Continued Efforts Are Needed to Protect Information Systems From Evolving Threats