Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
CYBERCOM 2.0: Pentagon Unveils Plan to Fix Cyber Talent Shortfalls

CYBERCOM 2.0: Pentagon Unveils Plan to Fix Cyber Talent Shortfalls

Posted on November 14, 2025November 14, 2025 By CWS

The US Division of Protection, now known as the Division of Struggle (DoW), is establishing a revised cyber pressure era mannequin underneath the initiative generally known as CYBERCOM 2.0.

The hassle goals to extend lethality and optimize operational outcomes for the Pentagon’s cyber forces, particularly these assigned to US Cyber Command (CYBERCOM). The transfer is available in response to the dedication that conventional army service fashions are insufficient for the operational necessities of the cyber area.

The revised mannequin integrates CYBERCOM with army departments to streamline recruiting, evaluation, choice, coaching, and retention of personnel. 

The mannequin is constructed on seven core attributes. Certainly one of them is focused recruiting and assessments to make sure that people are recruited particularly for CYBERCOM assignments and evaluated for his or her match inside specialised cyber work roles. 

Different core attributes embrace incentivizing cyber area mastery and retaining expertise, and offering specialised mission-specific coaching. 

Past coaching, the mannequin overhauls profession administration and unit construction. Tailor-made task administration is adopted to create profession paths that allow the event and retention of cyber area mastery. As well as, unit specialization and collective coaching are formed primarily based on tailor-made mission necessities.

For quick operational readiness, the mannequin contains two organizational and logistical attributes. Forces should be introduced with headquarters and fight help. Moreover, the mannequin implements optimized unit phasing to help a sustainable operational tempo for cyber personnel.

Along with core attributes, the DoW names three organizations that can function key enablers, together with the Cyber Innovation Warfare Heart, which is particularly tasked with accelerating the fast improvement and supply of operational cyber capabilities. Commercial. Scroll to proceed studying.

The opposite organizations are the Cyber Expertise Administration Group, whose position is to determine, entice, recruit, and retain an elite cyber pressure, and the Superior Cyber Coaching and Training Heart, which develops mission-specific coaching and schooling to construct experience and mastery.

These technical and structural adjustments are projected to supply a cyber pressure able to defeating threats posed by main adversaries, with China named particularly within the DoW’s press launch. 

“The mannequin basically adjustments the Division’s method to producing cyber forces, enabling elevated lethality in our cyber forces and establishing a warrior ethos constructed on area mastery, specialised expertise, and mission agility,” mentioned Katie Sutton, Assistant Secretary of Struggle for Cyber Coverage and Principal Cyber Advisor to the Secretary of Struggle.

Breaking Protection has performed an evaluation of the information and known as it “an altered model of the Biden-era CYBERCOM 2.0 initiative”. Recorded Future’s The Document reported that the mission will take a number of years to finish, with some parts set to stretch into fiscal 2032 and 2033. 

Associated: Australia Sanctions Hackers Supporting North Korea’s Weapons Program

Associated: The Congressional Finances Workplace Was Hacked. It Says It Has Carried out New Safety Measures

Associated: New Steering Calls on OT Operators to Create Regularly Up to date System Stock

Security Week News Tags:Cyber, CYBERCOM, Fix, Pentagon, Plan, Shortfalls, Talent, Unveils

Post navigation

Previous Post: Malicious npm Package with 206k Downloads Attacking GitHub-Owned Repositories to Exfiltrate Tokens
Next Post: North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

Related Posts

AI Supply Chain Attack Method Demonstrated Against Google, Microsoft Products AI Supply Chain Attack Method Demonstrated Against Google, Microsoft Products Security Week News
Aura Reveals Data Breach Affecting 900,000 Users Aura Reveals Data Breach Affecting 900,000 Users Security Week News
Details Emerge on Chinese Hacking Operation Impersonating US Lawmaker Details Emerge on Chinese Hacking Operation Impersonating US Lawmaker Security Week News
Microsoft Revokes Over 200 Certificates to Disrupt Ransomware Campaign Microsoft Revokes Over 200 Certificates to Disrupt Ransomware Campaign Security Week News
Virtual Event Today: Zero Trust & Identity Strategies Summit Virtual Event Today: Zero Trust & Identity Strategies Summit Security Week News
Hackers Inject Malware Into Gravity Forms WordPress Plugin  Hackers Inject Malware Into Gravity Forms WordPress Plugin  Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark