Company Details
state-of-tennessee
15,294
4,682
92
tn.gov
0
STA_4864403
In-progress


State of Tennessee Vendor Cyber Rating & Cyber Score
tn.govState government is the largest employer in Tennessee, with approximately 43,500 employees in the three branches of government. The State of Tennessee has approximately 1,300 different job classifications in areas such as administrative, health services, historic preservation, legal, agriculture, counseling, and medical. If you are interested in becoming a data scientist, attorney, nurse, wildlife officer, physician, education consultant, trooper, computer programmer or an epidemiologist, explore all of the job opportunities the State of Tennessee has to offer. The State is looking to recruit, retain, and reward a talented workforce through the implementation of a merit-based pay system. Stop back often for news, updates and opportunities -- thanks for visiting!
Company Details
state-of-tennessee
15,294
4,682
92
tn.gov
0
STA_4864403
In-progress
Between 750 and 799

ST Global Score (TPRM)XXXX



No incidents recorded for State of Tennessee in 2026.
No incidents recorded for State of Tennessee in 2026.
No incidents recorded for State of Tennessee in 2026.
ST cyber incidents detection timeline including parent company and subsidiaries

State government is the largest employer in Tennessee, with approximately 43,500 employees in the three branches of government. The State of Tennessee has approximately 1,300 different job classifications in areas such as administrative, health services, historic preservation, legal, agriculture, counseling, and medical. If you are interested in becoming a data scientist, attorney, nurse, wildlife officer, physician, education consultant, trooper, computer programmer or an epidemiologist, explore all of the job opportunities the State of Tennessee has to offer. The State is looking to recruit, retain, and reward a talented workforce through the implementation of a merit-based pay system. Stop back often for news, updates and opportunities -- thanks for visiting!


The Commission represents and upholds the interests of the EU as a whole, and is independent of national governments. The European Commission prepares legislation for adoption by the Council (representing the member countries) and the Parliament (representing the citizens). It administers the budge

INSTITUTO DE SEGURIDAD Y SERVICIOS SOCIALES DE LOS TRABAJADORES DEL ESTADO. ES UN ORGANISMOS PÚBLICO QUE OTORGA SERVICIOS DE SALUD, PENSIONES, VIVIENDA, PRÉSTAMOS, ESTANCIAS INFANTILES, TURISMO, CULTURA, RECREACION, DEPORTE; CUYOS AFILIADOS SON TRABAJADORES DE DEPENDENCIAS GUBERNAMENTALES, CON DERE

The City of Los Angeles employs more than 45,000 people in a wide range of careers. Visit our website for information on current openings, including regular civil service positions, exempt and emergency appointment opportunities, in addition to internships! The City of Los Angeles is a Mayor-Counci

The County of Santa Clara is located at the southern end of the San Francisco Bay and encompasses 1,312 square miles. It has one of the highest median family incomes in the country, and a wide diversity of cultures, backgrounds and talents. The County of Santa Clara continues to attract people fro

Californians deserve a government that works for them and with them. One that will work to ensure opportunity and justice. We are building a California not for the few, but for all — including those who have historically been left out. We are doing the work to make our state a place for every Cali

Welcome to the Internal Revenue Service’s official LinkedIn account. Here, you will find the latest and greatest news and updates for taxpayers to help them understand and meet their tax responsibilities. Also, this is a place to learn about a meaningful career with the IRS. Check out the tabs above

Welcome to the United States Department of Veterans Affairs (VA) Official LinkedIn page. We're recruiting the finest employees to care for our #Veterans. Following/engagement ≠ signify VA endorsement. This is a moderated page, meaning that all comments will be reviewed for appropriate content. Ple

Är du beredd att tänka nytt och hitta framtidens lösningar? För vårt framtida uppdrag behöver vi medarbetare med hög kompetens, stort engagemang och som strävar efter ständig förbättring. Vid din sida kan du få engagerade kollegor inom hundratals kvalificerade yrken – ekonomer, sjuksköterskor, ju

MISIÓN/PROPÓSITO: La SEP tiene como propósito esencial crear condiciones que permitan asegurar el acceso de todas las mexicanas y mexicanos a una educación de calidad, en el nivel y modalidad que la requieran y en el lugar donde la demanden. VISIÓN: En el año 2025, México cuenta con un sistema
.png)
MetTel and TekSynap announced two separate network modernization efforts for Army National Guard units in Tennessee and Georgia,...
Less than a month after a vote by the Smithville Board of Mayor and Aldermen to purchase a 2014 fire truck for $425000 from Cyress Creek...
Three recent graduates of the University of Tennessee at Chattanooga's accelerated BAS-IT CyS program spent the past year inside Unum,...
Small municipalities and school districts boost cyber resilience through shared services that centralize tools and expertise.
The Tennessee Valley Authority posted a batch of job openings Monday, including six in the Chattanooga area, after spending months in a...
A week after it was likely targeted by cybercriminals, the City of La Vergne announced Friday that it will begin reopening its offices.
Relationships Key to Tennessee's Whole-of-State Cybersecurity · Given dwindling federal support for state and local cybersecurity, CIO Kristin...
Important government services in Texas, Tennessee, and Indiana have been disrupted following separate cyberattacks, reports The Record,...
A large suburb outside of Dallas was one of multiple municipalities across the U.S. this week to report cyber incidents affecting public...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of State of Tennessee is http://www.tn.gov/hr.
According to Rankiteo, State of Tennessee’s AI-generated cybersecurity score is 776, reflecting their Fair security posture.
According to Rankiteo, State of Tennessee currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, State of Tennessee has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, State of Tennessee is not certified under SOC 2 Type 1.
According to Rankiteo, State of Tennessee does not hold a SOC 2 Type 2 certification.
According to Rankiteo, State of Tennessee is not listed as GDPR compliant.
According to Rankiteo, State of Tennessee does not currently maintain PCI DSS compliance.
According to Rankiteo, State of Tennessee is not compliant with HIPAA regulations.
According to Rankiteo,State of Tennessee is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
State of Tennessee operates primarily in the Government Administration industry.
State of Tennessee employs approximately 15,294 people worldwide.
State of Tennessee presently has no subsidiaries across any sectors.
State of Tennessee’s official LinkedIn profile has approximately 4,682 followers.
State of Tennessee is classified under the NAICS code 92, which corresponds to Public Administration.
No, State of Tennessee does not have a profile on Crunchbase.
Yes, State of Tennessee maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/state-of-tennessee.
As of April 02, 2026, Rankiteo reports that State of Tennessee has not experienced any cybersecurity incidents.
State of Tennessee has an estimated 12,424 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, State of Tennessee has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
A vulnerability was found in Nothings stb up to 1.26. Impacted is the function stbtt_InitFont_internal in the library stb_truetype.h of the component TTF File Handler. Performing a manipulation results in out-of-bounds read. Remote exploitation of the attack is possible. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read in VS6ComFile!get_macro_mem_COM. Opening a crafted V7 file may lead to information disclosure from the affected product.
V-SFT versions 6.2.10.0 and prior contain a stack-based buffer overflow in VS6ComFile!CSaveData::_conv_AnimationItem. Opening a crafted V7 file may lead to arbitrary code execution on the affected product.
V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read vulnerability in VS6MemInIF!set_temp_type_default. Opening a crafted V7 file may lead to information disclosure from the affected product.
V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read vulnerability in VS6ComFile!load_link_inf. Opening a crafted V7 file may lead to information disclosure from the affected product.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.