- Threat Status: Active

Critical infrastructure is under attack. We built the defense.

The power grid, water systems, and public services your community depends on are being actively targeted by nation-state actors and ransomware groups. This is not a future threat. It is happening now. Spotlight exists because the current state of critical infrastructure protection is dangerously inadequate β€” and we built the fix.

The problem

The tools meant to protect us were never built for this fight.

🏚️

Legacy systems built for a different era

Most critical infrastructure security tools were designed for IT and retrofitted β€” poorly β€” for OT. They alert. They don't fix. Every remediation requires an expensive professional services engagement, and your OT environment stays largely blind.

πŸ“ˆ

Cyber insurance premiums are skyrocketing

Premiums for critical infrastructure operators have surged dramatically β€” doubling year-over-year in some sectors. Insurers now demand evidence of active monitoring and documented remediation. Most organizations can't provide it.

πŸ‘€

One person defending critical systems

In 55% of utilities and municipalities, a single IT generalist secures systems that protect entire communities β€” without the staffing, budget, or specialized tools to do it. Enterprise platforms were never priced for them. Spotlight is.

The gap between detection and remediation is where catastrophe lives.

When an attacker moves in minutes and the average fix takes 24 hours or more, that window is where damage happens. Colonial Pipeline. Oldsmar water treatment. Rural electric cooperatives. These weren't failures of awareness β€” they were failures of capability. The market responded with tools that cost more, require more expertise, and still only detect.

$4.5m

Average cost of a critical infrastructure breach

Exceeding the annual security budget of most small utilities

300%

Cyber insurance premium increases

Across critical infrastructure sectors in three years

$40B

Critical infrastructure security market by 2028

Growing at 18% CAGR β€” still underserving those who need it most

Why Spotlight Exists

Research-backed.Offensively informed.Built to defend.

Spotlight wasn’t built by an AI startup that pivoted into cybersecurity. We were built from the ground up by a team with deep roots in national security research, offensive AI development, and applied machine learning β€” specifically to solve this problem.

Our work has been informed by the NSA, NIST, and the White House Office of the National Cyber Director. Our models are trained on military-grade scenarios and nation-state offensive tradecraft β€” because you cannot build world-class defense without understanding the offense.

The result is a platform that doesn’t just detect threats β€” it remediates them. On the device. In real time. Without professional services. Without the 24-hour gap that turns incidents into catastrophes.

πŸ›οΈ

NSA Β· NIST Β· White House Cyber Director

Research and advisory work at the highest levels of US national cybersecurity β€” the same agencies defining the standards we build to.

πŸ€–

Frontier AI Research

We built LLM evaluation tools used by Anthropic, Google, and Accenture. We don't integrate off-the-shelf models β€” we build purpose-specific ones.

⚑

Berkshire Hathaway Energy Β· UK AISI

Development partnerships with critical infrastructure operators and government AI safety bodies β€” tested against real environments, not simulated ones.

πŸ†

MassChallenge Β· Open Philanthropy Β· Big League Capital

Selected for one of the world's most competitive accelerators. Backed by $2.1M in non-dilutive funding and a lead seed investor aligned with our urgency.

πŸŽ“

NYU Β· Institute for Security + Technology

Academic partnerships grounding our research in rigorous methodology and connecting us to the broader national security and AI safety communities.

How we think

Three principles that shape everything we build.

01

Offense informs defense.

The best defenders think like attackers. Our detection and remediation logic is trained on actual nation-state techniques β€” not theoretical models. You can't patch what you haven't tried to break.

02

Detection without remediation is theater.

An alert that requires a 48-hour professional services engagement isn't protection β€” it's documentation of failure. Detection and remediation must be inseparable, automated, and instant.

03

Access is a matter of public safety.

Enterprise security has always been priced for enterprise budgets β€” leaving co-ops, water districts, and municipal IT teams to make do with inadequate tools. Protection from catastrophic cyberattack should not be a luxury. Spotlight was priced accordingly.

Our Mission

To protect the systems the world runs on β€”and empower the people that share our vision.