Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

9/25/2012
10:58 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Wurldtech And Codenomicon Extend SCADA Security Partnership

Wurldtech has appointed Codenomicon as an authorized distributor for its Achilles test products

VANCOUVER, British Columbia and OULU, Finland, Sept. 25, 2012 /PRNewswire/ -- Wurldtech Security Technologies, leaders in protecting mission-critical connected devices from persistent and dynamic cyber security threats and Codenomicon, the market leader in security stress-testing, today announced they are extending their partnership for industrial automation solutions to the Asia Pacific markets, with a focus on China, Taiwan, Korea, Japan and Southeast Asia.

As the SCADA market continues to add connectivity into control devices, including new telecommunications and mobile capabilities, the need to protect these devices from Advanced Persistent Threats (APTs) has increased. Wurldtech and Codenomicon have extended their partnership to provide Asia Pacific device manufacturers with additional testing tools to increase the robustness of their products against these types of attacks.

"As cyber security threats evolve, device manufacturers from around the world are seeking innovative solutions to bolster their development processes," said Wurldtech CEO, Neil McDonnell. "Our partnership with Codenomicon provides Asia Pacific developers with a streamlined channel to Wurldtech products enabling us to continue to build our global presence."

Wurldtech has appointed Codenomicon as an authorized distributor for its Achilles test products, including the Achilles Test Platform and Achilles Test Software. Through this partnership, Codenomicon customers will have access to a new set of test tools for SCADA-specific protocols and Wurldtech will extend its reach into the Asia Pacific market.

"The Wurldtech Achilles Test products provide our customer base with an expanded line of process-control security options," said Codenomicon CEO, David Chartier.

"We are energized by our enhanced ability to distribute a complete SCADA robustness testing solution to developers and manufacturers and we look forward to working together to deliver key offerings to the APAC market."

As leaders in test and fuzzing software, Wurldtech and Codenomicon have worked together for many years to provide comprehensive robustness testing tools for mission critical embedded devices. With optional Codenomicon Defensics software running on the Achilles Test Platform, Wurldtech offers its customers testing of additional IT protocols.

Achilles Test products provide the tools that developers of mission critical connected and SCADA devices need to test critical software during the early development lifecycle. By proactively exposing and correcting vulnerabilities and validating system resiliency in a real-time environment, manufacturers are able to secure products before they are released and deployed in high-availability process control networks.

About Wurldtech Security Technologies

Founded in 2007, Wurldtech is a software company providing protection for mission critical connected devices against the persistent and dynamic threat of cyber attack. Wurldtech follows our customers' security lifecycle by providing innovative assessment products to discover and analyse threat and vulnerability profiles; mitigation of known vulnerabilities in installed networks with Achilles Threat Intelligence Signatures and device and development practice certification through Achilles Certification. Wurldtech's internationally recognized cyber security experts help industrial stakeholders identify and mitigate cyber security vulnerabilities to reduce the risk and cost of attacks.

Global customers worldwide spanning Oil & Gas, Electric Power, Medical, Nuclear, Chemical and Water Treatment markets currently use Wurldtech solutions. Visit wurldtech.comfor more information.

About Codenomicon

Codenomicon finds security vulnerabilities others can't find. Companies rely on Codenomicon's solutions to discover zero-day vulnerabilities that cause Denial of Service (DoS) and data leakage, which are the unknown vulnerabilities Advanced Persistent Threats (APTs) use to break into systems. Codenomicon's customers include Alcatel-Lucent, AT&T, Cisco Systems, Microsoft, Motorola, Google, Verizon, Nokia Siemens Networks, Huawei, and T-Systems. Codenomicon is known for Defensics software for security stress-testing of software/firmware/hardware, Clarified Situation Awareness solution for Computer Emergency Response Teams (CERTs), and Fuzz-o-Matic application testing-as-a-service. For more information, go to www.codenomicon.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Why Cyber-Risk Is a C-Suite Issue
Marc Wilczek, Digital Strategist & CIO Advisor,  11/12/2019
DevSecOps: The Answer to the Cloud Security Skills Gap
Lamont Orange, Chief Information Security Officer at Netskope,  11/15/2019
Unreasonable Security Best Practices vs. Good Risk Management
Jack Freund, Director, Risk Science at RiskLens,  11/13/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-19010
PUBLISHED: 2019-11-16
Eval injection in the Math plugin of Limnoria (before 2019.11.09) and Supybot (through 2018-05-09) allows remote unprivileged attackers to disclose information or possibly have unspecified other impact via the calc and icalc IRC commands.
CVE-2019-16761
PUBLISHED: 2019-11-15
A specially crafted Bitcoin script can cause a discrepancy between the specified SLP consensus rules and the validation result of the [email protected] npm package. An attacker could create a specially crafted Bitcoin script in order to cause a hard-fork from the SLP consensus. All versions >1.0...
CVE-2019-16762
PUBLISHED: 2019-11-15
A specially crafted Bitcoin script can cause a discrepancy between the specified SLP consensus rules and the validation result of the slpjs npm package. An attacker could create a specially crafted Bitcoin script in order to cause a hard-fork from the SLP consensus. Affected users can upgrade to any...
CVE-2019-13581
PUBLISHED: 2019-11-15
An issue was discovered in Marvell 88W8688 Wi-Fi firmware before version p52, as used on Tesla Model S/X vehicles manufactured before March 2018, via the Parrot Faurecia Automotive FC6050W module. A heap-based buffer overflow allows remote attackers to cause a denial of service or execute arbitrary ...
CVE-2019-13582
PUBLISHED: 2019-11-15
An issue was discovered in Marvell 88W8688 Wi-Fi firmware before version p52, as used on Tesla Model S/X vehicles manufactured before March 2018, via the Parrot Faurecia Automotive FC6050W module. A stack overflow could lead to denial of service or arbitrary code execution.