logo
AWS invites global startups to apply for AI accelerator with USD $1 million credits

AWS invites global startups to apply for AI accelerator with USD $1 million credits

Techday NZ10-06-2025

AWS has opened applications for the third cohort of its global Generative AI Accelerator programme, which aims to support early-stage startups building foundational generative AI technologies.
Programme details
The eight-week accelerator is designed to provide up to 40 selected startups worldwide—ten of which will be from the Asia-Pacific and Japan region—with up to USD $1 million in AWS credits, technical guidance and mentorship, go-to-market support, and access to AWS's generative AI technology stack.
The focus for 2025 is on startups working on core generative AI technology, including model building, infrastructure, fine-tuning tools, and agentic workflows. AWS is seeking to support companies developing foundational elements that will underpin the next stage of AI advancements. Companies participating in the accelerator should have a functioning Minimum Viable Product (MVP), some customer traction, and a strong technical team; prior experience with AWS is not required.
Participants will benefit from a hybrid programme, comprising virtual sessions and an in-person launch at AWS's headquarters in Seattle. The programme concludes with a showcase at the end of the eight weeks.
Support for global inclusion
The 2025 cohort will be selected from across North America, Asia Pacific and Japan, Europe, Middle East and Africa, and Latin America. Startups building large language models, infrastructure tools, fine-tuning platforms, or foundational agents are especially encouraged to apply. AWS will also provide industry-specific mentoring, as well as support for companies operating at the infrastructure and application layers.
In the words of Jon Jones, Vice President and Global Head of Startups at AWS: "We are now at a stage where virtually all startups will be applying generative AI to their business in one shape or form. That's why for this year's accelerator, we are honing our focus to support those startups developing the foundational technologies that will define what's possible with AI. This year's program is part of our continued commitment to accelerate generative AI innovation around the world by providing ground-breaking startups with the credits, mentorship, and visibility they need to scale with confidence."
Impact from previous cohorts
Since its launch, AWS reports over 100 startups have participated in the Generative AI Accelerator, reaching important milestones and contributing to industry transformation. Australian startup Leonardo.AI, which developed a set of generative AI tools for creators, reduced video and image production times significantly and reached more than seven million users. This growth led to its acquisition by Canva in July 2024.
Last year, four Australian startups—Contact Harald, Marqo, Relevance AI, and Splash Music—were selected for the programme. Their experiences underscore the value participants derive not only from technical enablement but also increased exposure and commercial support.
Sharing insights into the programme's influence, Tiffany Bloomquist, Head of Startups, Asia-Pacific & Japan, AWS, commented: "Startups are at the forefront of generative AI innovation, and we're proud to support the bold founders who are redefining what's possible with AI. The third cohort of the AWS Generative AI Accelerator reflects our continued commitment to helping these builders scale generative AI innovation and bring real-world impact across industries. This program is more than just a launchpad for startups – it's also a powerful learning opportunity for us. These entrepreneurs keep us close to the pulse of innovation and inspire new ways we can harness the cloud and AI as a force for positive global change."
Participant experiences
Simon Kohl, Chief Executive Officer and founder of Latent Labs, which joined the 2024 cohort, said: "At Latent Labs, we are building AI foundation models to make biology programmable and accelerate and improve drug discovery. The AWS Generative AI Accelerator offered us a unique blend of technical depth and commercial reach, which was instrumental in accelerating both our platform capabilities and our market adoption. AWS moves quickly to adapt to the fast-evolving generative AI landscape, not just with infrastructure and tooling, but with programs designed to help generative AI startups scale. As a founder, you gain access to an ecosystem that understands both the demands of building cutting-edge AI systems and the importance of aligning those systems with real-world customer needs."
Tracy Chan, Chief Executive Officer at Splash Music, shared the impact on their business: "At Splash Music, we're reimagining how music is created and discovered, transforming it from a background activity into the interactive, expressive experience Gen Z consumers connect with. The AWS accelerator was a game-changer for us. It gave us early access to cutting-edge AWS tools like SageMaker HyperPod and Trainium, plus hands-on support to migrate our models from a previous provider, significantly accelerating our research velocity and model performance. Beyond the tech, AWS's support with go-to-market strategy, public exposure, and hiring world-class talent helped us hit milestones faster than planned. For any startup building, GAIA is a no-brainer."
Continued commitment
The 2025 AWS Generative AI Accelerator is intended to maintain the momentum of the previous cohorts, supporting startups developing core generative AI technologies and fostering a diverse international community of founders and technical teams.

Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Tonga's Health System Hit By Cyberattack
Tonga's Health System Hit By Cyberattack

Scoop

time2 days ago

  • Scoop

Tonga's Health System Hit By Cyberattack

A team of Australian cyber experts flew to Tonga this week after the country's National Health Information System was breached, leading to a demand for payment from the hackers. Talanoa O Tonga reports the Health Minister Dr Ana Akauola saying the system has been shut down, and staff are handling data manually. Dr Akauola said that hackers encrypted the system and demanded payment, but she has assured MPs "the hackers won't damage the information" on the system. This system was introduced in 2019 with Asian Development Bank (ADB) support to digitise Tonga's health records before going "live" in 2021. Police Minister Paula Piukala was critical of past governments for ignoring warnings that Tonga's digital infrastructure is not fully prepared for these threats. Journalist Sifa Pomana said the hackers are demanding millions of dollars, according to Tonga Police. Residents are being urged to bring essential records to the hospital to help with manual record-keeping.

Exclusive: Logistics firms face rising OT cyber threats amid global tensions
Exclusive: Logistics firms face rising OT cyber threats amid global tensions

Techday NZ

time2 days ago

  • Techday NZ

Exclusive: Logistics firms face rising OT cyber threats amid global tensions

Cyber attackers are increasingly targeting logistics and supply chain networks, aiming to destabilise nations and gain strategic leverage without ever crossing a border. According to Leon Poggioli, ANZ Regional Director at Claroty, the recent cyber espionage affecting logistics firms supporting Ukraine is not an isolated trend but part of a broader pattern. "There's two key reasons nation states do this," he explained during a recent interview with TechDay. "One is to disrupt the other nation's defences, and the other is to put political pressure on the general public by interfering with their supply chains." These attacks frequently target operational technology (OT) systems - the core infrastructure behind physical processes in logistics, energy, manufacturing and healthcare. Poggioli said attackers exploit connectivity in these environments to carry out sabotage remotely. "A lot of these environments have some kind of external connectivity, so that gives an attacker an ability to remotely trigger a cyber attack and disrupt those supply chains." In some cases, tactics have extended to disrupting weapons infrastructure, such as drones. "When one nation uses drones, the other will defend itself by trying to jam signals and disrupt that infrastructure," he explained. Compared to IT systems, OT vulnerabilities can be far more complex and risky to remediate. Poggioli noted that in OT, even small changes can impact safety and operations. "In the IT world, it's easy to push patches out," he said. "In OT, even a minor change can disrupt operations, so remediation needs to be more targeted." Claroty's platform is built to help organisations quickly cut through large volumes of vulnerability data to find what really matters. "A site may have 1,000 vulnerabilities, but we can whittle that down to the five that make the most impact," he said. "That becomes a manageable number that a cyber leader and OT asset manager can act on within weeks." Recent data from Claroty's global survey of cybersecurity professionals reinforces the growing financial and operational risks posed by cyber attacks on cyber-physical systems (CPS). Nearly half of respondents (45%) reported financial impacts of $500,000 USD or more from such attacks in the past year, with over a quarter suffering losses of at least $1 million. These costs were largely driven by lost revenue, recovery expenses, and employee overtime. "It's a growing concern across multiple sectors, particularly in chemical manufacturing, energy, and mining – more than half of organisations in those sectors reported losses over half a million dollars," Poggioli said. Ransomware remains a major burden, especially in sectors like healthcare where 78% of organisations reported paying over $500,000 to regain access to encrypted systems. "These are real costs, not theoretical risks," he added. "And they're rising." Operational downtime is also widespread. Nearly half of global respondents experienced more than 12 hours of downtime following an attack, with one-third suffering outages lasting a full day or more. "When operations halt, the financial and reputational damage mounts quickly," Poggioli said. He added that one of the most pressing vulnerabilities is the level of remote access in these environments. "We're seeing around 45% of CPS assets connected to the internet," he said. "Most of that is done through VPNs that were never built for OT security." Third-party access is another growing concern, with 82% of respondents saying at least one cyber attack in the past year came through a supplier. Nearly half said five or more attacks stemmed from third-party connections, yet 63% admit they don't fully understand how these third parties are connected to their CPS environment. Poggioli pointed to this as a critical blind spot. "Legacy access methods and poor visibility are allowing attackers in through the back door," he said. Even more concerning is the risk from insiders. "You want to be able to trust your team, but someone with inside knowledge can do more damage than an external attacker," Poggioli said. "Even air-gapped environments need constant monitoring." A cyber attack on Denmark's power grid in 2023 served as a wake-up call. "One operator didn't even know they had the vulnerable firewall in their system," he said. "That's why visibility is so important. You can't secure what you don't know exists." While preparedness across the logistics sector varies, Poggioli believes the industry is slowly recognising the strategic value of cybersecurity. "It's going to become a point of competitive advantage," he said. "Customers are going to start asking serious questions about cyber security and supply chain integrity." He drew a sharp distinction between cyber criminals and state-backed actors. "Cyber criminals want fast financial gain, but nation states are more focused on political objectives," he said. "They have better resources and longer timelines. That changes the game." Poggioli warned that just because no incident has occurred doesn't mean attackers aren't already embedded in critical networks. "There's growing evidence of adversaries nesting in these systems," he said. "My hypothesis is they're preparing for future conflict. If war breaks out, they're already in position to strike." For logistics firms looking to strengthen their defences, Poggioli said the first step is basic visibility. "Most people I speak to admit they don't know 100% what's out there or how it's connected," he said. "Start with an asset inventory. Once you have that, you can start risk modelling and reduce exposure." There are signs that resilience strategies are making a difference. According to the Claroty report, 56% of professionals now feel more confident in their CPS systems' ability to withstand cyber attacks than they did a year ago, and 72% expect measurable improvements in the next 12 months. Still, Poggioli said complacency is not an option. "If you don't know how big the problem is, you won't know how to solve it," he said. "Once you understand the risks, you can act to protect your operations and show the business the value of cyber security."

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store