In many cases, this resulted in service providers accelerating timelines for 5G and other high-bandwidth access technologies, following the example of companies in the energy, public utilities, manufacturing, logistics, environmental, and governmental sectors, which already had embraced remote monitoring and machine-to-machine (M2M) communications across broadband internet links. 

The constant evolution of the internet and global network topology has forced adversaries and defenders to adapt. Changes in attack vectors and methodology allow DDoS attackers to circumvent defenses and countermeasures. Meanwhile, security practitioners face a constant battle of
adapting their own defense posture to mitigate this evolving threat.