Understand Cyber Security
Understand Cyber Security
Find out what you're up against and why it matters.  
Understand Dominance
Understand Dominance
Learn how to dominate; control your fate.
Achieve Cyber Dominance
Achieve Cyber Dominance
Cyber Security + Dominance = Cyber Dominance

Core Concepts

Cyber Security Fundamentals

Cyber Creativity

General Dominance Theory

Cyber Dominance Theory

Understand Dominance. Understand Cyber.

Cyber
Cyber Dominance
Dominance
Video: The Changing Nature of Warfare and Cyber Education

Video: The Changing Nature of Warfare and Cyber Education

My Cybersecurity Website Just Got Hacked.  I Didn’t Flinch.

My Cybersecurity Website Just Got Hacked. I Didn’t Flinch.

The Tragedy of the Champion

The Tragedy of the Champion

Information Warfare is Fleet Business: It is no longer what goes on behind the green door

Information Warfare is Fleet Business: It is no longer what goes on behind the green door

Yes, You Do Want to Dominate Others: The battle of dominance vs superiority

Yes, You Do Want to Dominate Others: The battle of dominance vs superiority

The Do’s and Don’ts of Cyber Leadership

The Do’s and Don’ts of Cyber Leadership

Cyber Warfare: The Human Dimension with Meaghan Murray

Cyber Warfare: The Human Dimension with Meaghan Murray

Ukraine as a NATO Centre of Excellence: Information Warfare

Ukraine as a NATO Centre of Excellence: Information Warfare

Achieve Cyber Dominance: The Six Critical Controls

Achieve Cyber Dominance: The Six Critical Controls

Dominate the Information Domain: Synchronize Strategy and Cyber Efforts

Dominate the Information Domain: Synchronize Strategy and Cyber Efforts

How to Encrypt Your Email for Free

How to Encrypt Your Email for Free

Humans vs Cyber Security Tools.  Which one serves the other?

Humans vs Cyber Security Tools. Which one serves the other?

General Dominance Theory, SECOND EDITION Released

General Dominance Theory, SECOND EDITION Released

CyberDominance.com Launches Cyber Perception Center

CyberDominance.com Launches Cyber Perception Center

Defend Against Distributed Denial of Service Attacks – Watch A Grocery Store

Defend Against Distributed Denial of Service Attacks – Watch A Grocery Store

CyberDominance.com is the Home of Cyber Dominance Theory

CyberDominance.com is the Home of Cyber Dominance Theory

CyberDominance.com is the New Home of General Dominance Theory

CyberDominance.com is the New Home of General Dominance Theory

Beat Cyber Hackers: Protect Against Identity Theft by Devaluing Information

Beat Cyber Hackers: Protect Against Identity Theft by Devaluing Information

Achieving Cyber Dominance

Affect Reality
Control your assets and your networks; be able to change when you need to change.
Collect Information
Collect information about your cyber reality; monitor your assets, networks, and adversaries.
Synthesize Information
Transform information into knowledge of where you stand and your adversary's actions and plans.
Deny Adversary: Affect Reality
Your adversary wants to be able to affect and use the Cyber Domain.  Don't let him.
Deny Adversary: Collect Information
Your adversary is more effective when they know what your are doing now and what you will do next.
Deny Adversary: Synthesize Information
Ensure your adversary can't transform the information he collects into actionable knowledge.

Some Numbers

99
Millions of Identity Theft Victims Each Year
99
Social security numbers stolen from IRS in 2015
99
Average Ransomware Demand in Dollars
99
Millions of Dollars Paid by Ransomware Victims in Q1, 2016

Latest Articles

Video: The Changing Nature of Warfare and Cyber Education
May 6, 2019
In this video, I describe how to meet the challenge of the changing nature of warfare in the information age. The United States needs to organize for intellectual rigor using existing frameworks and by utilizing a coordinating authority to integrate these frameworks.
My Cybersecurity Website Just Got Hacked. I Didn’t Flinch.
April 26, 2019
The best get hacked; it happens.  It's not about being unhackable, it's about rolling with the punches and being resilient.  Learn the story of the most recent hack affecting CyberDominance.com.  It's a story about how doing the simple things well can save you a lot of anguish - and how you can always achieve Cyber Dominance.
The Tragedy of the Champion
January 30, 2019
This courageous contender has just achieved the pinnacle station.  Maybe it is boxing.  Maybe it is business.  Maybe it is war.
Information Warfare is Fleet Business: It is no longer what goes on behind the green door
January 28, 2019
We are behind.  The U.S. military requires a cultural change to reconcile institutional aversion toward non-lethal information warfare. To aggressively shape, influence, control, and manipulate information, change is needed in U.S. military attitudes toward information warfare.  We have a choice. This can be realized through better training and education, and deliberate integration of information operations across the military services during planning and operations[1] - and the College of Maritime Operational Warfare can help deliver this outcome.  

Contact Us

  • Email: inquiry@cyberdominance.com