Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

1/28/2014
03:07 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

MACH37 Cybersecurity Accelerator Increases Initial Investment To $50K Per Company

MACH37 created to accelerate the development of the next generation of information security product companies

Herndon, VA (PRWEB) January 28, 2014

MACH37&trade, the new cybersecurity accelerator at the Center for Innovative Technology (CIT), is announcing that beginning with the start of its upcoming cohort in March that participating companies will receive a $50,000 investment in conjunction with accelerator services. This investment doubles the previous amount of $25,000.

Rick Gordon, MACH37&trade Managing Partner, said, "This additional financial investment will not only help Mach37 entrepreneurs attract complementary team members, but also will provide them with additional resources necessary to expand target market validation and further accelerate technology development."

MACH37&trade is an operating entity of the CIT that was created to accelerate the development of the next generation of information security product companies. The accelerator takes entrepreneurs through an intensive 90-day program to validate their ideas, technologies and markets, and ultimately launch companies that secure private investment for growth.

Upon acceptance into the program, companies receive a cash investment to complement program participation in exchange for a small amount of equity. Following completion of the program the CIT GAP Funds will match up to $100,000 for companies headquartered in Virginia. MACH37&trade companies will benefit from ongoing access to MACH37's vast network resources and support throughout the life of their enterprise.

MACH37&trade is accepting applications from information security startups and entrepreneurs for its Spring Cohort beginning March 17th. Applications may be submitted online at: https://www.mach37.com/apply. The deadline to submit is January 31.

For more information, please visit the MACH37&trade website or direct inquiries to Ledger West at ledger[dot]west[at]mach37[dot]com.

About MACH37

MACH37&trade is an information security startup accelerator focused on launching new product companies that will deliver the next generation of cybersecurity solutions. MACH37&trade was conceived and developed by the Center for Innovative Technology and is supported by a community of hundreds of security leaders who contribute to company development. Over 100 organizations including Lockheed Martin, In-Q-Tel, General Dynamics, Northern Virginia Technology Council, Virginia Tech, Intel, New Enterprise Associates and the Department of Defense were instrumental in developing MACH37&trade. To learn more, please visit https://www.mach37.com.

About the Center for Innovative Technology

Since 1985, CIT, a nonprofit corporation, has been Virginia's primary driver of innovation and entrepreneurship. CIT accelerates the next generation of technology and technology companies through commercialization, capital formation, market development and revenue generation services. To facilitate national innovation leadership and accelerate the rate of technology adoption, CIT creates partnerships between innovative technology start-up companies and advanced technology consumers. CIT's CAGE Code is 1UP71. To learn more, please visit http://www.cit.org. Follow CIT on Twitter @CITorg and add the Center for Innovative Technology on LinkedIn and Facebook.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Why Cyber-Risk Is a C-Suite Issue
Marc Wilczek, Digital Strategist & CIO Advisor,  11/12/2019
Unreasonable Security Best Practices vs. Good Risk Management
Jack Freund, Director, Risk Science at RiskLens,  11/13/2019
Breaches Are Inevitable, So Embrace the Chaos
Ariel Zeitlin, Chief Technology Officer & Co-Founder, Guardicore,  11/13/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-16761
PUBLISHED: 2019-11-15
A specially crafted Bitcoin script can cause a discrepancy between the specified SLP consensus rules and the validation result of the [email protected] npm package. An attacker could create a specially crafted Bitcoin script in order to cause a hard-fork from the SLP consensus. All versions >1.0...
CVE-2019-16762
PUBLISHED: 2019-11-15
A specially crafted Bitcoin script can cause a discrepancy between the specified SLP consensus rules and the validation result of the slpjs npm package. An attacker could create a specially crafted Bitcoin script in order to cause a hard-fork from the SLP consensus. Affected users can upgrade to any...
CVE-2019-13581
PUBLISHED: 2019-11-15
An issue was discovered in Marvell 88W8688 Wi-Fi firmware before version p52, as used on Tesla Model S/X vehicles manufactured before March 2018, via the Parrot Faurecia Automotive FC6050W module. A heap-based buffer overflow allows remote attackers to cause a denial of service or execute arbitrary ...
CVE-2019-13582
PUBLISHED: 2019-11-15
An issue was discovered in Marvell 88W8688 Wi-Fi firmware before version p52, as used on Tesla Model S/X vehicles manufactured before March 2018, via the Parrot Faurecia Automotive FC6050W module. A stack overflow could lead to denial of service or arbitrary code execution.
CVE-2019-6659
PUBLISHED: 2019-11-15
On version 14.0.0-14.1.0.1, BIG-IP virtual servers with TLSv1.3 enabled may experience a denial of service due to undisclosed incoming messages.