Page 14 - Cyber Defense eMagazine April 2023
P. 14

Hardware-based security is also set apart by the fact that it is an extremely niche and specialised area,
            far more than software development. The US Bureau of Labor Statistics states that there are around 4.3
            million software engineers in the US, compared to only 73,600 hardware engineers. This means that it
            takes a lot more than a casual hacker to launch an attack against your hardware.


            While this is an important step in reducing your attack surface and defending against less sophisticated
            hackers, it unfortunately does not mean that you are safe yet – as the multiple incidents of data breaches
            in the past year alone have shown. Without an intelligent and fast-acting perimeter defense for hardware
            storage, hackers will still walk freely into your data vault, wreak havoc, and profit off your misfortune.



            Control and sentry your perimeter

            So how can organisations create an impenetrable perimeter that keeps would-be intruders out?

            To protect data stored at the hardware level, you must create a controlled enclave environment, with
            limited access points, and continuous monitoring of actions made directly to the device. This is what we
            set out to do with the X-PHY Cybersecure SSD.

            Through the application of Artificial Intelligence (AI) and Machine Learning (ML), the X-PHY steps in to
            detect  potential  intrusions  intuitively  and  continuously.  Unlike  the  multitude  of  behavioural  access
            patterns that AI-embedded software-based defenses must deal with, at the hardware level this can be
            simplified to just the read and write patterns.
            This translates to far greater accuracy, response times, and success rates in detecting threats. Trimming
            the threat identification algorithms down to read and write patterns will also greatly eliminate the possibility
            of false positives, thereby removing the need for human intervention.



            Joining forces to thwart cybercriminals.

            The end-goal is to be able to continue benefiting from the countless digital applications that have elevated
            modern business operations, while protecting ourselves better from cybercrime.

            Embracing the idea of a necessary alliance between the private and public sectors, and hardware and
            software-based defenses is vital and represents the next generation of cybersecurity defenses. To make
            that transition, a mindset shift across the industry is the first step. We cannot let the sheer volume of
            cyber incidents become a mere statistic for us as business leaders, it must serve as a wake-up call that
            jolts us into action.

            Encouraging  steps  have  been  taken  globally,  from  the  multi-national  taskforce  set  up  by  the  White
            House’s Counter Ransomware Initiative that encourages open discourse and smoother collaboration
            between the public and private sectors, to traditional B2B and B2C operators embracing the need for
            physical layer protection. As with introducing any new technological concept, a period of education and
            sandboxing is to be expected. We are heartened to have met with many like-minded corporations that
            are aware of the current state of cybersecurity and are looking beyond existing frameworks to strengthen




                                                                                                              14
   9   10   11   12   13   14   15   16   17   18   19