Head of NSA’s Elite Hacking Unit: How We Hack

Inside the notoriously secretive National Security Agency is an elite unit made up of some of the best hackers on the planet, charged with breaking into computer networks around the world. Exactly how the Tailored Access Operations (TAO) cell works is a closely-held secret — despite some recent leaks — but in a rare public appearance, TAO’s chief shed some light on how America’s top cyber spies do their thing.

Companies Look beyond Firewalls in Cyber Battle with Hackers

With firewalls no longer seen as enough of a defense against security breaches, companies are looking at new tools to foil hackers trying to enter a computer network. U.S. and Israeli startups are leading the way, with new approaches such as “honeytraps” that lure a hacker to fake data or “polymorphic” technology that constantly changes the structure of applications running on a computer.

The most innovative and damaging hacks of 2015

The year’s most significant attacks highlight how hackers are changing tactics — and how IT security must evolve in the year ahead. Not a week went by in 2015 without a major data breach, significant attack campaign, or serious vulnerability report. Many of the incidents were the result of disabled security controls, implementation errors, or other basic security mistakes, highlighting how far organizations have to go in nailing down IT security basics.

Most Companies Take over Six Months to Detect Data Breaches

New research suggests the average financial or commercial business face multiple attacks per month — and it takes months for data breaches to be detected. A new cybersecurity report conducted by the Ponemon Institute on behalf of Arbor Networks suggests it is not only cyberattack events which place sensitive data and corporate networks at risk. Instead, the time it takes for businesses to detect a data breach once it occurs gives threat actors plenty of time to conduct surveillance, steal data and spy upon victim companies — pushing up the cost of cyberattacks.