Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

CYBERCOM 2.0: Pentagon Unveils Plan to Fix Cyber Talent Shortfalls

Posted on November 14, 2025November 14, 2025 By CWS

The US Division of Protection, now known as the Division of Struggle (DoW), is establishing a revised cyber pressure era mannequin underneath the initiative generally known as CYBERCOM 2.0.

The hassle goals to extend lethality and optimize operational outcomes for the Pentagon’s cyber forces, particularly these assigned to US Cyber Command (CYBERCOM). The transfer is available in response to the dedication that conventional army service fashions are insufficient for the operational necessities of the cyber area.

The revised mannequin integrates CYBERCOM with army departments to streamline recruiting, evaluation, choice, coaching, and retention of personnel. 

The mannequin is constructed on seven core attributes. Certainly one of them is focused recruiting and assessments to make sure that people are recruited particularly for CYBERCOM assignments and evaluated for his or her match inside specialised cyber work roles. 

Different core attributes embrace incentivizing cyber area mastery and retaining expertise, and offering specialised mission-specific coaching. 

Past coaching, the mannequin overhauls profession administration and unit construction. Tailor-made task administration is adopted to create profession paths that allow the event and retention of cyber area mastery. As well as, unit specialization and collective coaching are formed primarily based on tailor-made mission necessities.

For quick operational readiness, the mannequin contains two organizational and logistical attributes. Forces should be introduced with headquarters and fight help. Moreover, the mannequin implements optimized unit phasing to help a sustainable operational tempo for cyber personnel.

Along with core attributes, the DoW names three organizations that can function key enablers, together with the Cyber Innovation Warfare Heart, which is particularly tasked with accelerating the fast improvement and supply of operational cyber capabilities. Commercial. Scroll to proceed studying.

The opposite organizations are the Cyber Expertise Administration Group, whose position is to determine, entice, recruit, and retain an elite cyber pressure, and the Superior Cyber Coaching and Training Heart, which develops mission-specific coaching and schooling to construct experience and mastery.

These technical and structural adjustments are projected to supply a cyber pressure able to defeating threats posed by main adversaries, with China named particularly within the DoW’s press launch. 

“The mannequin basically adjustments the Division’s method to producing cyber forces, enabling elevated lethality in our cyber forces and establishing a warrior ethos constructed on area mastery, specialised expertise, and mission agility,” mentioned Katie Sutton, Assistant Secretary of Struggle for Cyber Coverage and Principal Cyber Advisor to the Secretary of Struggle.

Breaking Protection has performed an evaluation of the information and known as it “an altered model of the Biden-era CYBERCOM 2.0 initiative”. Recorded Future’s The Document reported that the mission will take a number of years to finish, with some parts set to stretch into fiscal 2032 and 2033. 

Associated: Australia Sanctions Hackers Supporting North Korea’s Weapons Program

Associated: The Congressional Finances Workplace Was Hacked. It Says It Has Carried out New Safety Measures

Associated: New Steering Calls on OT Operators to Create Regularly Up to date System Stock

Security Week News Tags:Cyber, CYBERCOM, Fix, Pentagon, Plan, Shortfalls, Talent, Unveils

Post navigation

Previous Post: Malicious npm Package with 206k Downloads Attacking GitHub-Owned Repositories to Exfiltrate Tokens
Next Post: North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

Related Posts

Cyberattack Disrupts Check-In Systems at Major European Airports Security Week News
Ransomware Payments Dropped in Q3 2025: Analysis Security Week News
Ex-WhatsApp Security Chief Sues Meta Over Vulnerabilities, Retaliation Security Week News
Webinar Today: Redefining Vulnerability Management With Exposure Validation Security Week News
North Korean Hackers Have Stolen $2 Billion in Cryptocurrency in 2025 Security Week News
CPAP Medical Data Breach Impacts 90,000 People Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels
  • CYBERCOM 2.0: Pentagon Unveils Plan to Fix Cyber Talent Shortfalls
  • Malicious npm Package with 206k Downloads Attacking GitHub-Owned Repositories to Exfiltrate Tokens
  • In Other News: Deepwatch Layoffs, macOS Vulnerability, Amazon AI Bug Bounty
  • Researchers Find Serious AI Bugs Exposing Meta, Nvidia, and Microsoft Inference Frameworks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels
  • CYBERCOM 2.0: Pentagon Unveils Plan to Fix Cyber Talent Shortfalls
  • Malicious npm Package with 206k Downloads Attacking GitHub-Owned Repositories to Exfiltrate Tokens
  • In Other News: Deepwatch Layoffs, macOS Vulnerability, Amazon AI Bug Bounty
  • Researchers Find Serious AI Bugs Exposing Meta, Nvidia, and Microsoft Inference Frameworks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News