Company Details
crn-media
None employees
78,600
5191311
crn.com
0
CRN_2151470
In-progress


CRN Company CyberSecurity Posture
crn.comCRN provides objective reporting on daily technology and channel news, events and trends, empowering solution providers such as systems integrators, value-added resellers, managed service providers (MSPs), strategic service providers and IT consultants to maintain a competitive advantage and deliver the business outcomes their customers need. In addition to our daily reporting, our coverage can also be found in CRN magazine, in both print and online. Since 1982, CRN's talented team of editors has reported on the news solution providers need to build successful businesses. CRN is the go-to source for breaking news on the IT channel, including technology vendors’ channel programs, channel management executives and product and services portfolios; distributors and cloud distributors; MSP platform vendors and solution providers themselves. Coverage crosses over a variety of technology areas, including cloud, security, data center, networking, software, storage, managed services, computing and components and peripherals.
Company Details
crn-media
None employees
78,600
5191311
crn.com
0
CRN_2151470
In-progress
Between 750 and 799

CRN Global Score (TPRM)XXXX



No incidents recorded for CRN in 2026.
No incidents recorded for CRN in 2026.
No incidents recorded for CRN in 2026.
CRN cyber incidents detection timeline including parent company and subsidiaries

CRN provides objective reporting on daily technology and channel news, events and trends, empowering solution providers such as systems integrators, value-added resellers, managed service providers (MSPs), strategic service providers and IT consultants to maintain a competitive advantage and deliver the business outcomes their customers need. In addition to our daily reporting, our coverage can also be found in CRN magazine, in both print and online. Since 1982, CRN's talented team of editors has reported on the news solution providers need to build successful businesses. CRN is the go-to source for breaking news on the IT channel, including technology vendors’ channel programs, channel management executives and product and services portfolios; distributors and cloud distributors; MSP platform vendors and solution providers themselves. Coverage crosses over a variety of technology areas, including cloud, security, data center, networking, software, storage, managed services, computing and components and peripherals.


GLG is the world’s largest insight network. We connect decision makers to the right experts so they can act with the confidence that comes from true clarity and have what it takes to get ahead. Our network of experts is the world’s largest source of first-hand expertise, and we recruit hundreds of n

Experian is a global data and technology company, powering opportunities for people and businesses around the world. We help to redefine lending practices, uncover and prevent fraud, simplify healthcare, deliver digital marketing solutions, and gain deeper insights into the automotive market, all us

NielsenIQ (NIQ) is the world’s leading consumer intelligence company, delivering the most complete understanding of consumer buying behavior and revealing new pathways to growth. NIQ combined with GfK in 2023, bringing together the two industry leaders with unparalleled global reach. Today NIQ has

CASA is an industry leading association that can provide you with the edge you need to be an effective business owner with a substantial property portfolio and gives you the power to confidently manage your business and structures to enable you, the business owner, to later on become a member of our

Be Part of Progress - together we bring greater understanding to the world Springer Nature is one of the leading publishers of research in the world. We publish the largest number of journals and books and are a pioneer in open research. Through our leading brands, trusted for more than 180 years,

We deliver actionable, objective business and technology insights. Our expert guidance and tools enable faster, smarter decisions and stronger performance on an organization’s mission-critical priorities. Our unrivaled combination of business and technology insights steers clients toward the right
.png)
Among the top cybersecurity and AI predictions for 2026 are a surge in AI-generated vulnerabilities, more-autonomous cyber defense agents...
From agentic-powered security to emerging AI opportunities for partners, here's what the CEOs from 10 leading cybersecurity vendors are...
Fast-growing cybersecurity provider Fortinet is aiming to take a bigger share of the SMB and midmarket with a new partnership with D&H...
Cisco In Talks To Buy Cybersecurity Startup Axonius For $2B: Report ... Axonius shot down news of a potential deal with Cisco, saying that “[o]ur...
ServiceNow's Amit Zavery: Armis, Veza Acquisitions Aim To Strengthen Platform Cybersecurity Posture ... ServiceNow is making one of its biggest...
Cybersecurity focuses on protection. Cyber resilience focuses on survival and recovery. It asks: What happens when something goes wrong? How...
Data theft, ransomware and AI-powered attacks drove major disruption, even as nation-state attacks from China and North Korea surged during...
Sophos Firewall named best network security solution by CRN® ... We're thrilled to announce that Sophos Firewall has been named the best network security solution...
Gentry, who officially took over as CEO on Dec. 1 after serving as an executive vice president and running multiple business units in the...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of CRN is https://www.crn.com/.
According to Rankiteo, CRN’s AI-generated cybersecurity score is 767, reflecting their Fair security posture.
According to Rankiteo, CRN currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, CRN has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, CRN is not certified under SOC 2 Type 1.
According to Rankiteo, CRN does not hold a SOC 2 Type 2 certification.
According to Rankiteo, CRN is not listed as GDPR compliant.
According to Rankiteo, CRN does not currently maintain PCI DSS compliance.
According to Rankiteo, CRN is not compliant with HIPAA regulations.
According to Rankiteo,CRN is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
CRN operates primarily in the Internet News industry.
CRN employs approximately None employees people worldwide.
CRN presently has no subsidiaries across any sectors.
CRN’s official LinkedIn profile has approximately 78,600 followers.
CRN is classified under the NAICS code 5191311, which corresponds to Internet Publishing and Broadcasting and Web Search Portals.
No, CRN does not have a profile on Crunchbase.
Yes, CRN maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/crn-media.
As of January 25, 2026, Rankiteo reports that CRN has not experienced any cybersecurity incidents.
CRN has an estimated 277 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, CRN has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
The WP Go Maps (formerly WP Google Maps) plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the processBackgroundAction() function in all versions up to, and including, 10.0.04. This makes it possible for authenticated attackers, with Subscriber-level access and above, to modify global map engine settings.
The Save as PDF Plugin by PDFCrowd plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘options’ parameter in all versions up to, and including, 4.5.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. NOTE: Successful exploitation of this vulnerability requires that the PDFCrowd API key is blank (also known as "demo mode", which is the default configuration when the plugin is installed) or known.
The Hustle – Email Marketing, Lead Generation, Optins, Popups plugin for WordPress is vulnerable to arbitrary file uploads due to incorrect file type validation in the action_import_module() function in all versions up to, and including, 7.8.9.2. This makes it possible for authenticated attackers, with a lower-privileged role (e.g., Subscriber-level access and above), to upload arbitrary files on the affected site's server which may make remote code execution possible. Successful exploitation requires an admin to grant Hustle module permissions (or module edit access) to the low-privileged user so they can access the Hustle admin page and obtain the required nonce.
The WP Directory Kit plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.4.9 via the wdk_public_action AJAX handler. This makes it possible for unauthenticated attackers to extract email addresses for users with Directory Kit-specific user roles.
The Meta-box GalleryMeta plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 3.0.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with editor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.