Skip to content
follow
#content
Jan Kallberg, Ph.D., LL.M. – CISM, CISSP – Cyberdefense.com
follow
https://cyberdefense.com/
The War Game Revival
follow
https://cyberdefense.com/the-war-game-revival
follow
https://cyberdefense.com/the-war-game-revival
“Wacht am Rhein,”
follow
https://en.wikipedia.org/wiki/Wacht_am_Rhein_(game)
JKallberg45
follow
https://cyberdefense.com/author/jkallberg45
October 4, 2021October 10, 2021
follow
https://cyberdefense.com/the-war-game-revival
Cyber Strategy
follow
https://cyberdefense.com/category/cyber-strategy
Strategic Cyber Warfare
follow
https://cyberdefense.com/category/strategic-cyber-warfare
Uncategorized
follow
https://cyberdefense.com/category/uncategorized
Leave a comment on The War Game Revival
follow
https://cyberdefense.com/the-war-game-revival#respond
CYBER IN THE LIGHT OF KABUL – UNCERTAINTY, SPEED, ASSUMPTIONS
follow
https://cyberdefense.com/cyber-in-the-light-of-kabul-uncertainty-speed-assumptions
JKallberg45
follow
https://cyberdefense.com/author/jkallberg45
September 1, 2021September 1, 2021
follow
https://cyberdefense.com/cyber-in-the-light-of-kabul-uncertainty-speed-assumptions
Cyber Defense
follow
https://cyberdefense.com/category/cyber-defense
Leave a comment on CYBER IN THE LIGHT OF KABUL – UNCERTAINTY, SPEED, ASSUMPTIONS
follow
https://cyberdefense.com/cyber-in-the-light-of-kabul-uncertainty-speed-assumptions#respond
The long-term cost of cyber overreaction
follow
https://cyberdefense.com/the-long-term-cost-of-cyber-overreaction
follow
https://cyberdefense.com/the-long-term-cost-of-cyber-overreaction
JKallberg45
follow
https://cyberdefense.com/author/jkallberg45
August 12, 2021August 12, 2021
follow
https://cyberdefense.com/the-long-term-cost-of-cyber-overreaction
Accelerated Warfare
follow
https://cyberdefense.com/category/accelerated-warfare
Cyber Defense
follow
https://cyberdefense.com/category/cyber-defense
DCO
follow
https://cyberdefense.com/category/dco
Leave a comment on The long-term cost of cyber overreaction
follow
https://cyberdefense.com/the-long-term-cost-of-cyber-overreaction#respond
Prioritize NATO integration for multidomain operations
follow
https://cyberdefense.com/prioritize-nato-integration-for-multidomain-operations
follow
https://cyberdefense.com/prioritize-nato-integration-for-multidomain-operations
JKallberg45
follow
https://cyberdefense.com/author/jkallberg45
August 12, 2021August 12, 2021
follow
https://cyberdefense.com/prioritize-nato-integration-for-multidomain-operations
Corporate Cyber Strategy
follow
https://cyberdefense.com/category/corporate-cyber-strategy
Leave a comment on Prioritize NATO integration for multidomain operations
follow
https://cyberdefense.com/prioritize-nato-integration-for-multidomain-operations#respond
Solorigate attack — the challenge to cyber deterrence
follow
https://cyberdefense.com/solorigate-attack-the-challenge-to-cyber-deterrence
follow
https://cyberdefense.com/solorigate-attack-the-challenge-to-cyber-deterrence
JKallberg45
follow
https://cyberdefense.com/author/jkallberg45
February 11, 2021February 11, 2021
follow
https://cyberdefense.com/solorigate-attack-the-challenge-to-cyber-deterrence
Cyber Resiliency
follow
https://cyberdefense.com/category/cyber-resiliency
Leave a comment on Solorigate attack — the challenge to cyber deterrence
follow
https://cyberdefense.com/solorigate-attack-the-challenge-to-cyber-deterrence#respond
After twenty years of cyber – still unchartered territory ahead
follow
https://cyberdefense.com/after-twenty-years-of-cyber-still-unchartered-territory-ahead
follow
https://cyberdefense.com/after-twenty-years-of-cyber-still-unchartered-territory-ahead
JKallberg45
follow
https://cyberdefense.com/author/jkallberg45
February 4, 2021
follow
https://cyberdefense.com/after-twenty-years-of-cyber-still-unchartered-territory-ahead
Cyber Defense
follow
https://cyberdefense.com/category/cyber-defense
Leave a comment on After twenty years of cyber – still unchartered territory ahead
follow
https://cyberdefense.com/after-twenty-years-of-cyber-still-unchartered-territory-ahead#respond
Cognitive Force Protection – How to protect troops from an assault in the cognitive domain
follow
https://cyberdefense.com/cognitive-force-protection-how-to-protect-troops-from-an-assault-in-the-cognitive-domain
follow
https://cyberdefense.com/cognitive-force-protection-how-to-protect-troops-from-an-assault-in-the-cognitive-domain
JKallberg45
follow
https://cyberdefense.com/author/jkallberg45
January 27, 2021
follow
https://cyberdefense.com/cognitive-force-protection-how-to-protect-troops-from-an-assault-in-the-cognitive-domain
Cyber Defense
follow
https://cyberdefense.com/category/cyber-defense
Information Warfare
follow
https://cyberdefense.com/category/information-warfare
Leave a comment on Cognitive Force Protection – How to protect troops from an assault in the cognitive domain
follow
https://cyberdefense.com/cognitive-force-protection-how-to-protect-troops-from-an-assault-in-the-cognitive-domain#respond
Government cyber breach shows need for convergence
follow
https://cyberdefense.com/government-cyber-breach-shows-need-for-convergence
follow
https://cyberdefense.com/government-cyber-breach-shows-need-for-convergence
network defenders preventing adversarial access
follow
https://www.c4isrnet.com/battlefield-tech/it-networks/2020/12/27/very-difficult-to-defend-what-happens-if-hackers-are-inside-the-pentagons-networks/
JKallberg45
follow
https://cyberdefense.com/author/jkallberg45
January 27, 2021
follow
https://cyberdefense.com/government-cyber-breach-shows-need-for-convergence
Accelerated Warfare
follow
https://cyberdefense.com/category/accelerated-warfare
Cyber Defense
follow
https://cyberdefense.com/category/cyber-defense
DCO
follow
https://cyberdefense.com/category/dco
OCO
follow
https://cyberdefense.com/category/oco
Leave a comment on Government cyber breach shows need for convergence
follow
https://cyberdefense.com/government-cyber-breach-shows-need-for-convergence#respond
If Communist China loses a future war, entropy could be imminent
follow
https://cyberdefense.com/if-communist-china-loses-a-future-war-entropy-could-be-imminent
follow
https://cyberdefense.com/if-communist-china-loses-a-future-war-entropy-could-be-imminent
JKallberg45
follow
https://cyberdefense.com/author/jkallberg45
September 14, 2020
follow
https://cyberdefense.com/if-communist-china-loses-a-future-war-entropy-could-be-imminent
Artificial Intelligence
follow
https://cyberdefense.com/category/artificial-intelligence
China
follow
https://cyberdefense.com/category/china
Information Warfare
follow
https://cyberdefense.com/category/information-warfare
Leave a comment on If Communist China loses a future war, entropy could be imminent
follow
https://cyberdefense.com/if-communist-china-loses-a-future-war-entropy-could-be-imminent#respond
What is the rationale behind election interference?
follow
https://cyberdefense.com/what-is-the-rationale-behind-election-interference
follow
https://cyberdefense.com/what-is-the-rationale-behind-election-interference
nuclear arsenal
follow
https://www.defensenews.com/global/europe/2020/06/02/new-russian-policy-allows-use-of-atomic-weapons-against-non-nuclear-strike/
JKallberg45
follow
https://cyberdefense.com/author/jkallberg45
September 14, 2020September 14, 2020
follow
https://cyberdefense.com/what-is-the-rationale-behind-election-interference
Electronic Warfare
follow
https://cyberdefense.com/category/electronic-warfare
Information Warfare
follow
https://cyberdefense.com/category/information-warfare
Leave a comment on What is the rationale behind election interference?
follow
https://cyberdefense.com/what-is-the-rationale-behind-election-interference#respond
The evaporated OODA-loop
follow
https://cyberdefense.com/the-evaporated-ooda-loop
follow
https://cyberdefense.com/the-evaporated-ooda-loop
JKallberg45
follow
https://cyberdefense.com/author/jkallberg45
August 25, 2020September 14, 2020
follow
https://cyberdefense.com/the-evaporated-ooda-loop
Accelerated Warfare
follow
https://cyberdefense.com/category/accelerated-warfare
Artificial Intelligence
follow
https://cyberdefense.com/category/artificial-intelligence
Leave a comment on The evaporated OODA-loop
follow
https://cyberdefense.com/the-evaporated-ooda-loop#respond
For ethical artificial intelligence, security is pivotal
follow
https://cyberdefense.com/355-2
follow
https://cyberdefense.com/355-2
JKallberg45
follow
https://cyberdefense.com/author/jkallberg45
June 25, 2020June 25, 2020
follow
https://cyberdefense.com/355-2
Accelerated Warfare
follow
https://cyberdefense.com/category/accelerated-warfare
Artificial Intelligence
follow
https://cyberdefense.com/category/artificial-intelligence
Innovation
follow
https://cyberdefense.com/category/innovation
Leave a comment on For ethical artificial intelligence, security is pivotal
follow
https://cyberdefense.com/355-2#respond
What COVID-19 can teach us about cyber resilience
follow
https://cyberdefense.com/what-covid-19-can-teach-us-about-cyber-resilience
follow
https://cyberdefense.com/what-covid-19-can-teach-us-about-cyber-resilience
JKallberg45
follow
https://cyberdefense.com/author/jkallberg45
June 25, 2020June 25, 2020
follow
https://cyberdefense.com/what-covid-19-can-teach-us-about-cyber-resilience
Cyber Defense
follow
https://cyberdefense.com/category/cyber-defense
Cyber Resiliency
follow
https://cyberdefense.com/category/cyber-resiliency
Leave a comment on What COVID-19 can teach us about cyber resilience
follow
https://cyberdefense.com/what-covid-19-can-teach-us-about-cyber-resilience#respond
Why Iran would avoid a major cyberwar
follow
https://cyberdefense.com/why-iran-would-avoid-a-major-cyberwar
follow
https://cyberdefense.com/why-iran-would-avoid-a-major-cyberwar
JKallberg45
follow
https://cyberdefense.com/author/jkallberg45
June 20, 2020June 20, 2020
follow
https://cyberdefense.com/why-iran-would-avoid-a-major-cyberwar
Accelerated Warfare
follow
https://cyberdefense.com/category/accelerated-warfare
Cyber Defense
follow
https://cyberdefense.com/category/cyber-defense
Humanitarian Cyber Operations
follow
https://cyberdefense.com/category/humanitarian-cyber-operations
Leave a comment on Why Iran would avoid a major cyberwar
follow
https://cyberdefense.com/why-iran-would-avoid-a-major-cyberwar#respond
A new mindset for the Army: silent running
follow
https://cyberdefense.com/a-new-mindset-for-the-army-silent-running
follow
https://cyberdefense.com/a-new-mindset-for-the-army-silent-running
JKallberg45
follow
https://cyberdefense.com/author/jkallberg45
December 11, 2019December 11, 2019
follow
https://cyberdefense.com/a-new-mindset-for-the-army-silent-running
Accelerated Warfare
follow
https://cyberdefense.com/category/accelerated-warfare
Electronic Warfare
follow
https://cyberdefense.com/category/electronic-warfare
Strategic Cyber Warfare
follow
https://cyberdefense.com/category/strategic-cyber-warfare
Leave a comment on A new mindset for the Army: silent running
follow
https://cyberdefense.com/a-new-mindset-for-the-army-silent-running#respond
Page 2
follow
https://cyberdefense.com/page/2
Page 3
follow
https://cyberdefense.com/page/3
Next page
follow
https://cyberdefense.com/page/2
ResearchGate
follow
https://www.researchgate.net/profile/Jan_Kallberg
Google Scholar
follow
https://scholar.google.com/citations?user=JA1gZMgAAAAJ&hl=en&oi=ao
LinkedIn
follow
https://www.linkedin.com/in/kallberg/
Contact information
follow
https://cyberdefense.com/contact
follow
https://www.fifthdomain.com/author/jan-kallberg/
follow
https://www.defenseone.com/voices/jan-kallberg/16875/
Short Biography
follow
https://cyberdefense.com/jan-kallberg-phd-biography
Privacy Policy
follow
https://cyberdefense.com/jan-kallberg-phd-biography/privacy-policy
Jan Kallberg, Ph.D. – Claims, Ideas, and Concepts
follow
https://cyberdefense.com/claims-ideas-and-concepts
CV
follow
https://cyberdefense.com/cv
Publications
follow
https://cyberdefense.com/publications
Contact
follow
https://cyberdefense.com/contact
The War Game Revival
follow
https://cyberdefense.com/the-war-game-revival
CYBER IN THE LIGHT OF KABUL – UNCERTAINTY, SPEED, ASSUMPTIONS
follow
https://cyberdefense.com/cyber-in-the-light-of-kabul-uncertainty-speed-assumptions
The long-term cost of cyber overreaction
follow
https://cyberdefense.com/the-long-term-cost-of-cyber-overreaction
Prioritize NATO integration for multidomain operations
follow
https://cyberdefense.com/prioritize-nato-integration-for-multidomain-operations
Solorigate attack — the challenge to cyber deterrence
follow
https://cyberdefense.com/solorigate-attack-the-challenge-to-cyber-deterrence
After twenty years of cyber – still unchartered territory ahead
follow
https://cyberdefense.com/after-twenty-years-of-cyber-still-unchartered-territory-ahead
Cognitive Force Protection – How to protect troops from an assault in the cognitive domain
follow
https://cyberdefense.com/cognitive-force-protection-how-to-protect-troops-from-an-assault-in-the-cognitive-domain
Government cyber breach shows need for convergence
follow
https://cyberdefense.com/government-cyber-breach-shows-need-for-convergence
If Communist China loses a future war, entropy could be imminent
follow
https://cyberdefense.com/if-communist-china-loses-a-future-war-entropy-could-be-imminent
What is the rationale behind election interference?
follow
https://cyberdefense.com/what-is-the-rationale-behind-election-interference
Accelerated Warfare
follow
https://cyberdefense.com/category/accelerated-warfare
Arctic Warfare
follow
https://cyberdefense.com/category/arctic-warfare
Artificial Intelligence
follow
https://cyberdefense.com/category/artificial-intelligence
China
follow
https://cyberdefense.com/category/china
Corporate Cyber Strategy
follow
https://cyberdefense.com/category/corporate-cyber-strategy
Cyber Defense
follow
https://cyberdefense.com/category/cyber-defense
Cyber in Outer Space
follow
https://cyberdefense.com/category/cyber-in-outer-space
Cyber Policy
follow
https://cyberdefense.com/category/cyber-policy
Cyber Resiliency
follow
https://cyberdefense.com/category/cyber-resiliency
Cyber Strategy
follow
https://cyberdefense.com/category/cyber-strategy
Cyber Talent Management
follow
https://cyberdefense.com/category/cyber-talent-management
DCO
follow
https://cyberdefense.com/category/dco
Electronic Warfare
follow
https://cyberdefense.com/category/electronic-warfare
Hacking Back
follow
https://cyberdefense.com/category/hacking-back
Humanitarian Cyber Operations
follow
https://cyberdefense.com/category/humanitarian-cyber-operations
Information Warfare
follow
https://cyberdefense.com/category/information-warfare
Innovation
follow
https://cyberdefense.com/category/innovation
OCO
follow
https://cyberdefense.com/category/oco
Professional experience
follow
https://cyberdefense.com/category/professional-experience
Space War
follow
https://cyberdefense.com/category/space-war
Spectrum
follow
https://cyberdefense.com/category/spectrum
Strategic Cyber Warfare
follow
https://cyberdefense.com/category/strategic-cyber-warfare
Uncategorized
follow
https://cyberdefense.com/category/uncategorized
follow
https://www.wired.com/feed/category/security/latest/rss
Wired Security
follow
https://www.wired.com/category/security/latest
11 Security Settings You Should Know About in Windows 11
follow
https://www.wired.com/story/11-security-settings-windows-11
International Operation Knocks Notorious REvil Group Offline
follow
https://www.wired.com/story/revil-ransomware-hack-sinclair-group-argentina-data-breach-security-news
New Sex Toy Standards Let Some Sensitive Details Slide
follow
https://www.wired.com/story/sex-toy-standards
How Hackers Hijacked Thousands of YouTube Accounts
follow
https://www.wired.com/story/youtube-bitcoin-scam-account-hijacking-google-phishing
How to Switch From Google Authenticator to Another 2FA App
follow
https://www.wired.com/story/how-to-switch-from-google-authenticator-authy
Log in
follow
https://cyberdefense.com/wp-login.php
Entries feed
follow
https://cyberdefense.com/feed
Comments feed
follow
https://cyberdefense.com/comments/feed
WordPress.org
follow
https://wordpress.org/
October 2021
follow
https://cyberdefense.com/2021/10
September 2021
follow
https://cyberdefense.com/2021/09
August 2021
follow
https://cyberdefense.com/2021/08
February 2021
follow
https://cyberdefense.com/2021/02
January 2021
follow
https://cyberdefense.com/2021/01
September 2020
follow
https://cyberdefense.com/2020/09
August 2020
follow
https://cyberdefense.com/2020/08
June 2020
follow
https://cyberdefense.com/2020/06
December 2019
follow
https://cyberdefense.com/2019/12
May 2019
follow
https://cyberdefense.com/2019/05
April 2019
follow
https://cyberdefense.com/2019/04
December 2018
follow
https://cyberdefense.com/2018/12
November 2018
follow
https://cyberdefense.com/2018/11
October 2018
follow
https://cyberdefense.com/2018/10
September 2018
follow
https://cyberdefense.com/2018/09
Jan Kallberg, Ph.D., LL.M. – CISM, CISSP – Cyberdefense.com
follow
https://cyberdefense.com/
Privacy Policy
follow
https://cyberdefense.com/jan-kallberg-phd-biography/privacy-policy
Proudly powered by WordPress
follow
https://wordpress.org/