Company Details
entergy
12,016
163,169
22
entergy.com
0
ENT_1174772
In-progress


Entergy Vendor Cyber Rating & Cyber Score
entergy.comAt Entergy (NYSE: ETR), we power life. More than 100 years ago, our founder Harvey Couch started this company with a handshake, some sawdust and a vision. Couch wanted to bring safe, affordable, reliable energy to the Middle South – energy that would power the lives of people and communities. Today, we own and operate one of the cleanest large-scale U.S. power generating fleets including more than five gigawatts of carbon-free nuclear capacity, a fleet of highly efficient gas resources, and a fast-growing portfolio of renewable resources. The nearly 12,000 men and women of Entergy deliver electricity and gas services to 3 million utility customers in Arkansas, Louisiana, Mississippi and Texas, generating annual GAAP revenues of $13.8 billion. Headquartered in New Orleans, we continue to play a driving role in the economic growth of the Gulf South. Our work matters. That’s been true for more than 100 years. And as we look to the next century, we remember the constant that bridges our past and future: We Power Life. Fast Facts: Entergy currently has a 90% rating on the 2022 Corporate Equality Index released by the Human Rights Campaign Foundation. This score places Entergy among the top energy and utility companies in the survey. With roots in the Gulf South region for more than a century, Entergy is a recognized leader in corporate citizenship, delivering more than $100 million in economic benefits to local communities through philanthropy and advocacy efforts annually over the last several years. With a total of 44 awards from EEI for its restoration and mutual-assistance work, Entergy remains the only utility company to have won either EEI's Recovery or Assistance Award, or both, every year since the awards began in 1998.
Company Details
entergy
12,016
163,169
22
entergy.com
0
ENT_1174772
In-progress
Between 800 and 849

Entergy Global Score (TPRM)XXXX

Description: TALX is working with Entergy to notify former and current Entergy employees whose 2016 W-2 data have been acquired by criminals from the TALX portal. An unauthorized third party gained access to the accounts. It was done primarily by successfully answering personal questions about the affected employees in order to reset the employees’ PINS. It gave unauthorized access to certain Entergy employees’ online portal accounts and electronic W-2 tax forms for the tax year 2016 or earlier. TALX has arranged for two years of complimentary restoration and assistance help for affected Entergy employees.


No incidents recorded for Entergy in 2026.
No incidents recorded for Entergy in 2026.
No incidents recorded for Entergy in 2026.
Entergy cyber incidents detection timeline including parent company and subsidiaries

At Entergy (NYSE: ETR), we power life. More than 100 years ago, our founder Harvey Couch started this company with a handshake, some sawdust and a vision. Couch wanted to bring safe, affordable, reliable energy to the Middle South – energy that would power the lives of people and communities. Today, we own and operate one of the cleanest large-scale U.S. power generating fleets including more than five gigawatts of carbon-free nuclear capacity, a fleet of highly efficient gas resources, and a fast-growing portfolio of renewable resources. The nearly 12,000 men and women of Entergy deliver electricity and gas services to 3 million utility customers in Arkansas, Louisiana, Mississippi and Texas, generating annual GAAP revenues of $13.8 billion. Headquartered in New Orleans, we continue to play a driving role in the economic growth of the Gulf South. Our work matters. That’s been true for more than 100 years. And as we look to the next century, we remember the constant that bridges our past and future: We Power Life. Fast Facts: Entergy currently has a 90% rating on the 2022 Corporate Equality Index released by the Human Rights Campaign Foundation. This score places Entergy among the top energy and utility companies in the survey. With roots in the Gulf South region for more than a century, Entergy is a recognized leader in corporate citizenship, delivering more than $100 million in economic benefits to local communities through philanthropy and advocacy efforts annually over the last several years. With a total of 44 awards from EEI for its restoration and mutual-assistance work, Entergy remains the only utility company to have won either EEI's Recovery or Assistance Award, or both, every year since the awards began in 1998.

NTPC Limited is India’s largest power generation utility with roots planted way back in 1975 to accelerate power development in India. Since then it has established itself as the dominant power major with a presence in the entire value chain of the power generation business. From fossil fuels, it ha
Duke Energy, a Fortune 150 company headquartered in Charlotte, N.C., is one of America’s largest energy holding companies. The company’s electric utilities serve 8.4 million customers in North Carolina, South Carolina, Florida, Indiana, Ohio and Kentucky, and collectively own 54,800 megawatts of ene

Pacific Gas and Electric Company, incorporated in California in 1905, is one of the largest combination natural gas and electric utilities in the United States. Based in San Francisco, the company is a subsidiary of PG&E Corporation. There are approximately 20,000 employees who carry out Pacific

The Saudi Electricity Company was established on the 5th of April in the year 2000, incorporated in accordance with Council of Ministers Mandate No. 169 dated November 30th, 1998, the Saudi Electricity Company was born out of the merger of smaller regional power company in the central, eastern, west

Our story began more than 40 years ago. Today we are a global company, among the largest players in the energy sector in Europe and the 4th largest producer of wind energy. We are proud to be a leading utility integrated in the Dow Jones Sustainability Indexes (World). We want to build a new energy
A leading energy provider, dedicated to excellence. We make energy work better for our customers, helping them thrive every day. That means always raising the bar - delivering better service and providing more reliable, resilient and sustainable energy to the eight states we serve: Minnesota, Colora

Together with our subsidiaries, we deliver clean, safe, reliable and affordable energy to our 9 million customers. Our focus is doing so with service excellence. That means we are leaders who take action to meet our customers’ and communities’ needs while advancing our commitment to net zero emiss

Our team at American Electric Power is committed to improving our customers' lives with reliable, affordable power. We are investing $54 billion from 2025 through 2029 to enhance service for customers and support the growing energy needs of our communities. Our nearly 16,000 employees operate and ma

Framatome is an international leader in nuclear energy recognized for its innovative, digital and value added solutions for the global nuclear fleet. With worldwide expertise and a proven track record for reliability and performance, the company designs, services and installs components, fuel, and i
.png)
The UK government is proposing stronger cybersecurity rules for electricity and gas sectors, prompted by recent attacks on European energy...
Bipartisan energy cybersecurity bills gain House panel nod ... The House Energy and Commerce Committee has approved a bipartisan energy...
Singapore's Ministry of Digital Development and Information will table legislation in Parliament later this year to mandate stricter...
Singapore plans legislation to impose energy, cybersecurity standards on data centres and major cloud providers ... The proposed Digital...
Cydome Embedded is the first solution to use advanced edge computing, providing zero-touch security as an embedded virtual container optimized...
A recent attempt at a destructive cyberattack on Poland's power grid has prompted the Cybersecurity and Infrastructure Security Agency to...
House Panel Advances 5 Cybersecurity Bills Targeting Energy Infrastructure. Key cybersecurity bills aimed at securing the nation's energy...
House Subcommittee on Energy advanced five recently introduced bills aimed at boosting the physical and cyber security of electric grid.
Titled the 'Energy Threat Analysis Center Act of 2026,' the bill aims to strengthen the collective defense, response, and resilience of the U.S....

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Entergy is https://www.entergy.com.
According to Rankiteo, Entergy’s AI-generated cybersecurity score is 810, reflecting their Good security posture.
According to Rankiteo, Entergy currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Entergy has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, Entergy is not certified under SOC 2 Type 1.
According to Rankiteo, Entergy does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Entergy is not listed as GDPR compliant.
According to Rankiteo, Entergy does not currently maintain PCI DSS compliance.
According to Rankiteo, Entergy is not compliant with HIPAA regulations.
According to Rankiteo,Entergy is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Entergy operates primarily in the Utilities industry.
Entergy employs approximately 12,016 people worldwide.
Entergy presently has no subsidiaries across any sectors.
Entergy’s official LinkedIn profile has approximately 163,169 followers.
Entergy is classified under the NAICS code 22, which corresponds to Utilities.
Yes, Entergy has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/entergy-corporation.
Yes, Entergy maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/entergy.
As of April 02, 2026, Rankiteo reports that Entergy has experienced 1 cybersecurity incidents.
Entergy has an estimated 4,343 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Data Leak.
Detection and Response: The company detects and responds to cybersecurity incidents through an third party assistance with talx, and remediation measures with two years of complimentary restoration and assistance help, and communication strategy with notification to affected employees..
Title: TALX Data Breach Affecting Entergy Employees
Description: TALX is working with Entergy to notify former and current Entergy employees whose 2016 W-2 data have been acquired by criminals from the TALX portal. An unauthorized third party gained access to the accounts primarily by successfully answering personal questions about the affected employees in order to reset the employees’ PINS. It gave unauthorized access to certain Entergy employees’ online portal accounts and electronic W-2 tax forms for the tax year 2016 or earlier. TALX has arranged for two years of complimentary restoration and assistance help for affected Entergy employees.
Type: Data Breach
Attack Vector: Account Compromise
Vulnerability Exploited: Weak PIN reset security questions
Threat Actor: Unauthorized third party
Motivation: Data Theft
Common Attack Types: The most common types of attacks the company has faced is Data Leak.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through PIN reset security questions.

Data Compromised: Employee w-2 data
Systems Affected: TALX portal
Identity Theft Risk: ['High']
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are W-2 Tax Forms and .

Third Party Assistance: Talx.
Remediation Measures: Two years of complimentary restoration and assistance help
Communication Strategy: Notification to affected employees
Third-Party Assistance: The company involves third-party assistance in incident response through TALX, .

Type of Data Compromised: W-2 tax forms
Sensitivity of Data: High
Data Exfiltration: Yes
File Types Exposed: W-2 forms
Personally Identifiable Information: Yes
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Two years of complimentary restoration and assistance help, .
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Notification To Affected Employees.

Entry Point: PIN reset security questions

Root Causes: Weak PIN reset security questions
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Talx, .
Last Attacking Group: The attacking group in the last incident was an Unauthorized third party.
Most Significant Data Compromised: The most significant data compromised in an incident were Employee W-2 data and .
Most Significant System Affected: The most significant system affected in an incident was TALX portal.
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was talx, .
Most Sensitive Data Compromised: The most sensitive data compromised in a breach was Employee W-2 data.
Most Recent Entry Point: The most recent entry point used by an initial access broker was an PIN reset security questions.
.png)
A security flaw has been discovered in itsourcecode Payroll Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /manage_user.php of the component Parameter Handler. Performing a manipulation of the argument ID results in sql injection. The attack is possible to be carried out remotely. The exploit has been released to the public and may be used for attacks.
A vulnerability was identified in Axiomatic Bento4 up to 1.6.0-641. Affected is the function AP4_BitReader::SkipBits of the file Ap4Dac4Atom.cpp of the component DSI v1 Parser. Such manipulation of the argument n_presentations leads to heap-based buffer overflow. The attack needs to be performed locally. The exploit is publicly available and might be used. The project was informed of the problem early through an issue report but has not responded yet.
A vulnerability was determined in Axiomatic Bento4 up to 1.6.0-641. This impacts the function AP4_BitReader::ReadCache of the file Ap4Dac4Atom.cpp of the component MP4 File Parser. This manipulation causes heap-based buffer overflow. The attack needs to be launched locally. The exploit has been publicly disclosed and may be utilized. The project was informed of the problem early through an issue report but has not responded yet.
iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to version 2.3.1.6, there is a heap-buffer-overflow (HBO) in icAnsiToUtf8() in the XML conversion path. The issue is triggered by a crafted ICC profile which causes icAnsiToUtf8(std::string&, char const*) to treat an input buffer as a C-string and call operations that rely on strlen()/null-termination. AddressSanitizer reports an out-of-bounds READ of size 115 past a 114-byte heap allocation, with the failure observed while running the iccToXml tool. This issue has been patched in version 2.3.1.6.
iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to version 2.3.1.6, there is a stack-buffer-overflow (SBO) in CIccTagFixedNum<>::GetValues() and a related bug chain. The primary crash is an AddressSanitizer-reported WRITE of size 4 that overflows a 4-byte stack variable (rv) via the call chain CIccTagFixedNum::GetValues() -> CIccTagStruct::GetElemNumberValue(). This issue has been patched in version 2.3.1.6.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.