via ISP compromise
Motivation: Espionage
Blog: Blog

Date Detected: 2/2026
Type:Breach
Motivation: Financial Gain (Identity Theft/Fraud)
Blog: Blog
https://images.rankiteo.com/companyimages/rogers-communications.jpeg
Rogers Communications
Incidents

Date Detected: 3/2026
Type:Breach
Blog: Blog

Date Detected: 1/2026
Type:Ransomware
Motivation: Financial gain, Data theft
Blog: Blog

FAQ

Rogers Communications company demonstrates a stronger AI Cybersecurity Score compared to AT&T company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

AT&T company has faced a higher number of disclosed cyber incidents historically compared to Rogers Communications company.

In the current year, AT&T company has reported more cyber incidents than Rogers Communications company.

Both Rogers Communications company and AT&T company have confirmed experiencing at least one ransomware attack.

Both Rogers Communications company and AT&T company have disclosed experiencing at least one data breach.

AT&T company has reported targeted cyberattacks, while Rogers Communications company has not reported such incidents publicly.

Neither AT&T company nor Rogers Communications company has reported experiencing or disclosing vulnerabilities publicly.

Neither AT&T nor Rogers Communications holds any compliance certifications.

Neither company holds any compliance certifications.

Rogers Communications company has more subsidiaries worldwide compared to AT&T company.

AT&T company employs more people globally than Rogers Communications company, reflecting its scale as a Telecommunications.

Neither AT&T nor Rogers Communications holds SOC 2 Type 1 certification.

Neither AT&T nor Rogers Communications holds SOC 2 Type 2 certification.

Neither AT&T nor Rogers Communications holds ISO 27001 certification.

Neither AT&T nor Rogers Communications holds PCI DSS certification.

Neither AT&T nor Rogers Communications holds HIPAA certification.

Neither AT&T nor Rogers Communications holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

A vulnerability was found in Nothings stb up to 1.26. Impacted is the function stbtt_InitFont_internal in the library stb_truetype.h of the component TTF File Handler. Performing a manipulation results in out-of-bounds read. Remote exploitation of the attack is possible. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 5.0
Severity: LOW
AV:N/AC:L/Au:N/C:N/I:N/A:P
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read in VS6ComFile!get_macro_mem_COM. Opening a crafted V7 file may lead to information disclosure from the affected product.

Risk Information
cvss3
Base: 7.8
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
cvss4
Base: 8.4
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

V-SFT versions 6.2.10.0 and prior contain a stack-based buffer overflow in VS6ComFile!CSaveData::_conv_AnimationItem. Opening a crafted V7 file may lead to arbitrary code execution on the affected product.

Risk Information
cvss3
Base: 7.8
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
cvss4
Base: 8.4
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read vulnerability in VS6MemInIF!set_temp_type_default. Opening a crafted V7 file may lead to information disclosure from the affected product.

Risk Information
cvss3
Base: 7.8
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
cvss4
Base: 8.4
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read vulnerability in VS6ComFile!load_link_inf. Opening a crafted V7 file may lead to information disclosure from the affected product.

Risk Information
cvss3
Base: 7.8
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
cvss4
Base: 8.4
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X