Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
CYBERCOM 2.0: Pentagon Unveils Plan to Fix Cyber Talent Shortfalls

CYBERCOM 2.0: Pentagon Unveils Plan to Fix Cyber Talent Shortfalls

Posted on November 14, 2025November 14, 2025 By CWS

The US Division of Protection, now known as the Division of Struggle (DoW), is establishing a revised cyber pressure era mannequin underneath the initiative generally known as CYBERCOM 2.0.

The hassle goals to extend lethality and optimize operational outcomes for the Pentagon’s cyber forces, particularly these assigned to US Cyber Command (CYBERCOM). The transfer is available in response to the dedication that conventional army service fashions are insufficient for the operational necessities of the cyber area.

The revised mannequin integrates CYBERCOM with army departments to streamline recruiting, evaluation, choice, coaching, and retention of personnel. 

The mannequin is constructed on seven core attributes. Certainly one of them is focused recruiting and assessments to make sure that people are recruited particularly for CYBERCOM assignments and evaluated for his or her match inside specialised cyber work roles. 

Different core attributes embrace incentivizing cyber area mastery and retaining expertise, and offering specialised mission-specific coaching. 

Past coaching, the mannequin overhauls profession administration and unit construction. Tailor-made task administration is adopted to create profession paths that allow the event and retention of cyber area mastery. As well as, unit specialization and collective coaching are formed primarily based on tailor-made mission necessities.

For quick operational readiness, the mannequin contains two organizational and logistical attributes. Forces should be introduced with headquarters and fight help. Moreover, the mannequin implements optimized unit phasing to help a sustainable operational tempo for cyber personnel.

Along with core attributes, the DoW names three organizations that can function key enablers, together with the Cyber Innovation Warfare Heart, which is particularly tasked with accelerating the fast improvement and supply of operational cyber capabilities. Commercial. Scroll to proceed studying.

The opposite organizations are the Cyber Expertise Administration Group, whose position is to determine, entice, recruit, and retain an elite cyber pressure, and the Superior Cyber Coaching and Training Heart, which develops mission-specific coaching and schooling to construct experience and mastery.

These technical and structural adjustments are projected to supply a cyber pressure able to defeating threats posed by main adversaries, with China named particularly within the DoW’s press launch. 

“The mannequin basically adjustments the Division’s method to producing cyber forces, enabling elevated lethality in our cyber forces and establishing a warrior ethos constructed on area mastery, specialised expertise, and mission agility,” mentioned Katie Sutton, Assistant Secretary of Struggle for Cyber Coverage and Principal Cyber Advisor to the Secretary of Struggle.

Breaking Protection has performed an evaluation of the information and known as it “an altered model of the Biden-era CYBERCOM 2.0 initiative”. Recorded Future’s The Document reported that the mission will take a number of years to finish, with some parts set to stretch into fiscal 2032 and 2033. 

Associated: Australia Sanctions Hackers Supporting North Korea’s Weapons Program

Associated: The Congressional Finances Workplace Was Hacked. It Says It Has Carried out New Safety Measures

Associated: New Steering Calls on OT Operators to Create Regularly Up to date System Stock

Security Week News Tags:Cyber, CYBERCOM, Fix, Pentagon, Plan, Shortfalls, Talent, Unveils

Post navigation

Previous Post: Malicious npm Package with 206k Downloads Attacking GitHub-Owned Repositories to Exfiltrate Tokens
Next Post: North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

Related Posts

Cellcom Service Disruption Caused by Cyberattack Cellcom Service Disruption Caused by Cyberattack Security Week News
Reach Security Raises  Million for Exposure Management Solution Reach Security Raises $10 Million for Exposure Management Solution Security Week News
Pennsylvania Attorney General Confirms Data Breach After Ransomware Attack Pennsylvania Attorney General Confirms Data Breach After Ransomware Attack Security Week News
Fuji Electric HMI Configurator Flaws Expose Industrial Organizations to Hacking Fuji Electric HMI Configurator Flaws Expose Industrial Organizations to Hacking Security Week News
Supply Chain Attack Targets VS Code Extensions With ‘GlassWorm’ Malware Supply Chain Attack Targets VS Code Extensions With ‘GlassWorm’ Malware Security Week News
‘PackageGate’ Flaws Open JavaScript Ecosystem to Supply Chain Attacks ‘PackageGate’ Flaws Open JavaScript Ecosystem to Supply Chain Attacks Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News