Creativity is the Key
Computers and the protocols used on computer networks weren’t always built with security in mind. In order to meet the challenges of the Cyber Domain, significant innovation and outside-the-box thinking is necessary. CyberDominance.com aspires to become a hub of what we call “Cyber Creativity.” By generating ideas, we can spark the innovators and experienced computer engineers and fuse them with bold thinkers to solve problems that many security professionals have written off as “the cost of doing business.”
This page will serve as a hub of the creative efforts we will encourage.
The value of information
Information is valuable. People will want to take it from you or change the information to achieve their ends.
In this video, I describe how to meet the challenge of the changing nature of warfare in the information age.
We are behind. The U.S. military requires a cultural change to reconcile institutional aversion toward non-lethal information warfare. To aggressively
Despite popular claims to the contrary, you - and everyone else - want to dominate. You want to have what
In response to Russia’s increasingly aggressive actions, NATO ought to expedite the Ukraine’s application for member status and, simultaneously, the
Want to achieve Dominance in the Cyber Domain? Learn to control yourself and your opponent with the Six Critical Controls
The U.S. is falling behind in the cyber war. We need to quickly synchronize our national strategy and our cyber
Learn how to keep your emails private and your friends safe by encrypting your emails on your home computer or phone.
Computers, data analytics, and machine learning are all important in tomorrow's world of cyber defense. But humans have advantages that
The latest update to General Dominance Theory was released last week. This introduces the concept of the Desired End State Space,
Today CyberDominance.com launched a new (and free) "Cyber Perception Center" to help small-business, security professionals, and average-joes keep up with
The Human and the Machine
Computers should serve you; not the other way around.
An Econ major’s approach to, and experience thriving in, the world’s most elite cyber unit. Identify, win trust, and lead
Computers, data analytics, and machine learning are all important in tomorrow's world of cyber defense. But humans have advantages that
All Cyber Creativity Articles:
What moral obligations does the United States have with regards to Cyber Warfare? Here is the Catholic perspective.
In this video, I describe how to meet the challenge of the changing nature of warfare in the information age.
When leading elite cyber operators, there are some things you should do - and some things you should never do.
An Econ major’s approach to, and experience thriving in, the world’s most elite cyber unit. Identify, win trust, and lead
Computers, data analytics, and machine learning are all important in tomorrow's world of cyber defense. But humans have advantages that
How can you defend your service from a distributed denial of service (DDoS) attack? The Answer is at the grocery
Why live in fear? Protect against identity theft by fundamentally changing the way we use information.