Cyber defense - Continuations