Comparison Overview

State of Missouri

VS

Rijkswaterstaat

State of Missouri

301 W High Street PO BOX 809, Jefferson City, Missouri, US, 65101
Last Update: 2026-04-01
Between 750 and 799

Build the Missouri of tomorrow. Ensure a strong foundation today. Join a group of innovative team members focused on driving the State of Missouri forward. As public servants, our team members have the opportunity to produce work that is both lasting and important. This work serves to protect families, communities, and our natural resources. No matter where you are in your career, whether entry level or senior level, a career with the State of Missouri will challenge you to grow both personally and professionally. Though one employer, there is no shortage of exciting opportunities as there are many career paths you may take within the State. If you are searching for a job that transforms lives, including your own, a career with the State of Missouri is the perfect fit!

NAICS: 92
NAICS Definition: Public Administration
Employees: 12,114
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
1

Rijkswaterstaat

Koningskade 4, Den Haag, 2500 EX, NL
Last Update: 2026-04-02

Rijkswaterstaat is de uitvoeringsorganisatie van het Ministerie van Infrastructuur en Waterstaat. We beheren en ontwikkelen de rijkswegen, -vaarwegen en –wateren en zetten in op een duurzame leefomgeving. Samen met andere organisaties werken we aan een land dat beschermd is tegen overstromingen. Waar voldoende groen is, en voldoende en schoon water. En waar je vlot en veilig van A naar B kunt. Samenwerken aan een veilig, leefbaar en bereikbaar Nederland. Dat is Rijkswaterstaat. Bij Rijkswaterstaat werk je mee aan de toekomst van Nederland met de ruimte om jezelf te blijven ontwikkelen. Gun jezelf een baan met toekomst. Gun jezelf Rijkswaterstaat.

NAICS: 92
NAICS Definition: Public Administration
Employees: 12,096
Subsidiaries: 2
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/state-of-missouri.jpeg
State of Missouri
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/rijkswaterstaat.jpeg
Rijkswaterstaat
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
State of Missouri
100%
Compliance Rate
0/4 Standards Verified
Rijkswaterstaat
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Government Administration Industry Average (This Year)

No incidents recorded for State of Missouri in 2026.

Incidents vs Government Administration Industry Average (This Year)

No incidents recorded for Rijkswaterstaat in 2026.

Incident History — State of Missouri (X = Date, Y = Severity)

State of Missouri cyber incidents detection timeline including parent company and subsidiaries

Incident History — Rijkswaterstaat (X = Date, Y = Severity)

Rijkswaterstaat cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/state-of-missouri.jpeg
State of Missouri
Incidents

Date Detected: 10/2025
Type:Cyber Attack
Attack Vector: phishing, malware, ransomware, AI-generated attacks, credential stuffing (reused passwords)
Motivation: financial gain, data theft, disruption
Blog: Blog
https://images.rankiteo.com/companyimages/rijkswaterstaat.jpeg
Rijkswaterstaat
Incidents

No Incident

FAQ

Rijkswaterstaat company demonstrates a stronger AI Cybersecurity Score compared to State of Missouri company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

State of Missouri company has historically faced a number of disclosed cyber incidents, whereas Rijkswaterstaat company has not reported any.

In the current year, Rijkswaterstaat company and State of Missouri company have not reported any cyber incidents.

Neither Rijkswaterstaat company nor State of Missouri company has reported experiencing a ransomware attack publicly.

Neither Rijkswaterstaat company nor State of Missouri company has reported experiencing a data breach publicly.

State of Missouri company has reported targeted cyberattacks, while Rijkswaterstaat company has not reported such incidents publicly.

Neither State of Missouri company nor Rijkswaterstaat company has reported experiencing or disclosing vulnerabilities publicly.

Neither State of Missouri nor Rijkswaterstaat holds any compliance certifications.

Neither company holds any compliance certifications.

Rijkswaterstaat company has more subsidiaries worldwide compared to State of Missouri company.

State of Missouri company employs more people globally than Rijkswaterstaat company, reflecting its scale as a Government Administration.

Neither State of Missouri nor Rijkswaterstaat holds SOC 2 Type 1 certification.

Neither State of Missouri nor Rijkswaterstaat holds SOC 2 Type 2 certification.

Neither State of Missouri nor Rijkswaterstaat holds ISO 27001 certification.

Neither State of Missouri nor Rijkswaterstaat holds PCI DSS certification.

Neither State of Missouri nor Rijkswaterstaat holds HIPAA certification.

Neither State of Missouri nor Rijkswaterstaat holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

A vulnerability was found in Nothings stb up to 1.26. Impacted is the function stbtt_InitFont_internal in the library stb_truetype.h of the component TTF File Handler. Performing a manipulation results in out-of-bounds read. Remote exploitation of the attack is possible. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 5.0
Severity: LOW
AV:N/AC:L/Au:N/C:N/I:N/A:P
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read in VS6ComFile!get_macro_mem_COM. Opening a crafted V7 file may lead to information disclosure from the affected product.

Risk Information
cvss3
Base: 7.8
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
cvss4
Base: 8.4
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

V-SFT versions 6.2.10.0 and prior contain a stack-based buffer overflow in VS6ComFile!CSaveData::_conv_AnimationItem. Opening a crafted V7 file may lead to arbitrary code execution on the affected product.

Risk Information
cvss3
Base: 7.8
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
cvss4
Base: 8.4
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read vulnerability in VS6MemInIF!set_temp_type_default. Opening a crafted V7 file may lead to information disclosure from the affected product.

Risk Information
cvss3
Base: 7.8
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
cvss4
Base: 8.4
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read vulnerability in VS6ComFile!load_link_inf. Opening a crafted V7 file may lead to information disclosure from the affected product.

Risk Information
cvss3
Base: 7.8
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
cvss4
Base: 8.4
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X