Creativity is the Key

Computers and the protocols used on computer networks weren’t always built with security in mind.  In order to meet the challenges of the Cyber Domain, significant innovation and outside-the-box thinking is necessary.  CyberDominance.com aspires to become a hub of what we call “Cyber Creativity.”  By generating ideas, we can spark the innovators and experienced computer engineers and fuse them with bold thinkers to solve problems that many security professionals have written off as “the cost of doing business.”

This page will serve as a hub of the creative efforts we will encourage.

The value of information

Information is valuable.  People will want to take it from you or change the information to achieve their ends.

In this video, I describe how to meet the challenge of the changing nature of warfare in the information age.
We are behind.  The U.S. military requires a cultural change to reconcile institutional aversion toward non-lethal information warfare. To aggressively
Despite popular claims to the contrary, you - and everyone else - want to dominate.  You want to have what
In response to Russia’s increasingly aggressive actions, NATO ought to expedite the Ukraine’s application for member status and, simultaneously, the
Want to achieve Dominance in the Cyber Domain? Learn to control yourself and your opponent with the Six Critical Controls
The U.S. is falling behind in the cyber war.  We need to quickly synchronize our national strategy and our cyber
Learn how to keep your emails private and your friends safe by encrypting your emails on your home computer or phone.
Computers, data analytics, and machine learning are all important in tomorrow's world of cyber defense. But humans have advantages that
The latest update to General Dominance Theory was released last week.  This introduces the concept of the Desired End State Space,
Cyber Perception Center Screenshot
Today CyberDominance.com launched a new (and free) "Cyber Perception Center" to help small-business, security professionals, and average-joes keep up with

The Human and the Machine

Computers should serve you; not the other way around.

People working at night in a computer watch floor.
An Econ major’s approach to, and experience thriving in, the world’s most elite cyber unit.  Identify, win trust, and lead
Computers, data analytics, and machine learning are all important in tomorrow's world of cyber defense. But humans have advantages that

All Cyber Creativity Articles:

What moral obligations does the United States have with regards to Cyber Warfare? Here is the Catholic perspective.
In this video, I describe how to meet the challenge of the changing nature of warfare in the information age.
When leading elite cyber operators, there are some things you should do - and some things you should never do.
People working at night in a computer watch floor.
An Econ major’s approach to, and experience thriving in, the world’s most elite cyber unit.  Identify, win trust, and lead
Computers, data analytics, and machine learning are all important in tomorrow's world of cyber defense. But humans have advantages that
A Distributed Service Architecture has multiple servers providing the service, diminishing the advantage of a DDoS attacker.
How can you defend your service from a distributed denial of service (DDoS) attack? The Answer is at the grocery
Cyber hackers can steal your identity by merely reading your personal information. How can you protect against identity theft against this vulnerability?
Why live in fear? Protect against identity theft by fundamentally changing the way we use information.