Company Details
entergy
11,655
143,666
22
entergy.com
0
ENT_1174772
In-progress

Entergy Company CyberSecurity Posture
entergy.comAt Entergy (NYSE: ETR), we power life. More than 100 years ago, our founder Harvey Couch started this company with a handshake, some sawdust and a vision. Couch wanted to bring safe, affordable, reliable energy to the Middle South – energy that would power the lives of people and communities. Today, we own and operate one of the cleanest large-scale U.S. power generating fleets including more than five gigawatts of carbon-free nuclear capacity, a fleet of highly efficient gas resources, and a fast-growing portfolio of renewable resources. The nearly 12,000 men and women of Entergy deliver electricity and gas services to 3 million utility customers in Arkansas, Louisiana, Mississippi and Texas, generating annual GAAP revenues of $13.8 billion. Headquartered in New Orleans, we continue to play a driving role in the economic growth of the Gulf South. Our work matters. That’s been true for more than 100 years. And as we look to the next century, we remember the constant that bridges our past and future: We Power Life. Fast Facts: Entergy currently has a 90% rating on the 2022 Corporate Equality Index released by the Human Rights Campaign Foundation. This score places Entergy among the top energy and utility companies in the survey. With roots in the Gulf South region for more than a century, Entergy is a recognized leader in corporate citizenship, delivering more than $100 million in economic benefits to local communities through philanthropy and advocacy efforts annually over the last several years. With a total of 44 awards from EEI for its restoration and mutual-assistance work, Entergy remains the only utility company to have won either EEI's Recovery or Assistance Award, or both, every year since the awards began in 1998.
Company Details
entergy
11,655
143,666
22
entergy.com
0
ENT_1174772
In-progress
Between 800 and 849

Entergy Global Score (TPRM)XXXX

Description: TALX is working with Entergy to notify former and current Entergy employees whose 2016 W-2 data have been acquired by criminals from the TALX portal. An unauthorized third party gained access to the accounts. It was done primarily by successfully answering personal questions about the affected employees in order to reset the employees’ PINS. It gave unauthorized access to certain Entergy employees’ online portal accounts and electronic W-2 tax forms for the tax year 2016 or earlier. TALX has arranged for two years of complimentary restoration and assistance help for affected Entergy employees.


No incidents recorded for Entergy in 2025.
No incidents recorded for Entergy in 2025.
No incidents recorded for Entergy in 2025.
Entergy cyber incidents detection timeline including parent company and subsidiaries

At Entergy (NYSE: ETR), we power life. More than 100 years ago, our founder Harvey Couch started this company with a handshake, some sawdust and a vision. Couch wanted to bring safe, affordable, reliable energy to the Middle South – energy that would power the lives of people and communities. Today, we own and operate one of the cleanest large-scale U.S. power generating fleets including more than five gigawatts of carbon-free nuclear capacity, a fleet of highly efficient gas resources, and a fast-growing portfolio of renewable resources. The nearly 12,000 men and women of Entergy deliver electricity and gas services to 3 million utility customers in Arkansas, Louisiana, Mississippi and Texas, generating annual GAAP revenues of $13.8 billion. Headquartered in New Orleans, we continue to play a driving role in the economic growth of the Gulf South. Our work matters. That’s been true for more than 100 years. And as we look to the next century, we remember the constant that bridges our past and future: We Power Life. Fast Facts: Entergy currently has a 90% rating on the 2022 Corporate Equality Index released by the Human Rights Campaign Foundation. This score places Entergy among the top energy and utility companies in the survey. With roots in the Gulf South region for more than a century, Entergy is a recognized leader in corporate citizenship, delivering more than $100 million in economic benefits to local communities through philanthropy and advocacy efforts annually over the last several years. With a total of 44 awards from EEI for its restoration and mutual-assistance work, Entergy remains the only utility company to have won either EEI's Recovery or Assistance Award, or both, every year since the awards began in 1998.


Hitachi Energy is a global technology leader in electrification, powering a sustainable energy future with innovative power grid technologies with digital at the core. Over three billion people depend on our technologies to power their daily lives. With over a century in pioneering mission-critical

Grupo Cobra es una compañía global de 80 años de experiencia en el sector de la ingeniería industrial aplicada y servicios especializados. Contamos con un equipo de 18.700 personas especializadas en todos los campos relacionados con la ingeniería, instalación y mantenimiento industrial de infraestru

Somos uma companhia de capital aberto com ações (NEOE3) negociadas na Bolsa de Valores de São Paulo. Parte do grupo espanhol Iberdrola, atuamos no Brasil desde 1997, e atualmente, somos uma das líderes do setor elétrico do país. Estamos presentes em 18 estados e no Distrito Federal, com negócios em

NextEra Energy, Inc. (NYSE: NEE) is one of the largest electric power and energy infrastructure companies in North America and is a leading provider of electricity to American homes and businesses. Headquartered in Juno Beach, Florida, NextEra Energy is a Fortune 200 company that owns Florida Power
The E.ON Group is one of Europe's largest operators of energy networks and energy infrastructure and a provider of innovative customer solutions for 50 million customers. Thus, we are decisively driving forward the energy transition in Europe and are committed to sustainability, climate protection,
Our story began more than 40 years ago. Today we are a global company, among the largest players in the energy sector in Europe and the 4th largest producer of wind energy. We are proud to be a leading utility integrated in the Dow Jones Sustainability Indexes (World). We want to build a new energy
The Saudi Electricity Company was established on the 5th of April in the year 2000, incorporated in accordance with Council of Ministers Mandate No. 169 dated November 30th, 1998, the Saudi Electricity Company was born out of the merger of smaller regional power company in the central, eastern, west

Tata Power is one of India’s largest integrated power companies and together with its subsidiaries and jointly controlled entities, has an installed/managed capacity of 14,294 MW. The Company has a presence across the entire power value chain - generation of renewable as well as conventional power i

Company profile Eskom Holdings generates, transports and distributes approximately 95% of South Africa’s electricity – making up 60% of the total electricity consumed on the African continent. Eskom is the world’s eleventh-largest power utility in terms of generating capacity, ranks ninth in term
.png)
The tender dated November 4, 2025, seeks proposals for the development of a project titled “Development of Cybersecurity Compliance Portal for...
Cybersecurity and energy leaders join forces to protect EU power grids ... Europe's top energy, cybersecurity, and technology leaders joined...
The smart grid cybersecurity market size exceeded USD 7.5 billion in 2024 and is projected to grow at over 11.7% CAGR from 2025 to 2034, driven by the...
“Securing the Oil & Gas Frontier,” a Cybersecurity Roundtable hosted by Kaspersky and Oil & Gas Middle East, unites senior executives and...
October is National Cybersecurity Month, but for utility employees at Entergy, security is central to our everyday work.
Industrial cybersecurity company Dragos identified that distributed energy resources (DERs) and microgrids are transforming how power is...
Global energy, petrochemical and industrial segments have become unmistakably more electrified, digitised and interconnected than ever...
NREL's Advanced Research on Integrated Energy Systems (ARIES) Cyber Range is a state-of-the-art cyber-physical modeling, simulation,...
TNO helps energy stakeholders transform cybersecurity from compliance burden into competitive advantage through sector-specific, stepwise implementation.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Entergy is https://www.entergy.com.
According to Rankiteo, Entergy’s AI-generated cybersecurity score is 805, reflecting their Good security posture.
According to Rankiteo, Entergy currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Entergy is not certified under SOC 2 Type 1.
According to Rankiteo, Entergy does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Entergy is not listed as GDPR compliant.
According to Rankiteo, Entergy does not currently maintain PCI DSS compliance.
According to Rankiteo, Entergy is not compliant with HIPAA regulations.
According to Rankiteo,Entergy is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Entergy operates primarily in the Utilities industry.
Entergy employs approximately 11,655 people worldwide.
Entergy presently has no subsidiaries across any sectors.
Entergy’s official LinkedIn profile has approximately 143,666 followers.
Entergy is classified under the NAICS code 22, which corresponds to Utilities.
No, Entergy does not have a profile on Crunchbase.
Yes, Entergy maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/entergy.
As of December 10, 2025, Rankiteo reports that Entergy has experienced 1 cybersecurity incidents.
Entergy has an estimated 4,176 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Data Leak.
Detection and Response: The company detects and responds to cybersecurity incidents through an third party assistance with talx, and remediation measures with two years of complimentary restoration and assistance help, and communication strategy with notification to affected employees..
Title: TALX Data Breach Affecting Entergy Employees
Description: TALX is working with Entergy to notify former and current Entergy employees whose 2016 W-2 data have been acquired by criminals from the TALX portal. An unauthorized third party gained access to the accounts primarily by successfully answering personal questions about the affected employees in order to reset the employees’ PINS. It gave unauthorized access to certain Entergy employees’ online portal accounts and electronic W-2 tax forms for the tax year 2016 or earlier. TALX has arranged for two years of complimentary restoration and assistance help for affected Entergy employees.
Type: Data Breach
Attack Vector: Account Compromise
Vulnerability Exploited: Weak PIN reset security questions
Threat Actor: Unauthorized third party
Motivation: Data Theft
Common Attack Types: The most common types of attacks the company has faced is Data Leak.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through PIN reset security questions.

Data Compromised: Employee w-2 data
Systems Affected: TALX portal
Identity Theft Risk: ['High']
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are W-2 Tax Forms and .

Third Party Assistance: Talx.
Remediation Measures: Two years of complimentary restoration and assistance help
Communication Strategy: Notification to affected employees
Third-Party Assistance: The company involves third-party assistance in incident response through TALX, .

Type of Data Compromised: W-2 tax forms
Sensitivity of Data: High
Data Exfiltration: Yes
File Types Exposed: W-2 forms
Personally Identifiable Information: Yes
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Two years of complimentary restoration and assistance help, .
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Notification To Affected Employees.

Entry Point: PIN reset security questions

Root Causes: Weak PIN reset security questions
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Talx, .
Last Attacking Group: The attacking group in the last incident was an Unauthorized third party.
Most Significant Data Compromised: The most significant data compromised in an incident were Employee W-2 data and .
Most Significant System Affected: The most significant system affected in an incident was TALX portal.
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was talx, .
Most Sensitive Data Compromised: The most sensitive data compromised in a breach was Employee W-2 data.
Most Recent Entry Point: The most recent entry point used by an initial access broker was an PIN reset security questions.
.png)
Tuleap is a free and open source suite for management of software development and collaboration. Versions of Tuleap Community Edition prior to 17.0.99.1763126988 and Tuleap Enterprise Edition prior to 17.0-3 and 16.13-8 have missing CSRF protections which allow attackers to create or remove tracker triggers. This issue is fixed in Tuleap Community Edition version 17.0.99.1763126988 and Tuleap Enterprise Edition versions 17.0-3 and 16.13-8.
Tuleap is a free and open source suite for management of software development and collaboration. Tuleap Community Editon versions prior to 17.0.99.1762456922 and Tuleap Enterprise Edition versions prior to 17.0-2, 16.13-7 and 16.12-10 are vulnerable to CSRF attacks through planning management API. Attackers have access to create, edit or remove plans. This issue is fixed in Tuleap Community Edition version 17.0.99.1762456922 and Tuleap Enterprise Edtion versions 17.0-2, 16.13-7 and 16.12-10.
Tuleap is an Open Source Suite for management of software development and collaboration. Tuleap Community Edition versions below 17.0.99.1762444754 and Tuleap Enterprise Edition versions prior to 17.0-2, 16.13-7 and 16.12-10 allow attackers trick victims into changing tracker general settings. This issue is fixed in version Tuleap Community Edition version 17.0.99.1762444754 and Tuleap Enterprise Edition versions 17.0-2, 16.13-7 and 16.12-10.
Tuleap is an Open Source Suite for management of software development and collaboration. Versions below 17.0.99.1762431347 of Tuleap Community Edition and Tuleap Enterprise Edition below 17.0-2, 16.13-7 and 16.12-10 allow attackers to access file release system information in projects they do not have access to. This issue is fixed in version 17.0.99.1762431347 of the Tuleap Community Edition and versions 17.0-2, 16.13-7 and 16.12-10 of Tuleap Enterprise Edition.
IBM watsonx.data 2.2 through 2.2.1 could allow an authenticated user to cause a denial of service through ingestion pods due to improper allocation of resources without limits.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.