Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


10:58 AM
Dark Reading
Dark Reading
Products and Releases

Wurldtech And Codenomicon Extend SCADA Security Partnership

Wurldtech has appointed Codenomicon as an authorized distributor for its Achilles test products

VANCOUVER, British Columbia and OULU, Finland, Sept. 25, 2012 /PRNewswire/ -- Wurldtech Security Technologies, leaders in protecting mission-critical connected devices from persistent and dynamic cyber security threats and Codenomicon, the market leader in security stress-testing, today announced they are extending their partnership for industrial automation solutions to the Asia Pacific markets, with a focus on China, Taiwan, Korea, Japan and Southeast Asia.

As the SCADA market continues to add connectivity into control devices, including new telecommunications and mobile capabilities, the need to protect these devices from Advanced Persistent Threats (APTs) has increased. Wurldtech and Codenomicon have extended their partnership to provide Asia Pacific device manufacturers with additional testing tools to increase the robustness of their products against these types of attacks.

"As cyber security threats evolve, device manufacturers from around the world are seeking innovative solutions to bolster their development processes," said Wurldtech CEO, Neil McDonnell. "Our partnership with Codenomicon provides Asia Pacific developers with a streamlined channel to Wurldtech products enabling us to continue to build our global presence."

Wurldtech has appointed Codenomicon as an authorized distributor for its Achilles test products, including the Achilles Test Platform and Achilles Test Software. Through this partnership, Codenomicon customers will have access to a new set of test tools for SCADA-specific protocols and Wurldtech will extend its reach into the Asia Pacific market.

"The Wurldtech Achilles Test products provide our customer base with an expanded line of process-control security options," said Codenomicon CEO, David Chartier.

"We are energized by our enhanced ability to distribute a complete SCADA robustness testing solution to developers and manufacturers and we look forward to working together to deliver key offerings to the APAC market."

As leaders in test and fuzzing software, Wurldtech and Codenomicon have worked together for many years to provide comprehensive robustness testing tools for mission critical embedded devices. With optional Codenomicon Defensics software running on the Achilles Test Platform, Wurldtech offers its customers testing of additional IT protocols.

Achilles Test products provide the tools that developers of mission critical connected and SCADA devices need to test critical software during the early development lifecycle. By proactively exposing and correcting vulnerabilities and validating system resiliency in a real-time environment, manufacturers are able to secure products before they are released and deployed in high-availability process control networks.

About Wurldtech Security Technologies

Founded in 2007, Wurldtech is a software company providing protection for mission critical connected devices against the persistent and dynamic threat of cyber attack. Wurldtech follows our customers' security lifecycle by providing innovative assessment products to discover and analyse threat and vulnerability profiles; mitigation of known vulnerabilities in installed networks with Achilles Threat Intelligence Signatures and device and development practice certification through Achilles Certification. Wurldtech's internationally recognized cyber security experts help industrial stakeholders identify and mitigate cyber security vulnerabilities to reduce the risk and cost of attacks.

Global customers worldwide spanning Oil & Gas, Electric Power, Medical, Nuclear, Chemical and Water Treatment markets currently use Wurldtech solutions. Visit wurldtech.comfor more information.

About Codenomicon

Codenomicon finds security vulnerabilities others can't find. Companies rely on Codenomicon's solutions to discover zero-day vulnerabilities that cause Denial of Service (DoS) and data leakage, which are the unknown vulnerabilities Advanced Persistent Threats (APTs) use to break into systems. Codenomicon's customers include Alcatel-Lucent, AT&T, Cisco Systems, Microsoft, Motorola, Google, Verizon, Nokia Siemens Networks, Huawei, and T-Systems. Codenomicon is known for Defensics software for security stress-testing of software/firmware/hardware, Clarified Situation Awareness solution for Computer Emergency Response Teams (CERTs), and Fuzz-o-Matic application testing-as-a-service. For more information, go to www.codenomicon.com.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 6/5/2020
How AI and Automation Can Help Bridge the Cybersecurity Talent Gap
Peter Barker, Chief Product Officer at ForgeRock,  6/1/2020
Cybersecurity Spending Hits 'Temporary Pause' Amid Pandemic
Kelly Jackson Higgins, Executive Editor at Dark Reading,  6/2/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: What? IT said I needed virus protection!
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-06-05
The Elementor Page Builder plugin before 2.9.9 for WordPress suffers from a stored XSS vulnerability. An author user can create posts that result in a stored XSS by using a crafted payload in custom links.
PUBLISHED: 2020-06-05
The Elementor Page Builder plugin before 2.9.9 for WordPress suffers from multiple stored XSS vulnerabilities. An author user can create posts that result in stored XSS vulnerabilities, by using a crafted link in the custom URL or by applying custom attributes.
PUBLISHED: 2020-06-05
In Combodo iTop a menu shortcut name can be exploited with a stored XSS payload. This is fixed in all iTop packages (community, essential, professional) in version 2.7.0 and iTop essential and iTop professional in version 2.6.4.
PUBLISHED: 2020-06-05
In Combodo iTop, dashboard ids can be exploited with a reflective XSS payload. This is fixed in all iTop packages (community, essential, professional) for version 2.7.0 and in iTop essential and iTop professional packages for version 2.6.4.
PUBLISHED: 2020-06-05
In the cheetah free wifi 5.1 driver file liebaonat.sys, local users are allowed to cause a denial of service (BSOD) or other unknown impact due to failure to verify the value of a specific IOCTL.