Understand Cyber Security
Find out what you're up against and why it matters.
Learn how to dominate; control your fate.
Achieve Cyber Dominance
Cyber Security + Dominance = Cyber Dominance
Explore the ideas that can help you achieve your goals in the Cyber Domain.
Knowledge of computers, people, and what happens when you mix them on a network.
Meet the challenges of the Cyber Domain with significant innovation and outside-the-box thinking.
A guide for dominating in any domain - air, land, sea, cyber, business, diplomacy, and more.
Applying General Dominance Theory and Cyber Security to control your fate in the Cyber Domain.
Achieving Cyber Dominance
The six critical controls of Cyber Dominance Theory. Clear goals for what to defend and what to attack.
Control your assets and your networks; be able to change when you need to change.
Collect information about your cyber reality; monitor your assets, networks, and adversaries.
Transform information into knowledge of where you stand and your adversary's actions and plans.
Your adversary wants to be able to affect and use the Cyber Domain. Don't let him.
Your adversary is more effective when they know what your are doing now and what you will do next.
Ensure your adversary can't transform the information he collects into actionable knowledge.
Who is winning the cyber war?
Millions of Identity Theft Victims Each Year
Social security numbers stolen from IRS in 2015
Average Ransomware Demand in Dollars
Millions of Dollars Paid by Ransomware Victims in Q1, 2016
Check out the latest issues we have been discussing.
November 13, 2018
In response to Russia’s increasingly aggressive actions, NATO ought to expedite the Ukraine’s application for member status and, simultaneously, the Ukraine ought to open up an Information Warfare Centre of Excellence in the Ukraine.
November 5, 2018
Want to achieve Dominance in the Cyber Domain? Learn to control yourself and your opponent with the Six Critical Controls of Cyber Dominance Theory.
October 15, 2018
The U.S. is falling behind in the cyber war. We need to quickly synchronize our national strategy and our cyber efforts - including expanding to Information Cyberspace Operations; only then can the U.S. dominate in the Information Domain. This article explains the context of this fight and proposes a new type of cyberspace operation: the Information Cyberspace Operation.
October 1, 2018
Learn how to keep your emails private and your friends safe by encrypting your emails on your home computer or phone. Learn the fundamentals of how email encryption and email signing works - and keep hackers from impersonating you.