Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Application Security

BoostSecurity Exits Stealth With DevSecOps Automation Platform, $12M in Seed Funding

BoostSecurity on Wednesday emerged from stealth mode with a DevSecOps automation platform and $12 million in seed funding.

BoostSecurity on Wednesday emerged from stealth mode with a DevSecOps automation platform and $12 million in seed funding.

BoostSecurity has developed what it describes as a zero friction DevSecOps automation platform that can help organizations quickly detect and fix vulnerabilities in their code. It provides visibility into software pipelines, allows users to prioritize and address issues, and enables organizations to define security policies.

Developers are notified about security issues while they are coding and the organization can keep track of their progress. In addition, customers can generate SBOMs across their entire supply chain.

The company provides an open source app that is available on GitHub. Customers can also use other open source scanners that integrate with BoostSecurity, including Bandit, Brakeman, Trivy, Semgrep, GoSec, GitLeaks, and Checkov.

BoostSecurity headquarters are in Montreal, Canada, but the firm also has operations in California. The company has obtained funding from Sorenson Capital, Hoxton Ventures, Golden Ventures, Firebolt Ventures and Transform VC, and it plans on using the money for go-to-market and engineering initiatives.

“BoostSecurity empowers organizations of any size to implement the same DevSecOps processes and technologies that the most advanced organizations have refined, ultimately closing the trust gap between DevOps and security,” said Zaid Al Hamami, CEO at BoostSecurity. “Our platform enables early detection and remediation of security vulnerabilities at every layer of the stack while ensuring the continuous integrity of the software supply chain at every step from the developer’s keyboard to cloud production.”

Related: The VC View: The DevSecOps Evolution and Getting “Shift Left” Right

Related: Shifting to DevSecOps Is as Much About Culture as Technology and Methodology

Advertisement. Scroll to continue reading.

Related: DevSecOps Company apiiro Emerges From Stealth With $35 Million in Funding

Related: DevSecOps Firm Spectral Emerges From Stealth With $6.2 Million in Funding

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Mike Dube has joined cloud security company Aqua Security as CRO.

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Cybersecurity Funding

SecurityWeek investigates how political/economic conditions will affect venture capital funding for cybersecurity firms during 2023.

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.

CISO Strategy

Security professionals understand the need for resilience in their company’s security posture, but often fail to build their own psychological resilience to stress.