Careers & People

12/8/2016
02:10 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Mach37 Announces New Platinum Sponsor: General Dynamics Mission Systems

Private sector sponsorship expedites Virginia's quest to become the cybersecurity capital of the world.

RICHMOND – Governor Terry McAuliffe today announced a significant new public-private partnership that will speed launch of new cybersecurity products and companies in Virginia, leading to new jobs and revenue. General Dynamics Mission Systems now will serve as a sponsor of the MACH37 Cyber Accelerator through an innovative funding and mentorship agreement.

“Cultivation of the next generation of cybersecurity, products and services is key to continued development of the New Virginia Economy,” said Governor McAuliffe. “Today’s announcement shows that government can leverage the capital and intellectual assets of the private sector for development of new companies and jobs. We are grateful to General Dynamics Mission Systems for their support of innovative, targeted economic development in our Commonwealth.

The MACH37 Cyber Accelerator program is designed to harvest university, industry and government cybersecurity assets to create innovative cybersecurity products and companies in Virginia. The program is administered by the Center for Innovative Technology (CIT) and originally was funded by the Virginia General Assembly. The Platinum Sponsorship just acquired by General Dynamics Mission Systems was created to supplement the original MACH37 funding. Sponsors directly participate in development of the most innovative cybersecurity product concepts in the market.

 “The MACH37 Cyber Accelerator is a prime example of how we are fostering growth by attracting the best talent in the world to Virginia,” noted Secretary of Technology Karen R. Jackson.  “Growth in the cybersecurity sector is valuable to Virginians for many reasons, so I’m particularly proud that the Commonwealth has become known globally as a premier location for cyber security innovation.”

“Our job is to help our customers successfully execute their missions in a domain that is predictably unpredictable,” said Nadia Short, vice president and general manager of the Cyber Systems line of business for General Dynamics Mission Systems. “MACH37 gives us access to Virginia’s smartest minds and innovative technologies, accelerating the delivery of cybersecurity products and solutions that our customers need, when they need it.”

 Initiated by CIT, the MACH37 program is an intense 90-day program in which competitively selected startups are coached in all aspects of creating a successful and sustainable business. Upon the completion of each session, the startups participate in a Demo Day where they pitch to a crowd of investors and industry experts.  Since opening in September 2013, MACH37 has held five classes and launched 29 new cybersecurity companies. 

The MACH37 Cyber Accelerator is currently accepting applications from information security product startups and security entrepreneurs to participate in its Spring 2016 (S16) Cohort session that begins on March 14th. Entrepreneurs with emerging products and companies from any geography are encouraged to apply and to immerse themselves in a mentorship program designed to produce the next generation of leading security product companies.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Want Your Daughter to Succeed in Cyber? Call Her John
John De Santis, CEO, HyTrust,  5/16/2018
New Mexico Man Sentenced on DDoS, Gun Charges
Dark Reading Staff 5/18/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
Surviving the IT Security Skills Shortage
Surviving the IT Security Skills Shortage
Cybersecurity professionals are in high demand -- and short supply. Find out what Dark Reading discovered during their 2017 Security Staffing Survey and get some strategies for getting through the drought. Download the report today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-11354
PUBLISHED: 2018-05-22
In Wireshark 2.6.0, the IEEE 1905.1a dissector could crash. This was addressed in epan/dissectors/packet-ieee1905.c by making a certain correction to string handling.
CVE-2018-11355
PUBLISHED: 2018-05-22
In Wireshark 2.6.0, the RTCP dissector could crash. This was addressed in epan/dissectors/packet-rtcp.c by avoiding a buffer overflow for packet status chunks.
CVE-2018-11356
PUBLISHED: 2018-05-22
In Wireshark 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14, the DNS dissector could crash. This was addressed in epan/dissectors/packet-dns.c by avoiding a NULL pointer dereference for an empty name in an SRV record.
CVE-2018-11357
PUBLISHED: 2018-05-22
In Wireshark 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14, the LTP dissector and other dissectors could consume excessive memory. This was addressed in epan/tvbuff.c by rejecting negative lengths.
CVE-2018-11358
PUBLISHED: 2018-05-22
In Wireshark 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14, the Q.931 dissector could crash. This was addressed in epan/dissectors/packet-q931.c by avoiding a use-after-free after a malformed packet prevented certain cleanup.