New Navy Strategy Adds Cyberspace to Warfare Domain
The strategy lists secure, survive and strike as the primary principles for defense in cyberspace.

The U.S. Navy released its Cyberspace Superiority Vision identifying three main principles that will guide the service in its pursuit of cyberspace superiority: secure, survive and strike.
This vision goes hand in hand with CIO Aaron Weis’ Information Superiority Vision principles of modernize, innovate and defend. While the Information Superiority Vision focuses on ensuring the availability of information from any place at any time, the Cyberspace Superiority Vision is about enabling military action through non-kinetic capabilities in cyberspace.
The “secure” pillar is foundational to the vision and requires constant investment in cybersecurity defenses as adversaries develop new vulnerability exploits. The Navy envisions that it “consistently fields best-in-class cybersecurity safeguards, retains its excellent cyber talent and cultivates a professional cybersecurity and cyber-warfighting culture.”
“This is the one that we really work hand in glove with the CIO organizations in their defending pillar, which is all about … zero trust, identity management, all the things we’re doing to Project Overmatch,” Navy Principal Cyber Advisor Christopher Cleary said at the Trellix Cybersecurity Summit last week.
The “survive” principle requires training the Navy workforce to be able to respond to cyber attacks that will inevitably occur.
“Our systems are under attack all the time,” Cleary said. “We have to ensure all the critical infrastructure around us is designed to be attacked, designed to be resilient, designed to be survivable. And arguably, we haven’t done as good of a job on that.”
The “strike” pillar requires the Navy to view cyberspace as a warfighting domain and to treat it the same way it treats its maritime, air and land domains.
“The services have some responsibility to acquire capabilities to allow us to maneuver in and through cyberspace, which is really what the strike piece is all about,” Cleary said. “Because offensive cyber operations is now this new warfare domain that we are to one degree or another still in the infancy of trying to race.”
The document aims to get the message out to those in the Navy and Marine Corps who “don’t consider … why these things are important and, more importantly, why it’s important to their mission.”
“As we … continue to embrace this new domain across all of those three pillars secure surrounding strike, I want our adversaries to be every bit as concerned … pointing evidence over non-kinetic capabilities as they are … pointing over kinetic [capabilities].”
This is a carousel with manually rotating slides. Use Next and Previous buttons to navigate or jump to a slide with the slide dots
-
DOD Can No Longer Assume Superiority in Digital Warfare, Officials Warn
The DOD must make concerted efforts to address cyber vulnerabilities to maintain the tactical edge, military leaders said at HammerCon 2025.
4m read -
Tracking CIOs in Trump's Second Term
Stay informed on the latest shifts in federal technology leadership as new CIOs are appointed and President Trump's second term takes shape.
6m read -
Inside Oak Ridge National Lab’s Pioneer Approach to AI
Energy Department’s Oak Ridge National Lab transforms AI vulnerabilities into strategic opportunities for national defense.
22m listen -
AWS Summit: Innovation Accelerates IT Delivery at DOD
Marine Corps Community Services is tackling outdated IT processes with agile development and cutting-edge cloud security to deliver mission-critical capabilities faster.
12m watch -
AWS Summit: NIST Secures High-Performance Computing Against Evolving Threats
NIST’s Yang Guo reveals the broad attack surface of high-performance computing and explains developing guidance and future-proofing security strategies.
9m watch -
Trump Overhauls Federal Cybersecurity with New Executive Order
The new directive aims to strengthen digital defenses while rolling back "burdensome" software requirements and refocusing AI security.
3m read -
AWS Summit: Forging Successful Cloud Modernization Partnerships
Industry leaders share insights on the critical role industry partnerships have in enabling government agencies to navigate procurement challenges for cloud and zero trust solutions.
24m watch Partner Content -
CISA's CVE Program and Why it Matters for Zero Trust
The vulnerability program provides the cybersecurity community visibility into software as part of a key pillar of CISA's zero trust model.
5m read -
Air Force, Coast Guard Talk Data Security Efforts for AI Development
The services' AI initiatives include efforts like creating clean training data, countering data poisoning and bridging siloed teams.
4m read -
DHS Secretary Urges Congress to Reauthorize CISA 2015
Federal leaders highlight CISA 2015's role in strengthening public-private partnerships and defending against evolving cyber threats.
3m read -
Rep. Gerry Connolly Leaves Lasting Mark on Federal Tech
Connolly's leadership in Congress significantly advanced government IT, emphasizing accountability, efficiency and a robust cybersecurity posture.
4m read -
Agencies Use AI to Boost Efficiency, Cybersecurity Under White House Mandates
DLA and GAO are investigating how AI can boost efficiency and bolster cybersecurity as agencies align with the president's tech directives.
3m read