Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


02:45 PM
Connect Directly

Game Change: Meet the Mach37 Fall Startups

CEOs describe how they think their fledgling ventures will revolutionize user training, privacy, identity management and embedded system security.
3 of 7


Consumer-level data privacy and security platform

Heather Dahl, CEO

Please describe your product/service and the security pain point you are trying to address.
CynjaTech offers consumers privacy control in their digital life, and in doing so, solves the problem of data security. As regulators and consumer backlash drives the need for privacy, businesses and developers need a way to secure data AND offer consumers peace of mind about knowing how their data is being used. The combination of proprietary encryption methods, distributed microcloud storage and blockchain identity offers cost-effective data security. Our CynjaTrust platform provides a competitive advantage by offering privacy+security at a very low cost. Our advantage comes from solving both problems in one package.

How market-ready is your product/service?
Families can already benefit from the security and privacy controls the CynjaTrust platform offers by downloading the CynjaSpace Internet safety app for kids. It is a single app that combines the safety, control and activity reports of a childs digital life that parents need with the fun and freedom that kids want when using the Web and chatting with friends. Children chat with approved contacts, learn responsible digital behavior, while parents can easily manage their childs online digital presence with convenient controls, alerts, time limits and activity monitors. By using the CynjaTrust platform, families own and control their childs data by preventing it from being tracked, sold or owned by third parties.

What is your biggest competitive differentiator?
We offer a competitive advantage to any enterprise, developer, digital marketplace or institution by providing privacy controls, individual data ownership and regulatory compliance. CynjaTrust is a privacy and security platform. It gives consumers control of their data while still allowing businesses access. Our proprietary controls and always-on protections combine privacy and security, problems others are solving independently. Privacy and data ownership are the future of the digital experience.

3 of 7
Comment  | 
Print  | 
Newest First  |  Oldest First  |  Threaded View
User Rank: Author
10/20/2017 | 2:19:52 PM
Congrats to all the new companys. - Syncurity Mach37 Fall 2014
User Rank: Apprentice
10/20/2017 | 12:58:46 AM
Dissertation Writing Service
Thanks for sharing
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/9/2020
Omdia Research Launches Page on Dark Reading
Tim Wilson, Editor in Chief, Dark Reading 7/9/2020
Mobile App Fraud Jumped in Q1 as Attackers Pivot from Browsers
Jai Vijayan, Contributing Writer,  7/10/2020
Register for Dark Reading Newsletters
White Papers
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-07-13
Affected versions of Atlassian Jira Server and Data Center allow remote attackers to access sensitive information without being authenticated in the Global permissions screen. The affected versions are before version 8.8.0.
PUBLISHED: 2020-07-13
The Gadget API in Atlassian Jira Server and Data Center in affected versions allows remote attackers to make Jira unresponsive via repeated requests to a certain endpoint in the Gadget API. The affected versions are before version 8.5.4, and from version 8.6.0 before 8.6.1.
PUBLISHED: 2020-07-13
Affected versions of Atlassian Jira Server and Data Center allow remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the Add Field module. The affected versions are before version 8.7.0.
PUBLISHED: 2020-07-13
The avatar upload feature in affected versions of Atlassian Jira Server and Data Center allows remote attackers to achieve Denial of Service via a crafted PNG file. The affected versions are before version 8.5.4, from version 8.6.0 before 8.6.2, and from version 8.7.0 before 8.7.1.
PUBLISHED: 2020-07-10
Django Two-Factor Authentication before 1.12, stores the user's password in clear text in the user session (base64-encoded). The password is stored in the session when the user submits their username and password, and is removed once they complete authentication by entering a two-factor authenticati...