The fight for cyber security will become more intense


IT services continue to integrate various technologies to mount a challenging defense against increasingly complex and more numerous cyber attacks. Integrated use of a wide range of measures is required, reaching from vulnerability countermeasures dating back to the system development stage, to realistic and strong ID management, and to the introduction of post-quantum cryptography.