BLOG ARCHIVE

 

This archive collects past blog posts published by The Cyber Defense Review between 2015 and 2019. These posts featured timely reflections, field-based insights, and policy-oriented commentary on key issues in the cyber defense domain. They played an important role in fostering discussion across military, academic, and policy communities,and we thank all past contributors for their engagement with the journal and the broader community.

As part of the journal’s evolving editorial strategy, we have retired the blog format as a current submission pathway. Authors interested in contributing similar pieces are encouraged to submit to our Professional Commentary category (see our Instructions to Authors). These submissions offer a platform for timely, practice-oriented reflections on current developments, operational challenges, or policy questions in cyber defense, and are reviewed by our editorial team for relevance and clarity.

We also encourage prospective authors to explore our partner publications — the Modern War Institute (MWI) and Gray Space: Cyber & Electromagnetic Warfare Journal — which continue to publish similar high-quality content relevant to this community.

This archive preserves the original blog contributions as a valuable record of past dialogue and evolving perspectives in the cyber defense field.

 

• Four Reasons eSports is a Strategic Opportunity for Service Academies

• Virtual Currency in a Cashless Society: A Potential Window into Economic Cyberwarfare

• Stabilizing the Borderland: Confronting IO, EW and Cyber in Ukraine

• The Cyberspace Workforce: An Array of Opportunities

• Four Imperatives for Cybersecurity Success in the Digital Age: Part 2

• The Value of Intelligence and Secrets

• After Twenty Years of Cyber

• WarTV: A Future Vision for a Common Operating Picture

• The Increasing Necessity for a United States Cyber Service

• The False Promise of Hacking Democracy

• There Is No “Cyber”

• Enter the Policy and Legal Void

• Critical Infrastructure Exercise 16.2 – A Transformative Cybersecurity Learning Experience

• The Number One Vulnerability in the Future of Cyber Security: A Critical Lesson for all Organizations

• Indiana Exercising Plans to Combat Cyber Threats: Preparing for CRIT-EX 2016

• Big Data is Dead, Long Live Big Data

• Sticks and Stones – Training for Tomorrow’s War Today

• Cybercrime and State-sponsored Cyber Operations

• In Cyber, Time is of the Essence

• Ambiguous Deterrence

• No-Hack Pacts – Beijing Assumes a Global Leadership Role

• Putin’s Cyber Strategy in Syria: Are Electronic Attacks Next?

• Senior Leader Vulnerabilities

• Our Data is Not Secure

• Big Data and Cybersecurity

• Senior Snake-Eater’s Predictions On The Future Of Terrorism And How It Can Inspire The Future Of DOD Cyber

• Is Clausewitz Compatible with Cyber?

• Thank You Very Much, Mr. Robot

• A Cyber Discussion

• Recruiting Cyber Warriors: Let’s Not Rush to Failure

• An Emotional Response to Being One of the First Cadets to Branch Cyber

• Urban Warfare and Lessons Learned for Cyber Operations: Developing a New Tactical Approach

• The New 2015 DoD Cyber Strategy – General Alexander Was Right

• ISIS: The Sound and Fury

• Organized Cyber Crime: Comparison of Criminal Groups in Cyberspace

• Why CSI: Cyber Matters

• Tinker Maker Solder Try: Promoting a Culture of Innovation in the Cyber Branch

• Paradoxes of (Cyber) Counterinsurgency

• Broadening Opportunities for Cyber Officers