Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
CYBERCOM 2.0: Pentagon Unveils Plan to Fix Cyber Talent Shortfalls

CYBERCOM 2.0: Pentagon Unveils Plan to Fix Cyber Talent Shortfalls

Posted on November 14, 2025November 14, 2025 By CWS

The US Division of Protection, now known as the Division of Struggle (DoW), is establishing a revised cyber pressure era mannequin underneath the initiative generally known as CYBERCOM 2.0.

The hassle goals to extend lethality and optimize operational outcomes for the Pentagon’s cyber forces, particularly these assigned to US Cyber Command (CYBERCOM). The transfer is available in response to the dedication that conventional army service fashions are insufficient for the operational necessities of the cyber area.

The revised mannequin integrates CYBERCOM with army departments to streamline recruiting, evaluation, choice, coaching, and retention of personnel. 

The mannequin is constructed on seven core attributes. Certainly one of them is focused recruiting and assessments to make sure that people are recruited particularly for CYBERCOM assignments and evaluated for his or her match inside specialised cyber work roles. 

Different core attributes embrace incentivizing cyber area mastery and retaining expertise, and offering specialised mission-specific coaching. 

Past coaching, the mannequin overhauls profession administration and unit construction. Tailor-made task administration is adopted to create profession paths that allow the event and retention of cyber area mastery. As well as, unit specialization and collective coaching are formed primarily based on tailor-made mission necessities.

For quick operational readiness, the mannequin contains two organizational and logistical attributes. Forces should be introduced with headquarters and fight help. Moreover, the mannequin implements optimized unit phasing to help a sustainable operational tempo for cyber personnel.

Along with core attributes, the DoW names three organizations that can function key enablers, together with the Cyber Innovation Warfare Heart, which is particularly tasked with accelerating the fast improvement and supply of operational cyber capabilities. Commercial. Scroll to proceed studying.

The opposite organizations are the Cyber Expertise Administration Group, whose position is to determine, entice, recruit, and retain an elite cyber pressure, and the Superior Cyber Coaching and Training Heart, which develops mission-specific coaching and schooling to construct experience and mastery.

These technical and structural adjustments are projected to supply a cyber pressure able to defeating threats posed by main adversaries, with China named particularly within the DoW’s press launch. 

“The mannequin basically adjustments the Division’s method to producing cyber forces, enabling elevated lethality in our cyber forces and establishing a warrior ethos constructed on area mastery, specialised expertise, and mission agility,” mentioned Katie Sutton, Assistant Secretary of Struggle for Cyber Coverage and Principal Cyber Advisor to the Secretary of Struggle.

Breaking Protection has performed an evaluation of the information and known as it “an altered model of the Biden-era CYBERCOM 2.0 initiative”. Recorded Future’s The Document reported that the mission will take a number of years to finish, with some parts set to stretch into fiscal 2032 and 2033. 

Associated: Australia Sanctions Hackers Supporting North Korea’s Weapons Program

Associated: The Congressional Finances Workplace Was Hacked. It Says It Has Carried out New Safety Measures

Associated: New Steering Calls on OT Operators to Create Regularly Up to date System Stock

Security Week News Tags:Cyber, CYBERCOM, Fix, Pentagon, Plan, Shortfalls, Talent, Unveils

Post navigation

Previous Post: Malicious npm Package with 206k Downloads Attacking GitHub-Owned Repositories to Exfiltrate Tokens
Next Post: North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

Related Posts

Onit Security Secures M for Advanced Cyber Solutions Onit Security Secures $11M for Advanced Cyber Solutions Security Week News
Microsoft Highlights Security Risks Introduced by New Agentic AI Feature Microsoft Highlights Security Risks Introduced by New Agentic AI Feature Security Week News
Prime Security Raises  Million to Build Agentic Security Architect Prime Security Raises $20 Million to Build Agentic Security Architect Security Week News
Webinar Today: AI and the Trust Dilemma: Balancing Innovation and Risk Webinar Today: AI and the Trust Dilemma: Balancing Innovation and Risk Security Week News
Valarian Bags M Seed Capital for ‘Isolation-First’ Infrastructure Tech Valarian Bags $20M Seed Capital for ‘Isolation-First’ Infrastructure Tech Security Week News
Critical Wing FTP Server Vulnerability Exploited Critical Wing FTP Server Vulnerability Exploited Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark