Comparison Overview

CWT

VS

Princess Cruises

CWT

701 Carlson Parkway, None, Minnetonka, Minnesota, US, 55305
Last Update: 2025-11-20
Between 750 and 799

CWT is a global business travel and meetings specialist, with whom companies and governments partner to keep their people connected, in traditional business locations and some of the most remote and inaccessible parts of the globe. A private company – owned through funds managed by a group of leading global financial institutions including Barings, MacKay Shields, and Monarch Alternative Capital – CWT provides its customers’ employees with innovative technology and an efficient, safe and sustainable travel experience.

NAICS: 5615
NAICS Definition: Travel Arrangement and Reservation Services
Employees: 12,937
Subsidiaries: 1
12-month incidents
0
Known data breaches
0
Attack type number
1

Princess Cruises

24305 Town Center Drive, Santa Clarita, California, 91355, US
Last Update: 2025-11-26
Between 750 and 799

Princess is the world’s leading premium cruise line operating a fleet of modern ships visiting over 380 destinations around the globe on more than 160 itineraries. Each moment on Princess is one of wonderful discovery where guests can relax and explore. The choices are endless, from invigorating activities to more relaxing pursuits, and enable guests to share special moments with family and friends and enjoy unique travel experiences that create inspiring memories. At the forefront of innovation, Princess MedallionClass elevates service levels through enhanced guest experiences before and during cruise vacations. Exciting career opportunities in many departments await your discovery. Whether you are in customer service, food and beverage, or fleet operations (just to name a few), we’re certain you will find a career path at Princess Cruises that will keep you engaged and growing for years to come. Teams on shore support colleagues onboard, as together we create memorable experiences—dining, entertainment, exploration, and celebration—for our guests. Exceptional customer service is the cornerstone of our success thanks to more than 30,000 of the cruise industry’s finest team members on land and at sea. We create a friendly and welcoming environment not only for our onboard guests, but for our seagoing and land-based teams as well. The result is a remarkable number of loyal staff. We respect the seas we sail and destinations we visit. Our ships adhere to international rules regulating operations from fire safety to navigation, maritime security, and environmental stewardship. Onboard medical facilities meet or exceed standards set by the American College of Emergency Physicians. There’s no limit to how far you can go with Princess Cruises!

NAICS: 5615
NAICS Definition: Travel Arrangement and Reservation Services
Employees: 14,486
Subsidiaries: 22
12-month incidents
0
Known data breaches
7
Attack type number
2

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/mycwt.jpeg
CWT
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/princess-cruises.jpeg
Princess Cruises
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
CWT
100%
Compliance Rate
0/4 Standards Verified
Princess Cruises
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Travel Arrangements Industry Average (This Year)

No incidents recorded for CWT in 2025.

Incidents vs Travel Arrangements Industry Average (This Year)

No incidents recorded for Princess Cruises in 2025.

Incident History — CWT (X = Date, Y = Severity)

CWT cyber incidents detection timeline including parent company and subsidiaries

Incident History — Princess Cruises (X = Date, Y = Severity)

Princess Cruises cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/mycwt.jpeg
CWT
Incidents

Date Detected: 5/2023
Type:Vulnerability
Attack Vector: Vulnerability Exploitation
Blog: Blog
https://images.rankiteo.com/companyimages/princess-cruises.jpeg
Princess Cruises
Incidents

Date Detected: 3/2021
Type:Breach
Attack Vector: Email Account Compromise
Blog: Blog

Date Detected: 3/2021
Type:Ransomware
Attack Vector: email
Blog: Blog

Date Detected: 3/2021
Type:Ransomware
Attack Vector: email (phishing or credential compromise)
Blog: Blog

FAQ

CWT company demonstrates a stronger AI Cybersecurity Score compared to Princess Cruises company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Princess Cruises company has faced a higher number of disclosed cyber incidents historically compared to CWT company.

In the current year, Princess Cruises company and CWT company have not reported any cyber incidents.

Princess Cruises company has confirmed experiencing a ransomware attack, while CWT company has not reported such incidents publicly.

Princess Cruises company has disclosed at least one data breach, while CWT company has not reported such incidents publicly.

Neither Princess Cruises company nor CWT company has reported experiencing targeted cyberattacks publicly.

CWT company has disclosed at least one vulnerability, while Princess Cruises company has not reported such incidents publicly.

Neither CWT nor Princess Cruises holds any compliance certifications.

Neither company holds any compliance certifications.

Princess Cruises company has more subsidiaries worldwide compared to CWT company.

Princess Cruises company employs more people globally than CWT company, reflecting its scale as a Travel Arrangements.

Neither CWT nor Princess Cruises holds SOC 2 Type 1 certification.

Neither CWT nor Princess Cruises holds SOC 2 Type 2 certification.

Neither CWT nor Princess Cruises holds ISO 27001 certification.

Neither CWT nor Princess Cruises holds PCI DSS certification.

Neither CWT nor Princess Cruises holds HIPAA certification.

Neither CWT nor Princess Cruises holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to versions 19.2.16, 20.3.14, and 21.0.1, there is a XSRF token leakage via protocol-relative URLs in angular HTTP clients. The vulnerability is a Credential Leak by App Logic that leads to the unauthorized disclosure of the Cross-Site Request Forgery (XSRF) token to an attacker-controlled domain. Angular's HttpClient has a built-in XSRF protection mechanism that works by checking if a request URL starts with a protocol (http:// or https://) to determine if it is cross-origin. If the URL starts with protocol-relative URL (//), it is incorrectly treated as a same-origin request, and the XSRF token is automatically added to the X-XSRF-TOKEN header. This issue has been patched in versions 19.2.16, 20.3.14, and 21.0.1. A workaround for this issue involves avoiding using protocol-relative URLs (URLs starting with //) in HttpClient requests. All backend communication URLs should be hardcoded as relative paths (starting with a single /) or fully qualified, trusted absolute URLs.

Risk Information
cvss4
Base: 7.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Uncontrolled Recursion vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs. This issue has been patched in version 1.3.2.

Risk Information
cvss4
Base: 8.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Integer Overflow vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures containing OIDs with oversized arcs. These arcs may be decoded as smaller, trusted OIDs due to 32-bit bitwise truncation, enabling the bypass of downstream OID-based security decisions. This issue has been patched in version 1.3.2.

Risk Information
cvss4
Base: 6.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, working with large buffers in Lua scripts can lead to a stack overflow. Users of Lua rules and output scripts may be affected when working with large buffers. This includes a rule passing a large buffer to a Lua script. This issue has been patched in versions 7.0.13 and 8.0.2. A workaround for this issue involves disabling Lua rules and output scripts, or making sure limits, such as stream.depth.reassembly and HTTP response body limits (response-body-limit), are set to less than half the stack size.

Risk Information
cvss3
Base: 7.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Description

Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. In versions from 8.0.0 to before 8.0.2, a NULL dereference can occur when the entropy keyword is used in conjunction with base64_data. This issue has been patched in version 8.0.2. A workaround involves disabling rules that use entropy in conjunction with base64_data.

Risk Information
cvss3
Base: 7.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H