Humans vs Cyber Security Tools.  Which one serves the other?

Humans vs Cyber Security Tools. Which one serves the other?

Cyber, Cyber Creativity
Unleash the power of your HUMAN potential in the cyber war.  Use cyber security tools and techniques that put the human first - not the data. The power of computers is essential for cyber defense, but the human is often ignored.  Should you continue to spend money and time investing in faster computers, better analytic tools, and fancy machine learning software?  Perhaps, but you should also consider that the humans are the most important part of the system, and that they can contribute in unique ways. (more…)
Read More
General Dominance Theory, SECOND EDITION Released

General Dominance Theory, SECOND EDITION Released

Cyber Dominance Theory, Dominance, General Dominance Theory
The latest update to General Dominance Theory was released last week.  This is the first major update since the original work was published in 2014, and includes improvements to terminology and introduces the concept of the Desired End State Space, a tool to help cyber warfighters focus time and money on goals that will lead to success in the cyber domain. (more…)
Read More
CyberDominance.com is the Home of Cyber Dominance Theory

CyberDominance.com is the Home of Cyber Dominance Theory

Cyber Dominance, Cyber Dominance Theory
CyberDominance.com is the home of Cyber Dominance Theory (CDT). Cyber Dominance Theory is an application of General Dominance Theory.  It provides guidelines for how to achieve dominance in the Cyber Domain.  All developments in CDT will be published and discussed on CyberDominance.com. Introduction to Cyber Dominance Theory Cyber Dominance Theory is the guide to achieving Cyber Dominance.  At the core, it combination of two concepts: General Dominance Theory, and Cyber Security Fundamentals. General Dominance Theory. GDT, originally developed for Navy Information warfare, is a guide for achieving dominance in any domain. Cyber Security Fundamentals. The topical technical knowledge related to computer and network security, and the behavior of the people who use them. General Dominance Theory -> Cyber Dominance Theory General Dominance Theory (GDT) can be applied to any domain.  To apply it to the cyber domain, we…
Read More