For any firm utilizing software program, there’s usually a troublesome stability between patching methods as rapidly as potential to forestall cyberattacks whereas additionally ensuring the updates don’t break how these methods work.
That’s the place the startup CyDeploy desires to assist.
The corporate’s founder, Tina Williams-Koroma, defined to information.killnetswitch that the thought of CyDeploy is to make use of machine studying to watch and document crucial methods that an organization runs, create a reproduction of them, and let the corporate utilizing CyDeploy run exams on what she known as a “digital twin” earlier than deploying them on the true stay methods.
“We document how customers are utilizing functions and methods on an everyday day-to-day foundation,” mentioned Williams-Koroma, who defined that CyDeploy can document and label what occurs on a pc’s display screen and the machine studying is available in to “be taught to interpret and mechanically label.”
And, to verify there aren’t any hallucinations, there’s nonetheless a human within the loop, a buyer’s system administrator, who, as she put it, “has the experience to know what they’re taking a look at or anticipating” and checks that the machine studying labeling is right.
Williams-Koroma spoke to information.killnetswitch forward of the information.killnetswitch Disrupt 2025 convention, the place CyDeploy is a High 20 finalist in Startup Battlefield.
The benefit CyDeploy gives is that it may assist write take a look at scripts extra rapidly, she mentioned.
Techcrunch occasion
San Francisco
|
October 27-29, 2025
“You deploy it into your digital twin setting, have the sysadmins run these purposeful take a look at scripts that mirror regular day-to-day makes use of,” Williams-Koroma mentioned. “After which they’ll see from there what the problems is perhaps.”
Firm prospects can select to make use of CyDeploy’s giant language mannequin that runs inside the firm’s setting to forestall proprietary knowledge from leaving its servers, or use OpenAI’s mannequin, during which case info would go exterior of the corporate’s methods or cloud.
Williams-Koroma mentioned for many prospects, the methods they’d need to use CyDeploy on can be servers and important machines, relatively than customers’ workstations, “Tier 1 functions the place modifications must be made rapidly due to security causes, however not too rapidly due to operational causes.”
If you wish to be taught extra about CyDeploy — whereas additionally testing dozens of different firms, listening to their pitches, and listening to visitor audio system on 4 totally different phases — be a part of us at Disrupt, October 27 to 29, in San Francisco. Study extra right here.



