Video: The Changing Nature of Warfare and Cyber Education

Video: The Changing Nature of Warfare and Cyber Education

Cyber, Cyber Creativity
In this video, I describe how to meet the challenge of the changing nature of warfare in the information age. The United States needs to organize for intellectual rigor using existing frameworks and by utilizing a coordinating authority to integrate these frameworks. See my presentation in the YouTube video embedded below, or access it directly by visiting the video directly on YouTube.com. https://youtu.be/1QMo5CO2y7I Cyber Operations are changing the nature of warfare and present a new concern for national security.  As the nation tries to wrestle with the implications of this new reality, we should realize that this is not the first time our Nation has been challenged by a change in warfare and we can learn from our history. In the past, lots of good people were doing good things…
Read More
My Cybersecurity Website Just Got Hacked.  I Didn’t Flinch.

My Cybersecurity Website Just Got Hacked. I Didn’t Flinch.

Case Studies, Cyber, Cyber Dominance, Dominance
The best get hacked; it happens.  It's not about being unhackable, it's about rolling with the punches and being resilient.  Learn the story of the most recent hack affecting CyberDominance.com.  It's a story about how doing the simple things well can save you a lot of anguish - and how you can always achieve Cyber Dominance. (more…)
Read More
Information Warfare is Fleet Business: It is no longer what goes on behind the green door

Information Warfare is Fleet Business: It is no longer what goes on behind the green door

Cyber Dominance, Dominance
We are behind.  The U.S. military requires a cultural change to reconcile institutional aversion toward non-lethal information warfare. To aggressively shape, influence, control, and manipulate information, change is needed in U.S. military attitudes toward information warfare.  [We have a choice.] This can be realized through better training and education, and deliberate integration of information operations across the military services during planning and operations[1] - and the College of Maritime Operational Warfare can help deliver this outcome.   (more…)
Read More
Humans vs Cyber Security Tools.  Which one serves the other?

Humans vs Cyber Security Tools. Which one serves the other?

Cyber, Cyber Creativity
Unleash the power of your HUMAN potential in the cyber war.  Use cyber security tools and techniques that put the human first - not the data. The power of computers is essential for cyber defense, but the human is often ignored.  Should you continue to spend money and time investing in faster computers, better analytic tools, and fancy machine learning software?  Perhaps, but you should also consider that the humans are the most important part of the system, and that they can contribute in unique ways. (more…)
Read More
General Dominance Theory, SECOND EDITION Released

General Dominance Theory, SECOND EDITION Released

Cyber Dominance Theory, Dominance, General Dominance Theory
The latest update to General Dominance Theory was released last week.  This is the first major update since the original work was published in 2014, and includes improvements to terminology and introduces the concept of the Desired End State Space, a tool to help cyber warfighters focus time and money on goals that will lead to success in the cyber domain. (more…)
Read More
CyberDominance.com is the Home of Cyber Dominance Theory

CyberDominance.com is the Home of Cyber Dominance Theory

Cyber Dominance, Cyber Dominance Theory
CyberDominance.com is the home of Cyber Dominance Theory (CDT). Cyber Dominance Theory is an application of General Dominance Theory.  It provides guidelines for how to achieve dominance in the Cyber Domain.  All developments in CDT will be published and discussed on CyberDominance.com. Introduction to Cyber Dominance Theory Cyber Dominance Theory is the guide to achieving Cyber Dominance.  At the core, it combination of two concepts: General Dominance Theory, and Cyber Security Fundamentals. General Dominance Theory. GDT, originally developed for Navy Information warfare, is a guide for achieving dominance in any domain. Cyber Security Fundamentals. The topical technical knowledge related to computer and network security, and the behavior of the people who use them. General Dominance Theory -> Cyber Dominance Theory General Dominance Theory (GDT) can be applied to any domain.  To apply it to the cyber domain, we…
Read More