My Cybersecurity Website Just Got Hacked.  I Didn’t Flinch.

My Cybersecurity Website Just Got Hacked. I Didn’t Flinch.

Case Studies, Cyber, Cyber Dominance, Dominance
The best get hacked; it happens.  It's not about being unhackable, it's about rolling with the punches and being resilient.  Learn the story of the most recent hack affecting CyberDominance.com.  It's a story about how doing the simple things well can save you a lot of anguish - and how you can always achieve Cyber Dominance. (more…)
Read More
Information Warfare is Fleet Business: It is no longer what goes on behind the green door

Information Warfare is Fleet Business: It is no longer what goes on behind the green door

Cyber Dominance, Dominance
We are behind.  The U.S. military requires a cultural change to reconcile institutional aversion toward non-lethal information warfare. To aggressively shape, influence, control, and manipulate information, change is needed in U.S. military attitudes toward information warfare.  [We have a choice.] This can be realized through better training and education, and deliberate integration of information operations across the military services during planning and operations[1] - and the College of Maritime Operational Warfare can help deliver this outcome.   (more…)
Read More
General Dominance Theory, SECOND EDITION Released

General Dominance Theory, SECOND EDITION Released

Cyber Dominance Theory, Dominance, General Dominance Theory
The latest update to General Dominance Theory was released last week.  This is the first major update since the original work was published in 2014, and includes improvements to terminology and introduces the concept of the Desired End State Space, a tool to help cyber warfighters focus time and money on goals that will lead to success in the cyber domain. (more…)
Read More