Understand Cyber Security
Understand Cyber Security
Find out what you're up against and why it matters.  
Understand Dominance
Understand Dominance
Learn how to dominate; control your fate.
Achieve Cyber Dominance
Achieve Cyber Dominance
Cyber Security + Dominance = Cyber Dominance

Core Concepts

Cyber Security Fundamentals

Cyber Creativity

General Dominance Theory

Cyber Dominance Theory

Understand Dominance. Understand Cyber.

Cyber
Cyber Dominance
Dominance
General Dominance Theory, SECOND EDITION Released

General Dominance Theory, SECOND EDITION Released

CyberDominance.com Launches Cyber Perception Center

CyberDominance.com Launches Cyber Perception Center

Your Local Supermarket Holds the Key to Defending Against Distributed Denial of Service Attacks

Your Local Supermarket Holds the Key to Defending Against Distributed Denial of Service Attacks

CyberDominance.com is the Home of Cyber Dominance Theory

CyberDominance.com is the Home of Cyber Dominance Theory

CyberDominance.com is the New Home of General Dominance Theory

CyberDominance.com is the New Home of General Dominance Theory

Beat Cyber Hackers: Protect Against Identity Theft by Devaluing Information

Beat Cyber Hackers: Protect Against Identity Theft by Devaluing Information

Achieving Cyber Dominance

Affect Reality
Control your assets and your networks; be able to change when you need to change.
Collect Information
Collect information about your cyber reality; monitor your assets, networks, and adversaries.
Synthesize Information
Transform information into knowledge of where you stand and your adversary's actions and plans.
Deny Adversary: Affect Reality
Your adversary wants to be able to affect and use the Cyber Domain.  Don't let him.
Deny Adversary: Collect Information
Your adversary is more effective when they know what your are doing now and what you will do next.
Deny Adversary: Synthesize Information
Ensure your adversary can't transform the information he collects into actionable knowledge.

Some Numbers

99
Millions of Identity Theft Victims Each Year
99
Social security numbers stolen from IRS in 2015
99
Average Ransomware Demand in Dollars
99
Millions of Dollars Paid by Ransomware Victims in Q1, 2016

Latest Articles

General Dominance Theory, SECOND EDITION Released
October 5, 2017
The latest update to General Dominance Theory was released last week.  This introduces the concept of the Desired End State Space, a tool to help cyber warfighters focus time and money on goals that will lead to success in the cyber domain.
CyberDominance.com Launches Cyber Perception Center
May 22, 2017
Today CyberDominance.com launched a new (and free) "Cyber Perception Center" to help small-business, security professionals, and average-joes keep up with cyber news and real-time cyber events.
Your Local Supermarket Holds the Key to Defending Against Distributed Denial of Service Attacks
February 2, 2017
How can you defend your service from a distributed denial of service (DDoS) attack? The Answer is at the grocery store. Distribute your service to force your adversary to divide his forces or be ineffective.
CyberDominance.com is the Home of Cyber Dominance Theory
January 25, 2017
CyberDominance.com is the home of Cyber Dominance Theory (CDT).

Contact Us

  • Email: inquiry@cyberdominance.com