Connect with us

Hi, what are you looking for?


Application Security

DevSecOps Firm Spectral Emerges From Stealth With $6.2 Million in Funding

DevSecOps company Spectral on Wednesday emerged from stealth mode with $6.2 million in seed funding from Israeli venture capital firms Amiti and MizMaa.

DevSecOps company Spectral on Wednesday emerged from stealth mode with $6.2 million in seed funding from Israeli venture capital firms Amiti and MizMaa.

Spectral is based in Tel Aviv, Israel, and it was founded in mid-2020 by Dotan Nahum, who will serve as the company’s CEO, Lior Reuven, Uri Shamay and Idan Didi.

SpectralSpectral says it has developed a solution that is designed to help organizations quickly and easily find potentially costly security-related issues — such as unintentional exposure of internal API keys and passwords — in code, configurations and other developer assets, without disrupting workflows.

The solution uses a set of detectors that is continuously expanded, being able to scan any programming language. Customers can also build their own detectors using a purpose-built query language named SPEQL.

Spectral works with many developer systems and it can be integrated with tools such as Jenkins, Travis and CircleCI, as well as plugins for products and frameworks such as Netlify, Webpack and Gatsby. The company says the customer’s code and other assets are never sent outside their perimeter.

“Scanning tools today take long minutes or even hours to run in a given pipeline,” Nahum said. “Developers just don’t have that kind of time, or the funds (many CI providers meter by the minute). Some developers are so overwhelmed by slow, irrelevant, and non-intuitive results that they stop using scanners altogether. There’s an obvious need for a robust yet simple, fast yet extensive product that’s developer-first and won’t slow down DevSecOps and CI/CD pipelines.”

Spectral claims its platform is already used by some major organizations.

Related: Source Code Security Firm Cycode Launches With $4.6 Million in Funding

Advertisement. Scroll to continue reading.

Related: Cloud Security Company Accurics Emerges From Stealth Mode

Related: Cloud Security Firm Wiz Emerges From Stealth With $100M in Funding

Related: Online Infrastructure Security Firm Cyberpion Emerges From Stealth

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join security experts as they discuss ZTNA’s untapped potential to both reduce cyber risk and empower the business.


Join Microsoft and Finite State for a webinar that will introduce a new strategy for securing the software supply chain.


Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Cybersecurity Funding

SecurityWeek investigates how political/economic conditions will affect venture capital funding for cybersecurity firms during 2023.

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...