{"id":83407,"date":"2023-07-21T04:27:26","date_gmt":"2023-07-21T04:27:26","guid":{"rendered":"https:\/\/x-phy.com\/?p=83407"},"modified":"2025-11-25T10:06:11","modified_gmt":"2025-11-25T10:06:11","slug":"how-flexxon-aims-to-solve-ai-cybersecurity-problem-through-hardware-focused-approach","status":"publish","type":"post","link":"https:\/\/x-phy.com\/how-flexxon-aims-to-solve-ai-cybersecurity-problem-through-hardware-focused-approach\/","title":{"rendered":"How Flexxon aims to solve AI\u2019s cybersecurity problem through hardware-focused approach"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"83407\" class=\"elementor elementor-83407\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5e40b4e9 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5e40b4e9\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3f8418db\" data-id=\"3f8418db\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-425e4265 elementor-widget elementor-widget-text-editor\" data-id=\"425e4265\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tWhy do cyberattacks continue to occur in spite of significant investments pouring into the industry and the use of AI? It lies in the environment in which it is operating, according to our CEO Camellia Chan in this interview with e27.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-11b10872 elementor-widget elementor-widget-text-editor\" data-id=\"11b10872\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>She shares that there are three main problems in today\u2019s\u00a0<a href=\"https:\/\/x-phy.com\/category\/blog\/cyber-news\/\" target=\"_blank\" rel=\"noopener\">cybersecurity\u00a0<\/a>approach: It is mainly software-based, reactive and overly reliant on human intervention.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3ef47899 elementor-widget elementor-widget-text-editor\" data-id=\"3ef47899\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\u201cAt the external software layer, the variables that security solutions need to account for are astronomical. Thus, even if AI is applied to such solutions, it needs to contend with an immense volume of threat variables in an ever-changing environment. In addition, current external layer defences are reactive in nature and can only recognise known threats,\u201d she explains.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1cf46ba6 elementor-widget elementor-widget-text-editor\" data-id=\"1cf46ba6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>\u201cFinally, current solutions still rely heavily on human decision-making. For instance, for the user to determine if a threat is real or not, to decide if an email is legitimate or malicious and so on. This is a huge problem, and in fact, humans are responsible for over 95 per cent of data breaches. Why? Because we cannot possibly determine if a threat is legitimate or not, and even making that one mistake can lead to huge ramifications.\u201d<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ef7123e elementor-widget elementor-widget-text-editor\" data-id=\"ef7123e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>This is why we designed the <a href=\"https:\/\/x-phy.com\/products\/endpoint-security\/secure-ssd\/\">X-PHY SSD<\/a> to address all three gaps in one simple piece of hardware.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-36a8f4cd elementor-widget elementor-widget-text-editor\" data-id=\"36a8f4cd\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/e27.co\/how-flexxon-aims-to-solve-ais-cybersecurity-problem-through-hardware-focused-approach-20230717\/\" target=\"_blank\" rel=\"noopener\">Read the full interview with e27.co here.<\/a>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-393bb455 elementor-widget elementor-widget-html\" data-id=\"393bb455\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div>\n   <span style=\"color:#000000;font-weight:bold;\">TAGS<br\/><br\/><\/span> \n<\/div>\n<div>\n    <span class=\"tag_style\">Interviews<\/span>\n    <span class=\"tag_style\">Company News<\/span>\n    <span class=\"tag_style\">Product News<\/span>\n<\/div>\n\n\n<style>\n    .tag_style{\n        color:#000000;\n        border:solid 1px #C7C7C7;\n        padding: 5px;\n        margin:5px;\n    }\n    \n<\/style>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Why do cyberattacks continue to occur in spite of significant investments pouring into the industry and the use of AI? It lies in the environment in which it is operating, [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":83408,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[14],"tags":[28,34,35,36,37,38,39,40,41],"class_list":["post-83407","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-media","tag-ai-cybersecurity","tag-ai-cybersecurity-certification","tag-ai-cybersecurity-companies","tag-ai-cybersecurity-risks","tag-ai-cybersecurity-solutions","tag-artificial-intelligence-in-cyber-security-research-paper","tag-company-news","tag-interviews","tag-product-news"],"_links":{"self":[{"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/posts\/83407","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/comments?post=83407"}],"version-history":[{"count":2,"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/posts\/83407\/revisions"}],"predecessor-version":[{"id":111548,"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/posts\/83407\/revisions\/111548"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/media\/83408"}],"wp:attachment":[{"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/media?parent=83407"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/categories?post=83407"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/tags?post=83407"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}