Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

3/28/2016
09:40 AM
Marilyn Cohodas
Marilyn Cohodas
Slideshows
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

6 Hot Cybersecurity Startups: MACH37s Spring Class Of 2016

Intense 90-day program mentors budding entrepreneurs in the finer points of developing a viable technology business for the real world of information security.
Previous
1 of 9
Next

Image Source: Pixabay

Image Source: Pixabay

The race is on for six teams of technologists and entrepreneurs from the Mid-Atlantic, Pacific Northwest, Northeast United States and Turkey to turn their ideas -- seeded by a $50,000 grant from the Virginia-based MACH37 Cyber Accelerator -- into thriving investable companies. 

The teams were chosen from a pool of 61 applicants. “We were looking for management teams that include technology founders and first-term entrepreneurs who have vision and want to create something compelling,” says Rick Gordon, managing partner of MACH37. More specifically, information security and business leaders who:

  • Are building a disruptive information security technology product
  • Are delivering foundational security capabilities that enable entirely new products & markets
  • Have the will and endurance to turn their labor into commercial success
  • Have built a team of two- to four co-founders
  • Need help with startup capital, introductions, and navigating pitfalls
  • Are seeking rapid growth through venture capital
  • Are willing to be in Virginia for the entire 90-day program and commit to the venture full-time

Gordon says this year’s spring cohort offers a diverse range of innovative solutions attacking problems ranging from phishing and attribution in threat intelligence, to “security as a service” and regulatory compliance, to the Internet of Things with an intrusion detection system for automotive infotainment systems.

Participants for the next 14 weeks will draw on the expertise of MACH37’s large network of successful security professionals, business experts, and entrepreneurs. The program will culminate in June with a “Demo Day” where the entrepreneurs pitch and demonstrate their technology to an audience of external mentors, investors, and stakeholders.

Interop 2016 Las VegasFind out more about security threats at Interop 2016, May 2-6, at the Mandalay Bay Convention Center, Las Vegas. Click here for pricing information and to register.

 

Marilyn has been covering technology for business, government, and consumer audiences for over 20 years. Prior to joining UBM, Marilyn worked for nine years as editorial director at TechTarget Inc., where she launched six Websites for IT managers and administrators supporting ... View Full Bio
 

Recommended Reading:

Previous
1 of 9
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Enterprise Cybersecurity Plans in a Post-Pandemic World
Download the Enterprise Cybersecurity Plans in a Post-Pandemic World report to understand how security leaders are maintaining pace with pandemic-related challenges, and where there is room for improvement.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-29763
PUBLISHED: 2021-09-16
IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 11.1 and 11.5 under very specific conditions, could allow a local user to keep running a procedure that could cause the system to run out of memory.and cause a denial of service. IBM X-Force ID: 202267.
CVE-2021-29825
PUBLISHED: 2021-09-16
IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) could disclose sensitive information when using ADMIN_CMD with LOAD or BACKUP. IBM X-Force ID: 204470.
CVE-2021-29842
PUBLISHED: 2021-09-16
IBM WebSphere Application Server 7.0, 8.0, 8.5, 9.0 and Liberty 17.0.0.3 through 21.0.0.9 could allow a remote user to enumerate usernames due to a difference of responses from valid and invalid login attempts. IBM X-Force ID: 205202.
CVE-2021-29752
PUBLISHED: 2021-09-16
IBM Db2 11.2 and 11.5 contains an information disclosure vulnerability, exposing remote storage credentials to privileged users under specific conditions. IBM X-Fporce ID: 201780.
CVE-2021-34798
PUBLISHED: 2021-09-16
Malformed requests may cause the server to dereference a NULL pointer. This issue affects Apache HTTP Server 2.4.48 and earlier.