How firms are using cutting-edge techniques to stop cyber criminals breaching their networks.