Creativity is the Key

Computers and the protocols used on computer networks weren’t always built with security in mind.  In order to meet the challenges of the Cyber Domain, significant innovation and outside-the-box thinking is necessary.  CyberDominance.com aspires to become a hub of what we call “Cyber Creativity.”  By generating ideas, we can spark the innovators and experienced computer engineers and fuse them with bold thinkers to solve problems that many security professionals have written off as “the cost of doing business.”

This page will serve as a hub of the creative efforts we will encourage.

The value of information

Information is valuable.  People will want to take it from you or change the information to achieve their ends.

Cyber hackers can steal your identity by merely reading your personal information. How can you protect against identity theft against this vulnerability?
Beat Cyber Hackers: Protect Against Identity Theft by Devaluing Information
Why live in fear? Protect against identity theft by fundamentally changing the way we use information.
Read more.

The Human and the Machine

Computers should serve you; not the other way around.

Humans vs Cyber Security Tools. Which one serves the other?
Computers, data analytics, and machine learning are all important in tomorrow's world of cyber defense. But humans have advantages that
Read more.

All Cyber Creativity Articles:

Humans vs Cyber Security Tools. Which one serves the other?
Computers, data analytics, and machine learning are all important in tomorrow's world of cyber defense. But humans have advantages that
Read more.
A Distributed Service Architecture has multiple servers providing the service, diminishing the advantage of a DDoS attacker.
Defend Against Distributed Denial of Service Attacks – Watch A Grocery Store
How can you defend your service from a distributed denial of service (DDoS) attack? The Answer is at the grocery
Read more.
Cyber hackers can steal your identity by merely reading your personal information. How can you protect against identity theft against this vulnerability?
Beat Cyber Hackers: Protect Against Identity Theft by Devaluing Information
Why live in fear? Protect against identity theft by fundamentally changing the way we use information.
Read more.