Understand Cyber Security
Find out what you're up against and why it matters.
Learn how to dominate; control your fate.
Achieve Cyber Dominance
Cyber Security + Dominance = Cyber Dominance
Explore the ideas that can help you achieve your goals in the Cyber Domain.
Knowledge of computers, people, and what happens when you mix them on a network.
Meet the challenges of the Cyber Domain with significant innovation and outside-the-box thinking.
A guide for dominating in any domain - air, land, sea, cyber, business, diplomacy, and more.
Applying General Dominance Theory and Cyber Security to control your fate in the Cyber Domain.
Achieving Cyber Dominance
The six critical controls of Cyber Dominance Theory. Clear goals for what to defend and what to attack.
Control your assets and your networks; be able to change when you need to change.
Collect information about your cyber reality; monitor your assets, networks, and adversaries.
Transform information into knowledge of where you stand and your adversary's actions and plans.
Your adversary wants to be able to affect and use the Cyber Domain. Don't let him.
Your adversary is more effective when they know what your are doing now and what you will do next.
Ensure your adversary can't transform the information he collects into actionable knowledge.
Who is winning the cyber war?
Millions of Identity Theft Victims Each Year
Social security numbers stolen from IRS in 2015
Average Ransomware Demand in Dollars
Millions of Dollars Paid by Ransomware Victims in Q1, 2016
Check out the latest issues we have been discussing.
October 15, 2018
The U.S. is falling behind in the cyber war. We need to quickly synchronize our national strategy and our cyber efforts - including expanding to Information Cyberspace Operations; only then can the U.S. dominate in the Information Domain. This article explains the context of this fight and proposes a new type of cyberspace operation: the Information Cyberspace Operation.
October 1, 2018
Learn how to keep your emails private and your friends safe by encrypting your emails on your home computer or phone. Learn the fundamentals of how email encryption and email signing works - and keep hackers from impersonating you.
September 7, 2018
Computers, data analytics, and machine learning are all important in tomorrow's world of cyber defense. But humans have advantages that cannot be matched by computers. Find out how computers can work for you - and not the other way around.
October 5, 2017
The latest update to General Dominance Theory was released last week. This introduces the concept of the Desired End State Space, a tool to help cyber warfighters focus time and money on goals that will lead to success in the cyber domain.