Careers & People
12/8/2016
02:10 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Mach37 Announces New Platinum Sponsor: General Dynamics Mission Systems

Private sector sponsorship expedites Virginia's quest to become the cybersecurity capital of the world.

RICHMOND – Governor Terry McAuliffe today announced a significant new public-private partnership that will speed launch of new cybersecurity products and companies in Virginia, leading to new jobs and revenue. General Dynamics Mission Systems now will serve as a sponsor of the MACH37 Cyber Accelerator through an innovative funding and mentorship agreement.

“Cultivation of the next generation of cybersecurity, products and services is key to continued development of the New Virginia Economy,” said Governor McAuliffe. “Today’s announcement shows that government can leverage the capital and intellectual assets of the private sector for development of new companies and jobs. We are grateful to General Dynamics Mission Systems for their support of innovative, targeted economic development in our Commonwealth.

The MACH37 Cyber Accelerator program is designed to harvest university, industry and government cybersecurity assets to create innovative cybersecurity products and companies in Virginia. The program is administered by the Center for Innovative Technology (CIT) and originally was funded by the Virginia General Assembly. The Platinum Sponsorship just acquired by General Dynamics Mission Systems was created to supplement the original MACH37 funding. Sponsors directly participate in development of the most innovative cybersecurity product concepts in the market.

 “The MACH37 Cyber Accelerator is a prime example of how we are fostering growth by attracting the best talent in the world to Virginia,” noted Secretary of Technology Karen R. Jackson.  “Growth in the cybersecurity sector is valuable to Virginians for many reasons, so I’m particularly proud that the Commonwealth has become known globally as a premier location for cyber security innovation.”

“Our job is to help our customers successfully execute their missions in a domain that is predictably unpredictable,” said Nadia Short, vice president and general manager of the Cyber Systems line of business for General Dynamics Mission Systems. “MACH37 gives us access to Virginia’s smartest minds and innovative technologies, accelerating the delivery of cybersecurity products and solutions that our customers need, when they need it.”

 Initiated by CIT, the MACH37 program is an intense 90-day program in which competitively selected startups are coached in all aspects of creating a successful and sustainable business. Upon the completion of each session, the startups participate in a Demo Day where they pitch to a crowd of investors and industry experts.  Since opening in September 2013, MACH37 has held five classes and launched 29 new cybersecurity companies. 

The MACH37 Cyber Accelerator is currently accepting applications from information security product startups and security entrepreneurs to participate in its Spring 2016 (S16) Cohort session that begins on March 14th. Entrepreneurs with emerging products and companies from any geography are encouraged to apply and to immerse themselves in a mentorship program designed to produce the next generation of leading security product companies.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
5 Security Technologies to Watch in 2017
Emerging tools and services promise to make a difference this year. Are they on your company's list?
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.