Your adversary wants to be able to affect and use the Cyber Domain.  Don’t let him.

Articles related to the concept of denying your adversary the ability to affect reality:

Achieve Cyber Dominance: The Six Critical Controls
Want to achieve Dominance in the Cyber Domain? Learn to control yourself and your opponent with the Six Critical Controls
Read more.
General Dominance Theory, SECOND EDITION Released
The latest update to General Dominance Theory was released last week.  This introduces the concept of the Desired End State Space,
Read more.
A Distributed Service Architecture has multiple servers providing the service, diminishing the advantage of a DDoS attacker.
Defend Against Distributed Denial of Service Attacks – Watch A Grocery Store
How can you defend your service from a distributed denial of service (DDoS) attack? The Answer is at the grocery
Read more.
Cyber Dominance is achieved when you have a perfect Ability to Affect the Cyber Domain (ATA-C) and Perception of the Cyber Domain (POR-C). is the Home of Cyber Dominance Theory is the home of Cyber Dominance Theory (CDT).
Read more.
After considering the objective of war and how to succeed in war, GDT concludes that Dominance is Success in War, and that a perfect Ability to Affect Reality and a perfect Perception of Reality will necessarily result in Dominance. is the New Home of General Dominance Theory is the new home of General Dominance Theory (GDT). GDT is the basis for Cyber Dominance theory.  It provides guidelines
Read more.
Cyber hackers can steal your identity by merely reading your personal information. How can you protect against identity theft against this vulnerability?
Beat Cyber Hackers: Protect Against Identity Theft by Devaluing Information
Why live in fear? Protect against identity theft by fundamentally changing the way we use information.
Read more.