Creativity is the Key

Computers and the protocols used on computer networks weren’t always built with security in mind.  In order to meet the challenges of the Cyber Domain, significant innovation and outside-the-box thinking is necessary.  CyberDominance.com aspires to become a hub of what we call “Cyber Creativity.”  By generating ideas, we can spark the innovators and experienced computer engineers and fuse them with bold thinkers to solve problems that many security professionals have written off as “the cost of doing business.”

This page will serve as a hub of the creative efforts we will encourage.

The value of information

Information is valuable.  People will want to take it from you or change the information to achieve their ends.

No Post found

The Human and the Machine

Computers should serve you; not the other way around.

Collect Information
Collect information about your cyber reality; monitor your assets, networks, and adversaries.
Read more.
Six Critical Cyber Controls
According to General Dominance Theory and Cyber Dominance Theory, achieving the six critical controls will ensure dominance. The six critical
Read more.

All Cyber Creativity Articles:

Cyber Security Fundamentals graphic showing a network hub.
Cyber Security Fundamentals
Knowledge of computers, people, and what happens when you mix them on a network.
Read more.
The Six Critical Controls of Cyber Dominance illustrate the six things you must control to achieve Cyber Dominance. These Six Critical Controls can each be described as a Pillar of Cyber Defense or a Pillar of Cyber Offense.
Cyber Dominance Theory
Applying General Dominance Theory and Cyber Security to control your fate in the Cyber Domain.
Read more.
After considering the objective of war and how to succeed in war, GDT concludes that Dominance is Success in War, and that a perfect Ability to Affect Reality and a perfect Perception of Reality will necessarily result in Dominance.
General Dominance Theory
A guide for dominating in any domain - air, land, sea, cyber, business, diplomacy, and more.
Read more.
Deny Adversary: Synthesize Information
Ensure your adversary can't transform the information he collects into actionable knowledge.
Read more.
Deny Adversary: Collect Information
Your adversary is more effective when they know what your are doing now and what you will do next.
Read more.
Deny Adversary: Affect Reality
Your adversary wants to be able to affect and use the Cyber Domain.  Don't let him.
Read more.
Synthesize Information
Transform information into knowledge of where you stand and your adversary's actions and plans.
Read more.
Collect Information
Collect information about your cyber reality; monitor your assets, networks, and adversaries.
Read more.
Affect Reality
Control your assets and your networks; be able to change when you need to change.
Read more.
Six Critical Cyber Controls
According to General Dominance Theory and Cyber Dominance Theory, achieving the six critical controls will ensure dominance. The six critical
Read more.