Connect with us

Technology

Nauticus Robotics and SeaTrepid International Collaborate to Bring ToolKITT Software to ROVs

Published

on

HOUSTON, Nov. 19, 2024 /PRNewswire/ — Nauticus Robotics, Inc. (NASDAQ: KITT, “Nauticus”), a leading innovator in autonomous subsea robotics and software solutions, today announced a strategic collaboration with SeaTrepid International, LLC (“SeaTrepid”) to integrate and test its ToolKITT software on a Remotely Operated Vehicle (ROV) in SeaTrepid’s fleet.

Under this collaboration, Nauticus will install a perpetual license of its ToolKITT software onto an ROV, with SeaTrepid providing access to its facilities and workforce to support pool testing during the certification process. SeaTrepid will gain a competitive edge through enhanced ROV services, while Nauticus will benefit from recurring annual software maintenance revenues post-deployment.

The collaboration’s first focus is implementing ToolKITT’s automatic station-keeping capability. This feature will enable ROV pilots to stabilize the vehicle during subsea operations, reducing workload and improving precision. Following the successful deployment of this initial capability, additional advanced features of ToolKITT will be rolled out incrementally.

John Gibson, CEO and President of Nauticus Robotics, stated, “We are thrilled to work with Bob Christ and the team at SeaTrepid. Together, we aim to revolutionize subsea operations by advancing autonomous ROV capabilities. By equipping SeaTrepid’s ROVs with ToolKITT, we can deliver significant efficiency gains, including reduced CO2 emissions, faster mission completion times, and fewer operator-related delays. This collaboration represents an exciting entry point for ToolKITT into the broader ROV market, building on its recent success on the Aquanaut Mark 2 vehicle earlier this year.”

Bob Christ, CEO of SeaTrepid, added, “This collaboration with Nauticus allows us to integrate cutting-edge software into our fleet, paving the way for SeaTrepid to become the first autonomous ROV service provider. We’re excited about the opportunities this technology presents for transforming subsea operations and look forward to delivering enhanced capabilities to our clients.”

This collaboration underscores Nauticus’ and SeaTrepid’s shared commitment to advancing augmented autonomy in subsea robotics. By leveraging existing ROV infrastructure, the collaboration aims to accelerate market adoption of autonomous technologies while providing cross-training opportunities for their teams.

About Nauticus Robotics

Nauticus Robotics, Inc. develops autonomous robots for the ocean industries. Autonomy requires the extensive use of sensors, artificial intelligence, and effective algorithms for perception and decision allowing the robot to adapt to changing environments. The company’s business model includes using robotic systems for service, selling vehicles and components, and licensing of related software to both the commercial and defense business sectors. Nauticus has designed and is currently testing and certifying a new generation of vehicles to reduce operational cost and gather data to maintain and operate a wide variety of subsea infrastructure. Besides a standalone service offering and forward-facing products, Nauticus’ approach to ocean robotics has also resulted in the development of a range of technology products for retrofit/upgrading traditional ROV operations and other third-party vehicle platforms. Nauticus’ services provide customers with the necessary data collection, analytics, and subsea manipulation capabilities to support and maintain assets while reducing their operational footprint, operating cost, and greenhouse gas emissions, to improve offshore health, safety, and environmental exposure. 

About SeaTrepid International

SeaTrepid International, LLC is an applied robotic solutions provider offering support for commercial, public safety, municipal, military and scientific applications. They own and operate a variety of robotic equipment and sensor suites for both inland and offshore customers worldwide.

Cautionary Language Regarding Forward-Looking Statements

This press release contains forward-looking statements within the meaning of Section 21E of the Securities Exchange Act of 1934, as amended (the “Act”), and are intended to enjoy the protection of the safe harbor for forward-looking statements provided by the Act as well as protections afforded by other federal securities laws. Such forward-looking statements include but are not limited to: the expected timing of product commercialization or new product releases; customer interest in Nauticus’ products; estimated operating results and use of cash; and Nauticus’ use of and needs for capital. Generally, statements that are not historical facts, including statements concerning possible or assumed future actions, business strategies, events, or results of operations, are forward-looking statements. These statements may be preceded by, followed by, or include the words “believes,” “estimates,” “expects,” “projects,” “forecasts,” “may,” “will,” “should,” “seeks,” “plans,” “scheduled,” “anticipates,” “intends,” or “continue” or similar expressions. Forward-looking statements inherently involve risks and uncertainties that may cause actual events, results, or performance to differ materially from those indicated by such statements. These forward-looking statements are based on Nauticus’ management’s current expectations and beliefs, as well as a number of assumptions concerning future events. There can be no assurance that the events, results, or trends identified in these forward-looking statements will occur or be achieved. Forward-looking statements speak only as of the date they are made, and Nauticus is not under any obligation and expressly disclaims any obligation, to update, alter, or otherwise revise any forward-looking statement, whether as a result of new information, future events, or otherwise, except as required by law. Readers should carefully review the statements set forth in the reports which Nauticus has filed or will file from time to time with the Securities and Exchange Commission (the “SEC”) for a more complete discussion of the risks and uncertainties facing the Company and that could cause actual outcomes to be materially different from those indicated in the forward-looking statements made by the Company, in particular the sections entitled “Risk Factors” and “Cautionary Note Regarding Forward-Looking Statements” in documents filed from time to time with the SEC, including Nauticus’ Annual Report on Form 10-K filed with the SEC on April 10, 2024. Should one or more of these risks, uncertainties, or other factors materialize, or should assumptions underlying the forward-looking information or statements prove incorrect, actual results may vary materially from those described herein as intended, planned, anticipated, believed, estimated, or expected. The documents filed by Nauticus with the SEC may be obtained free of charge at the SEC’s website at www.sec.gov.

View original content to download multimedia:https://www.prnewswire.com/news-releases/nauticus-robotics-and-seatrepid-international-collaborate-to-bring-toolkitt-software-to-rovs-302310637.html

SOURCE Nauticus Robotics, Inc.

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Technology

ObjectSecurity Releases BinLens 3.0 for Advanced Binary Vulnerability Analysis

Published

on

By

ObjectSecurity, a recognized leader in advanced defense and industrial cybersecurity solutions, today announced the release of BinLens™ 3.0, the latest iteration of its cutting-edge binary vulnerability analysis tool.

SAN DIEGO, Nov. 19, 2024 /PRNewswire-PRWeb/ — ObjectSecurity, a recognized leader in advanced defense and industrial cybersecurity solutions, today announced the release of BinLens™ 3.0, the latest iteration of its cutting-edge binary vulnerability analysis tool.

BinLens™ takes a groundbreaking approach, leveraging advanced symbolic binary-level analysis to detect hidden and unpublished vulnerabilities, including memory-safety violations. Its superior detection accuracy dramatically lowers false-positive rate sets it apart from traditional tools.

BinLens™ addresses critical gaps in traditional cybersecurity approaches by automating the complex process of analyzing binary programs. This powerful new version provides organizations with deeper insights into vulnerabilities, enabling faster and more effective mitigation of potential threats.

BinLens™ is a bold evolution from ObjectSecurity OT.AI Platform™ 2.x, delivering a revolutionary approach to binary vulnerability analysis. Engineered to effortlessly uncover zero-day vulnerabilities with cutting-edge accuracy and minimal false positives, BinLens™ is designed for both IT and OT/ICS environments.

Leveraging advanced automation, BinLens™ streamlines traditionally labor-intensive tasks such as symbolic analysis, static analysis, disassembly, and decompilation. Unlike conventional tools that focus solely on known vulnerabilities, BinLens™ offers a proactive defense, providing organizations with unmatched flexibility through its versatile deployment options.

Conventional cybersecurity methods—such as network scans, SBOMs, and source code reviews—often fall short, detecting only known vulnerabilities and leaving critical gaps. BinLens™ takes a groundbreaking approach, leveraging advanced symbolic binary-level analysis to detect hidden and unpublished vulnerabilities, including memory-safety violations and other undefined behaviors. Its superior detection accuracy and dramatically lower false-positive rate set it apart from traditional tools.

Key Features of BinLens™ Include:

Memory Safety Detection: Identifies unsafe writes like weak pointers, stack overflows, and heap overflows to prevent data corruption, crashes, or unauthorized access.Control Flow Risk Mitigation: Detects vulnerabilities that allow user-controlled instruction pointers, safeguarding against arbitrary code execution.Array and String Violation Identification: Highlights issues such as out-of-bound array indices and externally controlled string vulnerabilities, protecting sensitive program data.Cryptographic Analysis: Evaluates encryption schemes, embedded keys, and entropy to uncover potential weaknesses in cryptographic defenses.Comprehensive Vulnerability Detection: Goes beyond published vulnerabilities, scanning for over 18,000 CVEs specific to OT/ICS binaries and nearly 140 CWEs across 30 CPU architectures.Integrated Automation: Combines tasks like disassembly, decompilation, and delta analysis into a unified “single pane of glass,” automating workflows traditionally requiring expert manual effort.Compliance Support: Maps to standards like NIST 800 and ISA/IEC 62443, helping organizations meet security and regulatory requirements.Flexible Deployment Options: Supports both on-premises (including Kubernetes clusters) and cloud environments, catering to the needs of DoD, government, and critical infrastructure sectors.

Serving a Broad Range of Users:

Red Teams, Reverse Engineers, Threat Hunters, and Vulnerability Researchers: Accelerate workflows and gain deeper insights.DevSecOps Engineers, QA Testers, and Developers: Detect vulnerabilities missed by source code analysis and integrate findings into DevSecOps pipelines.Operators, Procurement Teams: Mitigate supply chain risks by analyzing software during procurement, deployment, and patching, including legacy devices.

Availability

BinLens™ 3.0 is officially available starting today, November 15, 2024. Organizations can obtain the latest version directly from ObjectSecurity or through our network of authorized partners. For more information on licensing options or to schedule a demo, please visit ObjectSecurity BinLens at https://objectsecurity.com/binlens.

About ObjectSecurity

ObjectSecurity LLC is a trusted leader in solving complex, evolving cybersecurity and supply chain risk challenges that threaten national security and critical operations. Specializing in advanced cybersecurity solutions for both IT and OT/ICS systems, ObjectSecurity focuses on automating and streamlining security processes. With innovative tools like BinLens™, the company empowers organizations to proactively identify and mitigate vulnerabilities at their core—within software code and data.

ObjectSecurity’s holistic, proactive approach is designed to prevent cyberattacks and minimize production downtime across critical industries, including military defense, municipal smart cities, public and private transportation, energy, wastewater treatment, power utilities, manufacturing, and life sciences.

With over two decades of experience, ObjectSecurity has been a trusted provider of cybersecurity and supply chain risk management solutions to U.S. defense and federal agencies. Today, these cutting-edge technologies are commercially available to government and private sector organizations.

Headquartered in San Diego, CA, ObjectSecurity is a privately held company with a global presence.

For more information, visit

BinLens™ https://objectsecurity.com/binlens

ObjectSecurity https://objectsecurity.com

Media Contact

Dan Mathews, ObjectSecurity LLC, 1 6505153391, press@objectsecurity.com, https://objectsecurity.com

View original content to download multimedia:https://www.prweb.com/releases/objectsecurity-releases-binlens-3-0-for-advanced-binary-vulnerability-analysis-302310310.html

SOURCE ObjectSecurity LLC

Continue Reading

Technology

Hydra X Becomes the first Licensed Custodian in APAC to Provide Custody for Canton Coin

Published

on

By

SINGAPORE, Nov. 20, 2024 /PRNewswire/ — Hydra X today announced that it is the first licensed custodian in APAC to provide custody for Canton Coin, marking a significant milestone for both Hydra X and the Canton Network ecosystem. In this groundbreaking collaboration, SBIVC will become the first Canton Network ecosystem member to leverage Hydra X’s industry-leading custody services for Canton Coin.

Supporting Canton Coin will enable Hydra X’s clients across APAC, such as SBIVC, to bring regulatory-grade digital assets to market, utilizing the full potential of tokenization and Canton Network’s privacy-first architecture. Hydra X will partner with Digital Asset to integrate its tokenization utility, allowing institutional clients to securely issue and manage digital assets while maintaining full control over privacy and data sovereignty—a hallmark feature of the Canton Network.

“SBIVC is excited to be the first Canton Network ecosystem member to leverage Hydra X’s industry-leading custody services for Canton Coin. Hydra X’s strong track record in regulatory compliance and security makes it an ideal partner for this initiative. This partnership is a crucial step in delivering the secure, privacy-preserving infrastructure that is required to foster confidence in digital assets for institutional players across APAC,” said Eiichiro So, CEO of SBIVC.

“Becoming the first licensed custodian in APAC to support Canton Coin is a significant achievement for Hydra X,” said Ng Wee Hao, COO of Hydra X. “This partnership with Digital Asset and SBIVC enables us to leverage the full power of the Canton Network’s privacy and security features, reinforcing our commitment to providing secure, regulatory-compliant solutions.  Our clients can now confidently navigate the digital assets space, supported by a scalable solution that meets the highest regulatory standards.”

About Hydra X:

Hydra X is a regulated capital markets infrastructure company, developing technology and financial services to power the next generation of tokenized financial markets. Its comprehensive solutions span the entire capital markets lifecycle, from securitization, primary issuance and secondary trading, to custody and settlement.

As a regulated digital asset custodian licensed by the Monetary Authority of Singapore, Hydra X provides institutional-grade custodial services for a broad range of digital assets, including security tokens and digital payment tokens, and is one of the largest security token custodians in APAC.

For more information, visit our website or Linkedin.

View original content to download multimedia:https://www.prnewswire.com/apac/news-releases/hydra-x-becomes-the-first-licensed-custodian-in-apac-to-provide-custody-for-canton-coin-302309323.html

SOURCE Hydra X

Continue Reading

Technology

Cargobase Secures SOC 2 Compliance For Leading Spot Freight Automation & Transportation Management System (TMS)

Published

on

By

SINGAPORE, Nov. 20, 2024 /PRNewswire/ — Cargobase, a logistics technology platform for enterprise shippers, today announced that it has achieved SOC 2 Type II compliance, specifically meeting the Security, Availability and Confidentiality (SAC) Trust Services Criteria. This independent verification underscores Cargobase’s commitment to data security, system reliability and the protection of sensitive information, reinforcing the company’s dedication to setting industry benchmarks in secure logistics solutions. This attestation complements Cargobase’s ISO 27001 certification, further strengthening the foundation of trust our customers rely on.

“We’re proud to announce that Cargobase has achieved SOC 2 Type II compliance, demonstrating our commitment to data security and meeting the evolving needs of our clients. Recognizing the growing importance of this requirement within the industry, we’ve invested in robust security measures to provide our customers with the confidence and assurance they require,” said Wiebe Helder, CEO at Cargobase.

“In the dynamic world of logistics and supply chain management, large volumes of sensitive data are exchanged daily,” said Arnout Wagenaar, Chief Strategy Officer at Cargobase. “Data security is paramount for our customers, who entrust us with information critical to their operations. Achieving SOC 2 Type II compliance underscores our unwavering commitment to data integrity and protection, thus building trust with our partners and allowing us to better serve the needs of enterprise shippers worldwide.”

Understanding SOC 2 Compliance

The SOC 2 framework is a globally recognized standard developed by the American Institute of CPAs (AICPA). It focuses on Trust Services Criteria, including Security, Availability and Confidentiality to ensure that systems are protected from unauthorized access, reliably available to customers and employees, and that sensitive information remains confidential.

What is SOC 2 Type II Compliance?

Obtaining a SOC 2 report involves a CPA audit to attest to an organization’s security controls. It aims to determine whether the controls put in place are designed correctly.

Type I reports evaluate an organization’s controls at a single point in time, whereas a Type II report examines how well those controls perform over a period of time (typically 3-12 months).

What it means for our customers

This achievement reaffirms Cargobase’s position as a trusted partner for enterprise shippers worldwide. By prioritizing data security, we empower our clients to navigate the complexities of global logistics with peace of mind.

ABOUT CARGOBASE

Founded in Singapore in 2013, Cargobase is a global logistics software company whose mission is to simplify logistics for all. Its solution: “Logistics Software That Works”.

The Cargobase platform is designed for shippers to manage their local, regional or global supply chains across all freight modes, giving logistics professionals the visibility and control to make better decisions from day one.

Cargobase TMS is used in 50 countries by leading enterprise shippers across Automotive, Semiconductor, Oil & Gas and Industrial Machinery sectors. Cargobase has offices in Singapore, Malaysia, Netherlands, Mexico, and the United States.

For more information, visit www.cargobase.com.

View original content:https://www.prnewswire.com/apac/news-releases/cargobase-secures-soc-2-compliance-for-leading-spot-freight-automation–transportation-management-system-tms-302309324.html

SOURCE Cargobase Pte Ltd

Continue Reading

Trending