Comparison Overview

Horenstein Law Group PLLC

VS

Research Data, Inc.

Horenstein Law Group PLLC

500 Broadway St., Vancouver, 98660, US
Last Update: 2026-04-01

Horenstein Law Group is a next generation law firm that practices in business, real estate, land use, and government strategies. The firm is comprised of attorneys and paralegals from other big and small law firms from Horenstein & Duggan, Tonkon Torp, to Miller Nash, K&L Gates, Davis Wright Tremaine, and other boutique firms. What does it mean to be a next generation law firm? HLG maintains all of the positive values clients expect from a traditional law firm, including excellent, well-trained lawyers, a high level work product and responsiveness. HLG takes that to the next generation through value and outcome based billing practices, maintaining secure cloud-based virtual document data rooms for client documents, and bringing back the old fashion yet timeless ability to call one phone number and have it ring directly to your lawyer.

NAICS: 5411
NAICS Definition: Legal Services
Employees: 2
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Research Data, Inc.

3900 A Carolina Avenue, Richmond, 23222, US
Last Update: 2026-03-11

Research Data, Incorporated is a recognized leader in the data collection, data management, and database marketing industries. Only a handful of companies can offer the complete suite of capabilities that RDI offers. ​ From concept through execution, we have the vision, experience, and knowledge to deliver measurable, sustainable results for your organization. We understand that even in large organizations, the infrastructure, resources, and expertise required to successfully implement a complex survey project, or a direct marketing program may not exist. ​ In some cases, even when these puzzle pieces do exist, there may be internal organizational and process constraints in place that could impede the timely deployment of a solution. ​ At RDI, we quickly solve business problems for our customers through the application of decades of experience, leading-edge technology, and the understanding that time is the new currency of business in today’s dynamic environment.

NAICS: 5411
NAICS Definition: Legal Services
Employees: 23
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/horenstein-law-group-pllc.jpeg
Horenstein Law Group PLLC
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/research-data-inc.jpeg
Research Data, Inc.
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Horenstein Law Group PLLC
100%
Compliance Rate
0/4 Standards Verified
Research Data, Inc.
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Legal Services Industry Average (This Year)

No incidents recorded for Horenstein Law Group PLLC in 2026.

Incidents vs Legal Services Industry Average (This Year)

No incidents recorded for Research Data, Inc. in 2026.

Incident History — Horenstein Law Group PLLC (X = Date, Y = Severity)

Horenstein Law Group PLLC cyber incidents detection timeline including parent company and subsidiaries

Incident History — Research Data, Inc. (X = Date, Y = Severity)

Research Data, Inc. cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/horenstein-law-group-pllc.jpeg
Horenstein Law Group PLLC
Incidents

No Incident

https://images.rankiteo.com/companyimages/research-data-inc.jpeg
Research Data, Inc.
Incidents

No Incident

FAQ

Research Data, Inc. company demonstrates a stronger AI Cybersecurity Score compared to Horenstein Law Group PLLC company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Historically, Research Data, Inc. company has disclosed a higher number of cyber incidents compared to Horenstein Law Group PLLC company.

In the current year, Research Data, Inc. company and Horenstein Law Group PLLC company have not reported any cyber incidents.

Neither Research Data, Inc. company nor Horenstein Law Group PLLC company has reported experiencing a ransomware attack publicly.

Neither Research Data, Inc. company nor Horenstein Law Group PLLC company has reported experiencing a data breach publicly.

Neither Research Data, Inc. company nor Horenstein Law Group PLLC company has reported experiencing targeted cyberattacks publicly.

Neither Horenstein Law Group PLLC company nor Research Data, Inc. company has reported experiencing or disclosing vulnerabilities publicly.

Neither Horenstein Law Group PLLC nor Research Data, Inc. holds any compliance certifications.

Neither company holds any compliance certifications.

Neither Horenstein Law Group PLLC company nor Research Data, Inc. company has publicly disclosed detailed information about the number of their subsidiaries.

Research Data, Inc. company employs more people globally than Horenstein Law Group PLLC company, reflecting its scale as a Legal Services.

Neither Horenstein Law Group PLLC nor Research Data, Inc. holds SOC 2 Type 1 certification.

Neither Horenstein Law Group PLLC nor Research Data, Inc. holds SOC 2 Type 2 certification.

Neither Horenstein Law Group PLLC nor Research Data, Inc. holds ISO 27001 certification.

Neither Horenstein Law Group PLLC nor Research Data, Inc. holds PCI DSS certification.

Neither Horenstein Law Group PLLC nor Research Data, Inc. holds HIPAA certification.

Neither Horenstein Law Group PLLC nor Research Data, Inc. holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

A vulnerability was found in Nothings stb up to 1.26. Impacted is the function stbtt_InitFont_internal in the library stb_truetype.h of the component TTF File Handler. Performing a manipulation results in out-of-bounds read. Remote exploitation of the attack is possible. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 5.0
Severity: LOW
AV:N/AC:L/Au:N/C:N/I:N/A:P
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read in VS6ComFile!get_macro_mem_COM. Opening a crafted V7 file may lead to information disclosure from the affected product.

Risk Information
cvss3
Base: 7.8
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
cvss4
Base: 8.4
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

V-SFT versions 6.2.10.0 and prior contain a stack-based buffer overflow in VS6ComFile!CSaveData::_conv_AnimationItem. Opening a crafted V7 file may lead to arbitrary code execution on the affected product.

Risk Information
cvss3
Base: 7.8
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
cvss4
Base: 8.4
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read vulnerability in VS6MemInIF!set_temp_type_default. Opening a crafted V7 file may lead to information disclosure from the affected product.

Risk Information
cvss3
Base: 7.8
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
cvss4
Base: 8.4
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read vulnerability in VS6ComFile!load_link_inf. Opening a crafted V7 file may lead to information disclosure from the affected product.

Risk Information
cvss3
Base: 7.8
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
cvss4
Base: 8.4
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X