Risk
9/25/2012
10:58 AM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

Wurldtech And Codenomicon Extend SCADA Security Partnership

Wurldtech has appointed Codenomicon as an authorized distributor for its Achilles test products

VANCOUVER, British Columbia and OULU, Finland, Sept. 25, 2012 /PRNewswire/ -- Wurldtech Security Technologies, leaders in protecting mission-critical connected devices from persistent and dynamic cyber security threats and Codenomicon, the market leader in security stress-testing, today announced they are extending their partnership for industrial automation solutions to the Asia Pacific markets, with a focus on China, Taiwan, Korea, Japan and Southeast Asia.

As the SCADA market continues to add connectivity into control devices, including new telecommunications and mobile capabilities, the need to protect these devices from Advanced Persistent Threats (APTs) has increased. Wurldtech and Codenomicon have extended their partnership to provide Asia Pacific device manufacturers with additional testing tools to increase the robustness of their products against these types of attacks.

"As cyber security threats evolve, device manufacturers from around the world are seeking innovative solutions to bolster their development processes," said Wurldtech CEO, Neil McDonnell. "Our partnership with Codenomicon provides Asia Pacific developers with a streamlined channel to Wurldtech products enabling us to continue to build our global presence."

Wurldtech has appointed Codenomicon as an authorized distributor for its Achilles test products, including the Achilles Test Platform and Achilles Test Software. Through this partnership, Codenomicon customers will have access to a new set of test tools for SCADA-specific protocols and Wurldtech will extend its reach into the Asia Pacific market.

"The Wurldtech Achilles Test products provide our customer base with an expanded line of process-control security options," said Codenomicon CEO, David Chartier.

"We are energized by our enhanced ability to distribute a complete SCADA robustness testing solution to developers and manufacturers and we look forward to working together to deliver key offerings to the APAC market."

As leaders in test and fuzzing software, Wurldtech and Codenomicon have worked together for many years to provide comprehensive robustness testing tools for mission critical embedded devices. With optional Codenomicon Defensics software running on the Achilles Test Platform, Wurldtech offers its customers testing of additional IT protocols.

Achilles Test products provide the tools that developers of mission critical connected and SCADA devices need to test critical software during the early development lifecycle. By proactively exposing and correcting vulnerabilities and validating system resiliency in a real-time environment, manufacturers are able to secure products before they are released and deployed in high-availability process control networks.

About Wurldtech Security Technologies

Founded in 2007, Wurldtech is a software company providing protection for mission critical connected devices against the persistent and dynamic threat of cyber attack. Wurldtech follows our customers' security lifecycle by providing innovative assessment products to discover and analyse threat and vulnerability profiles; mitigation of known vulnerabilities in installed networks with Achilles Threat Intelligence Signatures and device and development practice certification through Achilles Certification. Wurldtech's internationally recognized cyber security experts help industrial stakeholders identify and mitigate cyber security vulnerabilities to reduce the risk and cost of attacks.

Global customers worldwide spanning Oil & Gas, Electric Power, Medical, Nuclear, Chemical and Water Treatment markets currently use Wurldtech solutions. Visit wurldtech.comfor more information.

About Codenomicon

Codenomicon finds security vulnerabilities others can't find. Companies rely on Codenomicon's solutions to discover zero-day vulnerabilities that cause Denial of Service (DoS) and data leakage, which are the unknown vulnerabilities Advanced Persistent Threats (APTs) use to break into systems. Codenomicon's customers include Alcatel-Lucent, AT&T, Cisco Systems, Microsoft, Motorola, Google, Verizon, Nokia Siemens Networks, Huawei, and T-Systems. Codenomicon is known for Defensics software for security stress-testing of software/firmware/hardware, Clarified Situation Awareness solution for Computer Emergency Response Teams (CERTs), and Fuzz-o-Matic application testing-as-a-service. For more information, go to www.codenomicon.com.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6117
Published: 2014-07-11
Dahua DVR 2.608.0000.0 and 2.608.GV00.0 allows remote attackers to bypass authentication and obtain sensitive information including user credentials, change user passwords, clear log files, and perform other actions via a request to TCP port 37777.

CVE-2014-0174
Published: 2014-07-11
Cumin (aka MRG Management Console), as used in Red Hat Enterprise MRG 2.5, does not include the HTTPOnly flag in a Set-Cookie header for the session cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie.

CVE-2014-3485
Published: 2014-07-11
The REST API in the ovirt-engine in oVirt, as used in Red Hat Enterprise Virtualization (rhevm) 3.4, allows remote authenticated users to read arbitrary files and have other unspecified impact via unknown vectors, related to an XML External Entity (XXE) issue.

CVE-2014-3499
Published: 2014-07-11
Docker 1.0.0 uses world-readable and world-writable permissions on the management socket, which allows local users to gain privileges via unspecified vectors.

CVE-2014-3503
Published: 2014-07-11
Apache Syncope 1.1.x before 1.1.8 uses weak random values to generate passwords, which makes it easier for remote attackers to guess the password via a brute force attack.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Marilyn Cohodas and her guests look at the evolving nature of the relationship between CIO and CSO.