<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>shipping news Archives - Shipsgo Blog</title>
	<atom:link href="https://blog.shipsgo.com/tag/shipping-news/feed/" rel="self" type="application/rss+xml" />
	<link></link>
	<description>Supply Chain Visibility Platform - Blog</description>
	<lastBuildDate>Wed, 10 Jan 2024 10:58:54 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://blog.shipsgo.com/wp-content/uploads/2022/03/cropped-academy-shipsgo-last-1-32x32.png</url>
	<title>shipping news Archives - Shipsgo Blog</title>
	<link></link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Cma Cgm Refused to Use North Pole Sea Route</title>
		<link>https://blog.shipsgo.com/cma-cgm-refused-to-use-north-pole-sea-route/</link>
		
		<dc:creator><![CDATA[mehmet-hamurcu]]></dc:creator>
		<pubDate>Wed, 28 Aug 2019 10:38:00 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[climate change]]></category>
		<category><![CDATA[CMA CGM]]></category>
		<category><![CDATA[co2 emission]]></category>
		<category><![CDATA[commerce]]></category>
		<category><![CDATA[container tracking]]></category>
		<category><![CDATA[containership]]></category>
		<category><![CDATA[emission]]></category>
		<category><![CDATA[energy]]></category>
		<category><![CDATA[main_blog]]></category>
		<category><![CDATA[maritime]]></category>
		<category><![CDATA[optimization]]></category>
		<category><![CDATA[reduce]]></category>
		<category><![CDATA[route]]></category>
		<category><![CDATA[service finder]]></category>
		<category><![CDATA[shipping]]></category>
		<category><![CDATA[shipping line]]></category>
		<category><![CDATA[shipping news]]></category>
		<category><![CDATA[TEU]]></category>
		<category><![CDATA[track]]></category>
		<category><![CDATA[transition]]></category>
		<category><![CDATA[transportation]]></category>
		<guid isPermaLink="false">http://localhost/blog-shipsgo/?p=3792</guid>

					<description><![CDATA[<p>One of the biggest shipping line companies CMA CGM announced that none of its 500 vessels will use the Northern Sea Route along Siberia. They refused to use North Pole Sea...</p>
<p>The post <a href="https://blog.shipsgo.com/cma-cgm-refused-to-use-north-pole-sea-route/">Cma Cgm Refused to Use North Pole Sea Route</a> appeared first on <a href="https://blog.shipsgo.com">Shipsgo Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h2 class="wp-block-heading has-regular-font-size">Cma Cgm&#8217;s approach for Pole Sea Route</h2>



<p>One of the biggest shipping line companies CMA CGM announced that none of its 500 vessels will use the Northern Sea Route along Siberia. They refused to use North Pole Sea Route as a shipping trade route in order to not damage the biodiversity of the region and planet. For our planet&#8217;s future, the company sacrificed the competitive advantage this route gives the shipping company. We congratulate CMA CGM for this avant-garde, pointed and the visionary decision that all shipping lines should follow. ​</p>



<p><strong>French shipping major CMA CGM has decided that none of its 500 vessels will use the Northern Sea Route along Siberia, which is now open due to climate change.</strong></p>



<p>Additionally, the company said it would give priority to liquefied natural gas (LNG) to power its future ships in order to further protect the environment.</p>



<p><em>“With this decision, CMA CGM makes the resolute choice to protect the environment and the planet’s biodiversity despite the major competitive advantage this route represents for shipping companies,”&nbsp;</em>Rodolphe Saadé, Chairman and Chief Executive Officer of the CMA CGM Group, said.</p>



<p>The decisions were to be presented at the G7 meeting taking place at Biarritz, France, from August 24-26.</p>



<p>The Northern Sea Route, which runs the length of the Siberian Coast, connects Asia to Europe today. The route has been made navigable due to the effects of global warming.</p>



<p><em>“The use of the Northern Sea Route will represent a significant danger to the unique natural ecosystems of this part of the world, mainly due to the numerous threats posed by accidents, oil pollution or collisions with marine wildlife,”&nbsp;</em>according to CMA CGM.</p>



<p>Furthermore, the company explained that today LNG offers the best-proven solution available to significantly reduce the environmental footprint of maritime transport. The use of LNG reduces emissions of sulphur and fine particles by 99%, nitrogen oxides emissions by 85% and carbon dioxide emissions by up to 20%.</p>



<p>CMA CGM would use LNG to power its ultra-large ships that are designed to carry up to 23,000 containers. The first ship in this fleet of nine container vessels are scheduled for delivery as early as 2020. By 2022, the company&nbsp;<a href="https://worldmaritimenews.com/archives/278289/cma-cgm-to-add-20-lng-fueled-ships-by-2022/" rel="noreferrer noopener" target="_blank">will have 20 LNG-powered vessels</a>&nbsp;in its fleet.</p>



<p>The shipowner added that it continues research into other energy sources after&nbsp;<a href="https://worldmaritimenews.com/archives/273740/cma-cgm-boxship-refueled-with-sustainable-marine-biofuel-in-rotterdam-port/" rel="noreferrer noopener" target="_blank">a successful test of biofuel oil</a>&nbsp;at port of Rotterdam aboard the 5,095 TEU containership CMA CGM White Shark in March 2019. CMA CGM is also establishing research partnerships to develop hydrogen as a potential long-term energy solution.</p>



<p>During the meeting, Saadé is to deliver to the President of France, Emmanuel Macron, on behalf of the maritime industry, the SAILS (Sustainable Actions for Innovative and Low-impact Shipping) Charter, formalized on the initiative of the Ministry for the Ecological and Inclusive Transition.</p>



<p>Through this charter, ten French signatory shipping companies, including Brittany Ferries, CMA CGM, Corsica ferries, Corsica Linea, Express des îles, Jifmar, La Méridionale, LDA, Orange Marine, PONANT, all members of Armateurs de France, commit to implementing specific actions in the reduction of emissions of air pollutants and greenhouse gases, whale protection, vessel energy optimization and performance, and strengthening of relations with the scientific community.</p>



<p>Between 2005 and 2015, the group reduced its CO2 emissions per container transported by 50% and has a target to further reduce these emissions by a further 30% by 2025.</p>



<p><em>“We make these decisions for the future, to leave our children a cleaner planet,”</em>&nbsp;Saadé said, inviting the entire industry, competitors, partners and customers,&nbsp;<em>“to join us.”</em></p>



<p><em>Source:&nbsp;</em><a href="https://worldmaritimenews.com/archives/282091/cma-cgm-pledges-not-to-use-the-northern-sea-route/" target="_blank" rel="noreferrer noopener">https://worldmaritimenews.com/archives/282091/cma-cgm-pledges-not-to-use-the-northern-sea-route/</a></p>
<p>The post <a href="https://blog.shipsgo.com/cma-cgm-refused-to-use-north-pole-sea-route/">Cma Cgm Refused to Use North Pole Sea Route</a> appeared first on <a href="https://blog.shipsgo.com">Shipsgo Blog</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>5 things every company should know about cybersecurity</title>
		<link>https://blog.shipsgo.com/5-things-every-company-should-know-about-cybersecurity/</link>
		
		<dc:creator><![CDATA[mehmet-hamurcu]]></dc:creator>
		<pubDate>Fri, 19 Apr 2019 19:30:00 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[container tracking]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[digitalization]]></category>
		<category><![CDATA[hack]]></category>
		<category><![CDATA[logistics services]]></category>
		<category><![CDATA[maersk]]></category>
		<category><![CDATA[main_blog]]></category>
		<category><![CDATA[petya]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[shipping industry]]></category>
		<category><![CDATA[shipping news]]></category>
		<guid isPermaLink="false">http://localhost/blog-shipsgo/?p=3634</guid>

					<description><![CDATA[<p>Cybersecurity has become one of the most important bones of corporations because of some unfortunate events. After the biggest ransomware cyberattack Wannacry had taken place in May 2017 world was again hit by the second massive cyberattack: Petya Attack. The Petya virus is a ransomware that encrypts MBR (Master Boot Record) files that store the [...]</p>
<p>The post <a href="https://blog.shipsgo.com/5-things-every-company-should-know-about-cybersecurity/">5 things every company should know about cybersecurity</a> appeared first on <a href="https://blog.shipsgo.com">Shipsgo Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Cybersecurity has become one of the most important bones of corporations because of some unfortunate events. After the biggest ransomware cyberattack Wannacry had taken place in May 2017 world was again hit by the second massive cyberattack: Petya Attack. The Petya virus is a ransomware that encrypts MBR (Master Boot Record) files that store the location and size information of all files on the computer. This encryption completely prevents access to the file and the hacked person/organization can&#8217;t open the encrypted files. If the specified amount is not paid, the hackers say that will be destroyed or sold. </p>



<p><strong>Let&#8217;s remember again what happened with Petya cyber attack!</strong></p>



<p>Petya ransomware began with hacking the system of a <a href="https://blog.shipsgo.com/whats-happening-in-the-port-of-odessa/" target="_blank" rel="noreferrer noopener">Ukrainian</a> Company while they are updating their financing app.&nbsp;The virus that started spreading to Europe and then to the US after Ukraine and Russia, many small and big companies have trouble getting into their databases. Petya cyber attack sabotaged the operational activities of many big and small companies, including Maersk and TNT. These cyber-attacks, particularly those that made large corporations unable to handle their international trading abilities, have caused huge losses for companies like Maersk and TNT. The cyberattack has neutralized Maersk&#8217;s booking service and corporate databases. Many ports belonging to Maersk had become unable to work. It&#8217;s been a month since the date of the cyber attack, However, the effects are still not completely eliminated.</p>



<p>If you want, you can read the &#8220;<a href="https://www.reuters.com/article/us-cyber-attack-maersk-idUSKBN19K2LE" target="_blank" rel="noreferrer noopener">Maersk Still Feeling Effects Of Cyber Attack</a>&#8220;.</p>



<p><strong>All the facilities of the digital age are disappearing and people are experiencing the stone age again.</strong></p>



<p>In the beginning, these cyberattacks were made with a sense of action and self-satisfaction, unfortunately, it is a profitable bonanza and has become a sector quickly now. As the ransom obtained from the cyber-attacks increases, new cyber attacks are fired and it is obvious that this type of cyber attack will be repeated over and over again.</p>



<p>How are we going to provide cyber security? What should we do for our cyber security? What should we avoid using?&nbsp;What should we pay attention to what should we care about?</p>



<p>Let&#8217;s review and highlight the proper responses to the above questions.</p>



<h2 class="wp-block-heading has-regular-font-size"><strong>1) Do not use the same devices in your business and personal life</strong> for cybersecurity</h2>



<p>Many company employees use the same device in their work and personal lives, and they enter the company&#8217;s database with personal devices. This increases the risk area rather than keeping the risk in the center, ie, in one place and makes your company more vulnerable to cyber-attacks. It is very important to warn our employees not to enter their company database with personal devices. All devices connected to company networks must be protected. The failure to set up the necessary safety rules means that cybercriminals can access this information from anywhere. This is something that should not be missed.</p>



<h2 class="wp-block-heading has-regular-font-size"><strong>2) Be careful when opening the email that comes to you</strong> for cybersecurity</h2>



<p>Think you are a very big company, you spend thousands of dollars a year on cyber security. But your employee is opening an uncertain e-mail from where it comes is not known and the thousands of dollars you spend on your cyber security are garbage on the fly. We do not want this to happen, do we?</p>



<p>The golden rule, Do not open emails if you don&#8217;t know where they come from.</p>



<p>If you do have to open such, do not open it without scanning with the antivirus program.&nbsp;Let&#8217;s say you received an email with a shrank Url containing t.co, bit.ly, etc. If you open the mail and click on the link, you will not know what you will come across..&nbsp;&nbsp; a user has no idea where the link is going, what’s behind that link, or what kind of benevolent or conversely malicious payload is going to load in the default browser. So do not click on the unseen URLs.</p>



<h2 class="wp-block-heading has-regular-font-size"><strong>3) Backup your files</strong> for cybersecurity</h2>



<p>Backup is one of the most basic and most important aspects of ensuring security. Your backups will always save lives in case you are attacked. Of course, securing your backup area may require you to make additional effort or budget. It&#8217;s a good idea to take backups on resources that you will have not trouble with restoring while backing up. Otherwise, returning from the backup may take a certain period of time, and various troubles may disrupt your business. The area you have backed up must be an area that is not be physically damaged.</p>



<h2 class="wp-block-heading has-regular-font-size"><strong>4) Create your cyber security policy!</strong></h2>



<p>With the cyber security policy, all the staff should know what to do in case if cyber attack, Screen in detail how this process should be governed.</p>



<p>How to act in the possible ransom negotiation and what kind of privileges will be given? You should prepare plans to respond to such questions.</p>



<h2 class="wp-block-heading has-regular-font-size"><strong>5) Improve your cyber security systems constantly.</strong></h2>



<p>Cybersecurity is a process that needs to be regularly monitored and constantly updated in order to be effective. Test your developed cyber security systems and prepare the correct reports. So you will be able to determine where the cyber security vulnerability originated. You can easily develop weaker parts in your cyber security.</p>
<p>The post <a href="https://blog.shipsgo.com/5-things-every-company-should-know-about-cybersecurity/">5 things every company should know about cybersecurity</a> appeared first on <a href="https://blog.shipsgo.com">Shipsgo Blog</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
