Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Operations

9/2/2014
11:00 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

MACH37 Launches the Fall 2014 Class of Cybersecurity Startups

Six companies selected.

September 2, 2014 (HERNDON, Va.) – The MACH37™ Cyber Accelerator announced today the launch of its Fall 2014 session for cybersecurity startups. The six companies were selected to participate in the Fall Cohort based upon their innovative approach to solving real world security issues, unique technology, and disruptive market solutions.

As a focused business accelerator, MACH37™ brings together domain experts, successful cybersecurity entrepreneurs, and investors familiar to the security market to create a platform for success for innovators and their startups.  The MACH37™ program consists of an intense 90-day program in which the selected startups are mentored in all aspects of creating a sustainable and successful business.  Participants receive a $50,000 investment to develop and launch their ideas into emerging, investable companies. By drawing on MACH37™’s large network of successful security professionals, business experts and entrepreneurs, companies involved in the program are guided toward creating successful cyber security companies that can establish market leadership positions.  

 “Our Fall class of companies brings an impressive, innovative collection of solutions to vexing security and business issues,” said Rick Gordon, Managing Partner of MACH37™.  “We actively engage security innovators globally who bring fresh approaches to thwarting an increasingly aggressive worldwide cyber threat.  We’re excited to welcome our six startups and look forward to introducing them to our network of successful security business leaders, investors, and to a market looking for security solutions that reduce that threat.”

Six companies were selected for the Fall 2014 Cohort of MACH37™:

-       BiJoTi – @BiJoTi – Joshua Marpet, Cofounder and CEO

-       CypherChat (www.cypherchat.org) @CypherChatHQ – Ryan Lester, Cofounder and CEO.

-       iAspire – @iAspireINC – Eric Whittleton, Cofounder and CEO

-       SecureDB (www.securedb.co) @SecureDB – Karthik Bhat, Founder and CEO

-       Syncurity Networks (www.syncurity.net) @syncurity – JP Bourget, Cofounder

-       Virgil Security – @VirgilSecurity – Michael Wellman, Cofounder and CEO

Investors, customers, partners, and future applicants are encouraged to visit MACH37™ and meet the Fall Class to experience the energy and breadth of ideas that we are honored to nurture and host.

About MACH37

MACH37™ is the premier accelerator for cybersecurity entrepreneurs and startups.  MACH37 goes beyond the traditional model of typical business accelerators by providing innovators with mentoring and support from an extensive network of visionaries, practitioners, and successful entrepreneurs in cybersecurity.  The Spring and Fall sessions are designed to propel graduating companies into the marketplace, tooled with the skills to grow and compete for funding and market share. MACH37™ was launched in 2013 by the Center for Innovative Technology, in Herndon, Virginia.  To learn more, please visit www.mach37.com.

 

About the Center for Innovative Technology

Since 1985, CIT, a nonprofit corporation, has been Virginia’s primary driver of innovation and entrepreneurship. CIT accelerates the next generation of technology and technology companies through commercialization, capital formation, market development and revenue generation services. To facilitate national innovation leadership and accelerate the rate of technology adoption, CIT creates partnerships between innovative technology start-up companies and advanced technology consumers. CIT’s CAGE Code is 1UP71. To learn more, please visit www.cit.org.  Follow CIT on Twitter @CITorg and add the Center for Innovative Technology on LinkedIn and Facebook.

 

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
When It Comes To Security Tools, More Isn't More
Lamont Orange, Chief Information Security Officer at Netskope,  1/11/2021
US Capitol Attack a Wake-up Call for the Integration of Physical & IT Security
Seth Rosenblatt, Contributing Writer,  1/11/2021
IoT Vendor Ubiquiti Suffers Data Breach
Dark Reading Staff 1/11/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-3113
PUBLISHED: 2021-01-17
Netsia SEBA+ through 0.16.1 build 70-e669dcd7 allows remote attackers to discover session cookies via a direct /session/list/allActiveSession request. For example, the attacker can discover the admin's cookie if the admin account happens to be logged in when the allActiveSession request occurs, and ...
CVE-2020-25533
PUBLISHED: 2021-01-15
An issue was discovered in Malwarebytes before 4.0 on macOS. A malicious application was able to perform a privileged action within the Malwarebytes launch daemon. The privileged service improperly validated XPC connections by relying on the PID instead of the audit token. An attacker can construct ...
CVE-2021-3162
PUBLISHED: 2021-01-15
Docker Desktop Community before 2.5.0.0 on macOS mishandles certificate checking, leading to local privilege escalation.
CVE-2021-21242
PUBLISHED: 2021-01-15
OneDev is an all-in-one devops platform. In OneDev before version 4.0.3, there is a critical vulnerability which can lead to pre-auth remote code execution. AttachmentUploadServlet deserializes untrusted data from the `Attachment-Support` header. This Servlet does not enforce any authentication or a...
CVE-2021-21245
PUBLISHED: 2021-01-15
OneDev is an all-in-one devops platform. In OneDev before version 4.0.3, AttachmentUploadServlet also saves user controlled data (`request.getInputStream()`) to a user specified location (`request.getHeader("File-Name")`). This issue may lead to arbitrary file upload which can be used to u...