Badge
11,371 badges added since 01 January 2025
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions

At Entergy (NYSE: ETR), we power life. More than 100 years ago, our founder Harvey Couch started this company with a handshake, some sawdust and a vision. Couch wanted to bring safe, affordable, reliable energy to the Middle South – energy that would power the lives of people and communities. Today, we own and operate one of the cleanest large-scale U.S. power generating fleets including more than five gigawatts of carbon-free nuclear capacity, a fleet of highly efficient gas resources, and a fast-growing portfolio of renewable resources. The nearly 12,000 men and women of Entergy deliver electricity and gas services to 3 million utility customers in Arkansas, Louisiana, Mississippi and Texas, generating annual GAAP revenues of $13.8 billion. Headquartered in New Orleans, we continue to play a driving role in the economic growth of the Gulf South. Our work matters. That’s been true for more than 100 years. And as we look to the next century, we remember the constant that bridges our past and future: We Power Life. Fast Facts: Entergy currently has a 90% rating on the 2022 Corporate Equality Index released by the Human Rights Campaign Foundation. This score places Entergy among the top energy and utility companies in the survey. With roots in the Gulf South region for more than a century, Entergy is a recognized leader in corporate citizenship, delivering more than $100 million in economic benefits to local communities through philanthropy and advocacy efforts annually over the last several years. With a total of 44 awards from EEI for its restoration and mutual-assistance work, Entergy remains the only utility company to have won either EEI's Recovery or Assistance Award, or both, every year since the awards began in 1998.

Entergy A.I CyberSecurity Scoring

Entergy

Company Details

Linkedin ID:

entergy

Employees number:

12,016

Number of followers:

163,169

NAICS:

22

Industry Type:

Utilities

Homepage:

entergy.com

IP Addresses:

0

Company ID:

ENT_1174772

Scan Status:

In-progress

AI scoreEntergy Risk Score (AI oriented)

Between 800 and 849

https://images.rankiteo.com/companyimages/entergy.jpeg
Entergy Utilities
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
Get a Score Increase
globalscoreEntergy Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/entergy.jpeg
Entergy Utilities
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

Entergy Company CyberSecurity News & History

Past Incidents
1
Attack Types
1
EntityTypeSeverityImpactSeenBlog DetailsSupply Chain SourceIncident DetailsView
EntergyData Leak6036/2016NA
Rankiteo Explanation :
Attack with significant impact with internal employee data leaks

Description: TALX is working with Entergy to notify former and current Entergy employees whose 2016 W-2 data have been acquired by criminals from the TALX portal. An unauthorized third party gained access to the accounts. It was done primarily by successfully answering personal questions about the affected employees in order to reset the employees’ PINS. It gave unauthorized access to certain Entergy employees’ online portal accounts and electronic W-2 tax forms for the tax year 2016 or earlier. TALX has arranged for two years of complimentary restoration and assistance help for affected Entergy employees.

Entergy
Data Leak
Severity: 60
Impact: 3
Seen: 6/2016
Blog:
Supply Chain Source: NA
Rankiteo Explanation
Attack with significant impact with internal employee data leaks

Description: TALX is working with Entergy to notify former and current Entergy employees whose 2016 W-2 data have been acquired by criminals from the TALX portal. An unauthorized third party gained access to the accounts. It was done primarily by successfully answering personal questions about the affected employees in order to reset the employees’ PINS. It gave unauthorized access to certain Entergy employees’ online portal accounts and electronic W-2 tax forms for the tax year 2016 or earlier. TALX has arranged for two years of complimentary restoration and assistance help for affected Entergy employees.

Ailogo

Entergy Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for Entergy

Incidents vs Utilities Industry Average (This Year)

No incidents recorded for Entergy in 2026.

Incidents vs All-Companies Average (This Year)

No incidents recorded for Entergy in 2026.

Incident Types Entergy vs Utilities Industry Avg (This Year)

No incidents recorded for Entergy in 2026.

Incident History — Entergy (X = Date, Y = Severity)

Entergy cyber incidents detection timeline including parent company and subsidiaries

Entergy Company Subsidiaries

SubsidiaryImage

At Entergy (NYSE: ETR), we power life. More than 100 years ago, our founder Harvey Couch started this company with a handshake, some sawdust and a vision. Couch wanted to bring safe, affordable, reliable energy to the Middle South – energy that would power the lives of people and communities. Today, we own and operate one of the cleanest large-scale U.S. power generating fleets including more than five gigawatts of carbon-free nuclear capacity, a fleet of highly efficient gas resources, and a fast-growing portfolio of renewable resources. The nearly 12,000 men and women of Entergy deliver electricity and gas services to 3 million utility customers in Arkansas, Louisiana, Mississippi and Texas, generating annual GAAP revenues of $13.8 billion. Headquartered in New Orleans, we continue to play a driving role in the economic growth of the Gulf South. Our work matters. That’s been true for more than 100 years. And as we look to the next century, we remember the constant that bridges our past and future: We Power Life. Fast Facts: Entergy currently has a 90% rating on the 2022 Corporate Equality Index released by the Human Rights Campaign Foundation. This score places Entergy among the top energy and utility companies in the survey. With roots in the Gulf South region for more than a century, Entergy is a recognized leader in corporate citizenship, delivering more than $100 million in economic benefits to local communities through philanthropy and advocacy efforts annually over the last several years. With a total of 44 awards from EEI for its restoration and mutual-assistance work, Entergy remains the only utility company to have won either EEI's Recovery or Assistance Award, or both, every year since the awards began in 1998.

Loading...
similarCompanies

Entergy Similar Companies

NTPC Limited

NTPC Limited is India’s largest power generation utility with roots planted way back in 1975 to accelerate power development in India. Since then it has established itself as the dominant power major with a presence in the entire value chain of the power generation business. From fossil fuels, it ha

Duke Energy Corporation

Duke Energy, a Fortune 150 company headquartered in Charlotte, N.C., is one of America’s largest energy holding companies. The company’s electric utilities serve 8.4 million customers in North Carolina, South Carolina, Florida, Indiana, Ohio and Kentucky, and collectively own 54,800 megawatts of ene

Pacific Gas and Electric Company

Pacific Gas and Electric Company, incorporated in California in 1905, is one of the largest combination natural gas and electric utilities in the United States. Based in San Francisco, the company is a subsidiary of PG&E Corporation. There are approximately 20,000 employees who carry out Pacific

Saudi Electricity Company

The Saudi Electricity Company was established on the 5th of April in the year 2000, incorporated in accordance with Council of Ministers Mandate No. 169 dated November 30th, 1998, the Saudi Electricity Company was born out of the merger of smaller regional power company in the central, eastern, west

Our story began more than 40 years ago. Today we are a global company, among the largest players in the energy sector in Europe and the 4th largest producer of wind energy. We are proud to be a leading utility integrated in the Dow Jones Sustainability Indexes (World). We want to build a new energy

Xcel Energy

A leading energy provider, dedicated to excellence. We make energy work better for our customers, helping them thrive every day. That means always raising the bar - delivering better service and providing more reliable, resilient and sustainable energy to the eight states we serve: Minnesota, Colora

Southern Company

Together with our subsidiaries, we deliver clean, safe, reliable and affordable energy to our 9 million customers. Our focus is doing so with service excellence. That means we are leaders who take action to meet our customers’ and communities’ needs while advancing our commitment to net zero emiss

American Electric Power

Our team at American Electric Power is committed to improving our customers' lives with reliable, affordable power. We are investing $54 billion from 2025 through 2029 to enhance service for customers and support the growing energy needs of our communities. Our nearly 16,000 employees operate and ma

Framatome

Framatome is an international leader in nuclear energy recognized for its innovative, digital and value added solutions for the global nuclear fleet. With worldwide expertise and a proven track record for reliability and performance, the company designs, services and installs components, fuel, and i

newsone

Entergy CyberSecurity News

March 30, 2026 11:01 AM
UK defining stronger energy cybersecurity rules after Poland attack

The UK government is proposing stronger cybersecurity rules for electricity and gas sectors, prompted by recent attacks on European energy...

March 09, 2026 07:00 AM
Bipartisan energy cybersecurity bills gain House panel nod

Bipartisan energy cybersecurity bills gain House panel nod ... The House Energy and Commerce Committee has approved a bipartisan energy...

February 24, 2026 08:00 AM
Singapore plans legislation to impose energy, cybersecurity standards on data centres and major cloud providers

Singapore's Ministry of Digital Development and Information will table legislation in Parliament later this year to mandate stricter...

February 23, 2026 08:00 AM
Singapore plans legislation to impose energy, cybersecurity standards on data centres and major cloud providers

Singapore plans legislation to impose energy, cybersecurity standards on data centres and major cloud providers ... The proposed Digital...

February 12, 2026 08:00 AM
Cydome Embedded brings advanced maritime and energy cybersecurity to resource-constrained edge devices

Cydome Embedded is the first solution to use advanced edge computing, providing zero-touch security as an embedded virtual container optimized...

February 10, 2026 08:00 AM
After major Poland energy grid cyberattack, CISA issues warning to U.S. audience

A recent attempt at a destructive cyberattack on Poland's power grid has prompted the Cybersecurity and Infrastructure Security Agency to...

February 09, 2026 08:00 AM
House Panel Advances 5 Cybersecurity Bills Targeting Energy Infrastructure

House Panel Advances 5 Cybersecurity Bills Targeting Energy Infrastructure. Key cybersecurity bills aimed at securing the nation's energy...

February 06, 2026 08:00 AM
5 Bills to Boost Energy Sector Cyber Defenses Clear House Panel

House Subcommittee on Energy advanced five recently introduced bills aimed at boosting the physical and cyber security of electric grid.

February 05, 2026 08:00 AM
Lawmakers introduce bill to strengthen energy sector cybersecurity and threat analysis, boost resilience

Titled the 'Energy Threat Analysis Center Act of 2026,' the bill aims to strengthen the collective defense, response, and resilience of the U.S....

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

Entergy CyberSecurity History Information

Official Website of Entergy

The official website of Entergy is https://www.entergy.com.

Entergy’s AI-Generated Cybersecurity Score

According to Rankiteo, Entergy’s AI-generated cybersecurity score is 810, reflecting their Good security posture.

How many security badges does Entergy’ have ?

According to Rankiteo, Entergy currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Has Entergy been affected by any supply chain cyber incidents ?

According to Rankiteo, Entergy has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.

Does Entergy have SOC 2 Type 1 certification ?

According to Rankiteo, Entergy is not certified under SOC 2 Type 1.

Does Entergy have SOC 2 Type 2 certification ?

According to Rankiteo, Entergy does not hold a SOC 2 Type 2 certification.

Does Entergy comply with GDPR ?

According to Rankiteo, Entergy is not listed as GDPR compliant.

Does Entergy have PCI DSS certification ?

According to Rankiteo, Entergy does not currently maintain PCI DSS compliance.

Does Entergy comply with HIPAA ?

According to Rankiteo, Entergy is not compliant with HIPAA regulations.

Does Entergy have ISO 27001 certification ?

According to Rankiteo,Entergy is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Entergy

Entergy operates primarily in the Utilities industry.

Number of Employees at Entergy

Entergy employs approximately 12,016 people worldwide.

Subsidiaries Owned by Entergy

Entergy presently has no subsidiaries across any sectors.

Entergy’s LinkedIn Followers

Entergy’s official LinkedIn profile has approximately 163,169 followers.

NAICS Classification of Entergy

Entergy is classified under the NAICS code 22, which corresponds to Utilities.

Entergy’s Presence on Crunchbase

Yes, Entergy has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/entergy-corporation.

Entergy’s Presence on LinkedIn

Yes, Entergy maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/entergy.

Cybersecurity Incidents Involving Entergy

As of April 02, 2026, Rankiteo reports that Entergy has experienced 1 cybersecurity incidents.

Number of Peer and Competitor Companies

Entergy has an estimated 4,343 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at Entergy ?

Incident Types: The types of cybersecurity incidents that have occurred include Data Leak.

How does Entergy detect and respond to cybersecurity incidents ?

Detection and Response: The company detects and responds to cybersecurity incidents through an third party assistance with talx, and remediation measures with two years of complimentary restoration and assistance help, and communication strategy with notification to affected employees..

Incident Details

Can you provide details on each incident ?

Incident : Data Breach

Title: TALX Data Breach Affecting Entergy Employees

Description: TALX is working with Entergy to notify former and current Entergy employees whose 2016 W-2 data have been acquired by criminals from the TALX portal. An unauthorized third party gained access to the accounts primarily by successfully answering personal questions about the affected employees in order to reset the employees’ PINS. It gave unauthorized access to certain Entergy employees’ online portal accounts and electronic W-2 tax forms for the tax year 2016 or earlier. TALX has arranged for two years of complimentary restoration and assistance help for affected Entergy employees.

Type: Data Breach

Attack Vector: Account Compromise

Vulnerability Exploited: Weak PIN reset security questions

Threat Actor: Unauthorized third party

Motivation: Data Theft

What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Data Leak.

How does the company identify the attack vectors used in incidents ?

Identification of Attack Vectors: The company identifies the attack vectors used in incidents through PIN reset security questions.

Impact of the Incidents

What was the impact of each incident ?

Incident : Data Breach ENT18198622

Data Compromised: Employee w-2 data

Systems Affected: TALX portal

Identity Theft Risk: ['High']

What types of data are most commonly compromised in incidents ?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are W-2 Tax Forms and .

Which entities were affected by each incident ?

Incident : Data Breach ENT18198622

Entity Name: Entergy

Entity Type: Company

Industry: Energy

Response to the Incidents

What measures were taken in response to each incident ?

Incident : Data Breach ENT18198622

Third Party Assistance: Talx.

Remediation Measures: Two years of complimentary restoration and assistance help

Communication Strategy: Notification to affected employees

How does the company involve third-party assistance in incident response ?

Third-Party Assistance: The company involves third-party assistance in incident response through TALX, .

Data Breach Information

What type of data was compromised in each breach ?

Incident : Data Breach ENT18198622

Type of Data Compromised: W-2 tax forms

Sensitivity of Data: High

Data Exfiltration: Yes

File Types Exposed: W-2 forms

Personally Identifiable Information: Yes

What measures does the company take to prevent data exfiltration ?

Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Two years of complimentary restoration and assistance help, .

Investigation Status

How does the company communicate the status of incident investigations to stakeholders ?

Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Notification To Affected Employees.

Initial Access Broker

How did the initial access broker gain entry for each incident ?

Incident : Data Breach ENT18198622

Entry Point: PIN reset security questions

Post-Incident Analysis

What were the root causes and corrective actions taken for each incident ?

Incident : Data Breach ENT18198622

Root Causes: Weak PIN reset security questions

What is the company's process for conducting post-incident analysis ?

Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Talx, .

Additional Questions

General Information

Who was the attacking group in the last incident ?

Last Attacking Group: The attacking group in the last incident was an Unauthorized third party.

Impact of the Incidents

What was the most significant data compromised in an incident ?

Most Significant Data Compromised: The most significant data compromised in an incident were Employee W-2 data and .

What was the most significant system affected in an incident ?

Most Significant System Affected: The most significant system affected in an incident was TALX portal.

Response to the Incidents

What third-party assistance was involved in the most recent incident ?

Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was talx, .

Data Breach Information

What was the most sensitive data compromised in a breach ?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach was Employee W-2 data.

Initial Access Broker

What was the most recent entry point used by an initial access broker ?

Most Recent Entry Point: The most recent entry point used by an initial access broker was an PIN reset security questions.

cve

Latest Global CVEs (Not Company-Specific)

Description

A security flaw has been discovered in itsourcecode Payroll Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /manage_user.php of the component Parameter Handler. Performing a manipulation of the argument ID results in sql injection. The attack is possible to be carried out remotely. The exploit has been released to the public and may be used for attacks.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was identified in Axiomatic Bento4 up to 1.6.0-641. Affected is the function AP4_BitReader::SkipBits of the file Ap4Dac4Atom.cpp of the component DSI v1 Parser. Such manipulation of the argument n_presentations leads to heap-based buffer overflow. The attack needs to be performed locally. The exploit is publicly available and might be used. The project was informed of the problem early through an issue report but has not responded yet.

Risk Information
cvss2
Base: 4.3
Severity: LOW
AV:L/AC:L/Au:S/C:P/I:P/A:P
cvss3
Base: 5.3
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 4.8
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was determined in Axiomatic Bento4 up to 1.6.0-641. This impacts the function AP4_BitReader::ReadCache of the file Ap4Dac4Atom.cpp of the component MP4 File Parser. This manipulation causes heap-based buffer overflow. The attack needs to be launched locally. The exploit has been publicly disclosed and may be utilized. The project was informed of the problem early through an issue report but has not responded yet.

Risk Information
cvss2
Base: 4.3
Severity: LOW
AV:L/AC:L/Au:S/C:P/I:P/A:P
cvss3
Base: 5.3
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 4.8
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to version 2.3.1.6, there is a heap-buffer-overflow (HBO) in icAnsiToUtf8() in the XML conversion path. The issue is triggered by a crafted ICC profile which causes icAnsiToUtf8(std::string&, char const*) to treat an input buffer as a C-string and call operations that rely on strlen()/null-termination. AddressSanitizer reports an out-of-bounds READ of size 115 past a 114-byte heap allocation, with the failure observed while running the iccToXml tool. This issue has been patched in version 2.3.1.6.

Risk Information
cvss3
Base: 6.2
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Description

iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to version 2.3.1.6, there is a stack-buffer-overflow (SBO) in CIccTagFixedNum<>::GetValues() and a related bug chain. The primary crash is an AddressSanitizer-reported WRITE of size 4 that overflows a 4-byte stack variable (rv) via the call chain CIccTagFixedNum::GetValues() -> CIccTagStruct::GetElemNumberValue(). This issue has been patched in version 2.3.1.6.

Risk Information
cvss3
Base: 6.2
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=entergy' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge