It will eventually involve security for all hardware techniques, program apps and endpoints, along with the network itself and its various elements, including Bodily or cloud-dependent details facilities. There is a very good report performed via the Bipartisan Policy Research Centre on the very best eight macro threats to watch https://ieeexplore.ieee.org/document/9941250