Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

CYBERCOM 2.0: Pentagon Unveils Plan to Fix Cyber Talent Shortfalls

Posted on November 14, 2025November 14, 2025 By CWS

The US Division of Protection, now known as the Division of Struggle (DoW), is establishing a revised cyber pressure era mannequin underneath the initiative generally known as CYBERCOM 2.0.

The hassle goals to extend lethality and optimize operational outcomes for the Pentagon’s cyber forces, particularly these assigned to US Cyber Command (CYBERCOM). The transfer is available in response to the dedication that conventional army service fashions are insufficient for the operational necessities of the cyber area.

The revised mannequin integrates CYBERCOM with army departments to streamline recruiting, evaluation, choice, coaching, and retention of personnel. 

The mannequin is constructed on seven core attributes. Certainly one of them is focused recruiting and assessments to make sure that people are recruited particularly for CYBERCOM assignments and evaluated for his or her match inside specialised cyber work roles. 

Different core attributes embrace incentivizing cyber area mastery and retaining expertise, and offering specialised mission-specific coaching. 

Past coaching, the mannequin overhauls profession administration and unit construction. Tailor-made task administration is adopted to create profession paths that allow the event and retention of cyber area mastery. As well as, unit specialization and collective coaching are formed primarily based on tailor-made mission necessities.

For quick operational readiness, the mannequin contains two organizational and logistical attributes. Forces should be introduced with headquarters and fight help. Moreover, the mannequin implements optimized unit phasing to help a sustainable operational tempo for cyber personnel.

Along with core attributes, the DoW names three organizations that can function key enablers, together with the Cyber Innovation Warfare Heart, which is particularly tasked with accelerating the fast improvement and supply of operational cyber capabilities. Commercial. Scroll to proceed studying.

The opposite organizations are the Cyber Expertise Administration Group, whose position is to determine, entice, recruit, and retain an elite cyber pressure, and the Superior Cyber Coaching and Training Heart, which develops mission-specific coaching and schooling to construct experience and mastery.

These technical and structural adjustments are projected to supply a cyber pressure able to defeating threats posed by main adversaries, with China named particularly within the DoW’s press launch. 

“The mannequin basically adjustments the Division’s method to producing cyber forces, enabling elevated lethality in our cyber forces and establishing a warrior ethos constructed on area mastery, specialised expertise, and mission agility,” mentioned Katie Sutton, Assistant Secretary of Struggle for Cyber Coverage and Principal Cyber Advisor to the Secretary of Struggle.

Breaking Protection has performed an evaluation of the information and known as it “an altered model of the Biden-era CYBERCOM 2.0 initiative”. Recorded Future’s The Document reported that the mission will take a number of years to finish, with some parts set to stretch into fiscal 2032 and 2033. 

Associated: Australia Sanctions Hackers Supporting North Korea’s Weapons Program

Associated: The Congressional Finances Workplace Was Hacked. It Says It Has Carried out New Safety Measures

Associated: New Steering Calls on OT Operators to Create Regularly Up to date System Stock

Security Week News Tags:Cyber, CYBERCOM, Fix, Pentagon, Plan, Shortfalls, Talent, Unveils

Post navigation

Previous Post: Malicious npm Package with 206k Downloads Attacking GitHub-Owned Repositories to Exfiltrate Tokens
Next Post: North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

Related Posts

Fraud: A Growth Industry Powered by Gen-AI Security Week News
Details Emerge on Chinese Hacking Operation Impersonating US Lawmaker Security Week News
Infostealer Malware Delivered in EmEditor Supply Chain Attack Security Week News
Thousands of SaaS Apps Could Still Be Susceptible to nOAuth Security Week News
Organizations Warned of Vulnerability Exploited Against Discontinued TP-Link Routers Security Week News
Marks & Spencer Says Data Stolen in Ransomware Attack Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Silver Fox Hackers Attacking Indian Entities with Income Tax Phishing Lures
  • New Phishing Kit with AI-assisted Development Attacking Microsoft Users to Steal Logins
  • Windows Event Logs Reveal the Messy Reality Behind ‘Sophisticated’ Cyberattacks
  • Top US Accounting Firm Sax Discloses 2024 Data Breach Impacting 220,000
  • 2.5 Million+ Malicious Request From Hackers Attacking Adobe ColdFusion Servers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Silver Fox Hackers Attacking Indian Entities with Income Tax Phishing Lures
  • New Phishing Kit with AI-assisted Development Attacking Microsoft Users to Steal Logins
  • Windows Event Logs Reveal the Messy Reality Behind ‘Sophisticated’ Cyberattacks
  • Top US Accounting Firm Sax Discloses 2024 Data Breach Impacting 220,000
  • 2.5 Million+ Malicious Request From Hackers Attacking Adobe ColdFusion Servers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark