Comparison Overview

thyssenkrupp

VS

Wärtsilä

thyssenkrupp

thyssenkrupp Allee 1, Essen, 45143, DE
Last Update: 2026-04-01

thyssenkrupp is an international industrial and technology group with more than 93,000 employees. In the fiscal year 2024/2025, the company generated sales of around €33 billion in 48 countries. Its business activities are bundled in five segments: Automotive Technology, Decarbon Technologies, Materials Services, Steel Europe and Marine Systems. With extensive technological know-how, outstanding engineering competence and a high level of innovative strength, the group is a technology leader in many of its markets, developing solutions for the challenges of the future. Around 3,900 employees work in research and development worldwide. They are mainly focused on climate protection and the energy transition, the digital transformation in industry and the mobility of the future. The patent portfolio of thyssenkrupp currently includes approximately 17,000 patents and utility models, underlining the Group's leading position in technology and innovation. thyssenkrupp is pursuing ambitious climate protection targets and actively optimizing its own energy and climate efficiency. At the same time, the Group is supporting its customers and industry partners to help in achieving their climate targets, thus playing a key role in advancing the green transformation. As a publicly listed company, thyssenkrupp is part of the MDAX index. thyssenkrupp shares are traded on the Frankfurt Stock Exchange (ticker symbol: TKA) and as American depositary receipts (ticker symbol: TKAMY) in the USA. Since 20 October 2025, TKMS (Marine Systems segment) has also been an independent, If you have any HR related questions, please send us an e-mail to [email protected] or visit our global career site: https://karriere.thyssenkrupp.com/en Follow us on our social media career channels: Facebook: facebook.com/thyssenkruppcareer/ blog: https://www.thyssenkrupp.com/en/stories Imprint: https://www.thyssenkrupp.com/de/impressum.html Privacy policy: https://www.thyssenkrupp.com/en/legal-notes.html

NAICS: 3332
NAICS Definition: Industrial Machinery Manufacturing
Employees: 36,306
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
1

Wärtsilä

Hiililaiturinkuja 2, Helsinki, 00180, FI
Last Update: 2026-04-01
Between 750 and 799

We enable sustainable societies through innovation in technology and services together with all our stakeholders – today and tomorrow. We emphasise innovation in sustainable technology and services to help our customers continuously improve environmental and economic performance. We work together with our strong ecosystem of partners every day, providing a wide portfolio of leading technologies and innovative solutions that offer our customers superior uptime, reliability and foreseeable lifecycle costs across their operations. Our global passionate team of 17,500 energy and maritime experts in 200 locations in more than 70 countries is committed to shaping decarbonisation transformation of our industries across the globe.

NAICS: 3332
NAICS Definition: Industrial Machinery Manufacturing
Employees: 16,129
Subsidiaries: 4
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/thyssenkrupp.jpeg
thyssenkrupp
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/wartsila.jpeg
Wärtsilä
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
thyssenkrupp
100%
Compliance Rate
0/4 Standards Verified
Wärtsilä
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Industrial Machinery Manufacturing Industry Average (This Year)

No incidents recorded for thyssenkrupp in 2026.

Incidents vs Industrial Machinery Manufacturing Industry Average (This Year)

No incidents recorded for Wärtsilä in 2026.

Incident History — thyssenkrupp (X = Date, Y = Severity)

thyssenkrupp cyber incidents detection timeline including parent company and subsidiaries

Incident History — Wärtsilä (X = Date, Y = Severity)

Wärtsilä cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/thyssenkrupp.jpeg
thyssenkrupp
Incidents

Date Detected: 11/2015
Type:Cyber Attack
Motivation: theft of highly sensitive military/defense information (Royal Australian Navy submarine technical requirements)
Blog: Blog
https://images.rankiteo.com/companyimages/wartsila.jpeg
Wärtsilä
Incidents

No Incident

FAQ

Wärtsilä company demonstrates a stronger AI Cybersecurity Score compared to thyssenkrupp company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

thyssenkrupp company has historically faced a number of disclosed cyber incidents, whereas Wärtsilä company has not reported any.

In the current year, Wärtsilä company and thyssenkrupp company have not reported any cyber incidents.

Neither Wärtsilä company nor thyssenkrupp company has reported experiencing a ransomware attack publicly.

Neither Wärtsilä company nor thyssenkrupp company has reported experiencing a data breach publicly.

thyssenkrupp company has reported targeted cyberattacks, while Wärtsilä company has not reported such incidents publicly.

Neither thyssenkrupp company nor Wärtsilä company has reported experiencing or disclosing vulnerabilities publicly.

Neither thyssenkrupp nor Wärtsilä holds any compliance certifications.

Neither company holds any compliance certifications.

Wärtsilä company has more subsidiaries worldwide compared to thyssenkrupp company.

thyssenkrupp company employs more people globally than Wärtsilä company, reflecting its scale as a Industrial Machinery Manufacturing.

Neither thyssenkrupp nor Wärtsilä holds SOC 2 Type 1 certification.

Neither thyssenkrupp nor Wärtsilä holds SOC 2 Type 2 certification.

Neither thyssenkrupp nor Wärtsilä holds ISO 27001 certification.

Neither thyssenkrupp nor Wärtsilä holds PCI DSS certification.

Neither thyssenkrupp nor Wärtsilä holds HIPAA certification.

Neither thyssenkrupp nor Wärtsilä holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

A security flaw has been discovered in itsourcecode Payroll Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /manage_user.php of the component Parameter Handler. Performing a manipulation of the argument ID results in sql injection. The attack is possible to be carried out remotely. The exploit has been released to the public and may be used for attacks.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was identified in Axiomatic Bento4 up to 1.6.0-641. Affected is the function AP4_BitReader::SkipBits of the file Ap4Dac4Atom.cpp of the component DSI v1 Parser. Such manipulation of the argument n_presentations leads to heap-based buffer overflow. The attack needs to be performed locally. The exploit is publicly available and might be used. The project was informed of the problem early through an issue report but has not responded yet.

Risk Information
cvss2
Base: 4.3
Severity: LOW
AV:L/AC:L/Au:S/C:P/I:P/A:P
cvss3
Base: 5.3
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 4.8
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was determined in Axiomatic Bento4 up to 1.6.0-641. This impacts the function AP4_BitReader::ReadCache of the file Ap4Dac4Atom.cpp of the component MP4 File Parser. This manipulation causes heap-based buffer overflow. The attack needs to be launched locally. The exploit has been publicly disclosed and may be utilized. The project was informed of the problem early through an issue report but has not responded yet.

Risk Information
cvss2
Base: 4.3
Severity: LOW
AV:L/AC:L/Au:S/C:P/I:P/A:P
cvss3
Base: 5.3
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 4.8
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to version 2.3.1.6, there is a heap-buffer-overflow (HBO) in icAnsiToUtf8() in the XML conversion path. The issue is triggered by a crafted ICC profile which causes icAnsiToUtf8(std::string&, char const*) to treat an input buffer as a C-string and call operations that rely on strlen()/null-termination. AddressSanitizer reports an out-of-bounds READ of size 115 past a 114-byte heap allocation, with the failure observed while running the iccToXml tool. This issue has been patched in version 2.3.1.6.

Risk Information
cvss3
Base: 6.2
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Description

iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to version 2.3.1.6, there is a stack-buffer-overflow (SBO) in CIccTagFixedNum<>::GetValues() and a related bug chain. The primary crash is an AddressSanitizer-reported WRITE of size 4 that overflows a 4-byte stack variable (rv) via the call chain CIccTagFixedNum::GetValues() -> CIccTagStruct::GetElemNumberValue(). This issue has been patched in version 2.3.1.6.

Risk Information
cvss3
Base: 6.2
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H