The Evolving Arms Race of IT Security Countermeasures