—This paper charts the course of adaptive behavior in intrusion tolerance, starting from pre-programmed and usercontrolled reactive adaptation to highly sophisticated autonomic and cognitively driven adaptation. The goal of intrusiontolerance is to provide mission continuity even under conditions of sustained cyber attacks. We describe key themes of our