Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

9/11/2012
03:13 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Wurldtech Achilles Test Software Now Available For Development Engineers Of Mission-Critical Embedded Devices

Solution is software version of Achilles Test Platform

VANCOUVER, British Columbia, Sept. 5, 2012 /PRNewswire/ -- Wurldtech Security Technologies, leaders in protecting mission-critical connected devices from persistent and dynamic cyber security threats, today announced the release of its Achilles Test Software, the software version of its Achilles Test Platform, extending its Achilles Test family of cyber security testing products to development teams of mission critical embedded devices.

Significant SCADA cyber attacks are plaguing the industry. Industrial Control Systems have evolved into complex, open, inter-connected networks, creating significant challenges for developers and manufacturers of mission-critical devices that are at the core of nuclear power plants, oil refineries, smart grids and medical applications.

"The Achilles Test Software is the next step in elevating industry standards to protect mission-critical connected devices from persistent cyber security threats," said Wurldtech CTO and co-founder, Nate Kube. "Our goal is to provide a complete cyber security solution supporting the entire product lifecycle, from development to commissioning, implementation and operation of critical infrastructure, ensuring the delivery of secure products, increased ROI and protection of brand equity for both the device manufacturer and their customers."

Achilles Test Software delivers the tools that development teams require to test critical software early in the development cycle, before they enter the QA lab.

It provides the means to proactively expose and correct vulnerabilities and validate system resiliency in a real-time environment, before the products are released and deployed in high-availability process control networks.

The Achilles Product Portfolio - Analyze, Discover, Mitigate and Certify

Wurldtech provides a total set of analysis, software, hardware and certification products that provide stakeholders with a set of tools to protect and mitigate against Zero-Day threats, malware and cyber attacks.

-- Achilles Test Software- Previously available only as a comprehensive

appliance - Achilles Test Platform, Achilles Test Software puts Achilles

testing in the hands of development and quality assurance (QA) teams,

enabling a corporate and strategic focus to cyber testing by allowing

for candidate software and hardware testing earlier in the development

cycle.

-- Achilles Test Platform- Hardware platform designed as a universal test

bench to allow equipment manufacturers of all sizes to conduct

comprehensive security and robustness testing throughout the product

development lifecycle. Engineers can now utilize Achilles Test Software

to test for device vulnerabilities at the earliest stage of development,

using Achilles Test Platform for final verification testing.

-- Achilles Communication Certification- Verifies network robustness of

industrial control devices by subjecting the device to a standardized

set of network tests. Certification is provided by Wurldtech engineering

teams upon inspection of testing data.

-- Achilles Practices Certification- Valued-added program tailored to the

needs of system owners and operators, verifies the device manufacturers

security practices and procedures across the product's lifecycle.

About Wurldtech Security Technologies

Founded in 2007, Wurldtech is a software company providing protection for mission critical connected devices against the persistent and dynamic threat of cyber attack. Wurldtech follows our customers' security lifecycle by providing innovative assessment products to discover and analyse threat and vulnerability profiles; mitigation of known vulnerabilities in installed networks with Achilles Threat Intelligence Signatures and device and development practice certification through Achilles Certification. Wurldtech's internationally recognized cyber security experts help industrial stakeholders identify and mitigate cyber security vulnerabilities to reduce the risk and cost of attacks.

Global customers worldwide spanning Oil & Gas, Electric Power, Medical, Nuclear, Chemical and Water Treatment markets currently use Wurldtech solutions. Visit wurldtech.comfor more information.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Why Cyber-Risk Is a C-Suite Issue
Marc Wilczek, Digital Strategist & CIO Advisor,  11/12/2019
DevSecOps: The Answer to the Cloud Security Skills Gap
Lamont Orange, Chief Information Security Officer at Netskope,  11/15/2019
Unreasonable Security Best Practices vs. Good Risk Management
Jack Freund, Director, Risk Science at RiskLens,  11/13/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-19012
PUBLISHED: 2019-11-17
An integer overflow in the search_in_range function in regexec.c in Oniguruma 6.x before 6.9.4_rc2 leads to an out-of-bounds read, in which the offset of this read is under the control of an attacker. (This only affects the 32-bit compiled version). Remote attackers can cause a denial-of-service or ...
CVE-2019-19022
PUBLISHED: 2019-11-17
iTerm2 through 3.3.6 has potentially insufficient documentation about the presence of search history in com.googlecode.iterm2.plist, which might allow remote attackers to obtain sensitive information, as demonstrated by searching for the NoSyncSearchHistory string in .plist files within public Git r...
CVE-2019-19035
PUBLISHED: 2019-11-17
jhead 3.03 is affected by: heap-based buffer over-read. The impact is: Denial of service. The component is: ReadJpegSections and process_SOFn in jpgfile.c. The attack vector is: Open a specially crafted JPEG file.
CVE-2019-19011
PUBLISHED: 2019-11-17
MiniUPnP ngiflib 0.4 has a NULL pointer dereference in GifIndexToTrueColor in ngiflib.c via a file that lacks a palette.
CVE-2019-19010
PUBLISHED: 2019-11-16
Eval injection in the Math plugin of Limnoria (before 2019.11.09) and Supybot (through 2018-05-09) allows remote unprivileged attackers to disclose information or possibly have unspecified other impact via the calc and icalc IRC commands.