Skip to main content

Research Repository

Advanced Search

TrueDeploy - ICURe Explore

People Involved

Profile image of Dr Owen Lo

Dr Owen Lo O.Lo@napier.ac.uk
Senior Research Fellow

Project Description

12 weeks full-time programme to help research teams get out of the lab and explore the commercial potential of their research/technology.
TrueDeploy is an innovative platform designed to demystify and streamline software security, especially for SMEs without dedicated cybersecurity teams. It revolutionises the identification and management of open-source vulnerabilities and licensing compliance, with continuous monitoring and actionable insights. By employing Artificial Intelligence (AI), TrueDeploy offers non-experts a clear dashboard view to easily comprehend risks and take action. Simultaneously, it delivers detailed analyses for tech-savvy users, thanks to the TrueDeploy Vulnerability Database. This adaptable, scalable tool empowers teams with tailored, AI-driven recommendations, ensuring ongoing compliance and security resilience. TrueDeploy stands out by transforming sophisticated cybersecurity data into straightforward, actionable knowledge for any user, regardless of their technical background.

Type of Project PF - Proof of Concept Fund
Status Project Complete
Funder(s) Innovate UK
Value £34,999.00
Project Dates Apr 28, 2024 - Jul 26, 2024



You might also like

MemCrypt Apr 1, 2020 - Jul 31, 2020
At the core of the work is to addresses risks related to the leakage of encryption keys, and which can lead to data loss issues and trust breaches. Along with detecting keys in memory, the team has developed new techniques related to timing attacks w... Read More about MemCrypt.

Memcrypt (HGSP)

Memcrypt (HGSP) Sep 15, 2020 - Mar 31, 2021
Memcrypt focuses on new ways of detecting the usage encryption keys, and has a focus on addressing ransomware.

MEMCRYPT CyberASAP Phase 2 Sep 23, 2020 - Feb 28, 2021
Ransomware is a form of malicious software that blocks user access to data by encrypting files. A user is then required to pay the attacker a sum of money to receive the encryption artefacts and start recovering the data. MEMCRYPT has developed new t... Read More about MEMCRYPT CyberASAP Phase 2.