US Cyber Command Begins A Strategic Review

The US Cyber Command is undergoing a significant review intended to update its organisation and  capabilities to make sure it  is positioned  to deal with threats in a highly dynamic environment. 

 The review, which US government officials are referring to as Cybercom 2.0, includes an expansion in size and scope with 14 new teams to be added over five years to the current 39 teams.

In particular, Cybercom's strategic focus will shift  from counter-terrorism and combating violent extremist organisations, to dealing with nation-state threats actors.

The outgoing commander General Paul Nakasone said, “As cyber threats to the nation have evolved, as technology has advanced at rapid pace, so too has Cyber National Mission Force, constantly evolving to meet the nation’s challenges in cyberspace, responding to major cyber-attacks, defending forward in every geographic theater, confronting and engaging the world’s most dangerous cyber actors, and defending the democratic processes of our nation.”

With hacktivist groups and cyber criminals increasingly exploit the Internet and social media for propaganda, fake news and offensive cyber activities, it seems the threat level can only escalate. 

Based on how the Ukraine war has reshaped how the military views the way cyber attacks are used during periods of armed conflict, Cybercom has shifted its focus toward nation state threats. Expanded operational size will provide Cybercom not only more capable teams to deploy quickly, but expand its global reach, able to operate in many different geographic areas simultaneously.  

Over the past two yeas, US agencies have been very active addressing some of the more state and non-state cyber threats the US faces and Cybercom has demonstrated a high level of capability in confronting adversaries in cyberspace.

With a larger team and stronger capabilities, US adversaries like China, Russia and Iran are likely to come under greater pressure from US offensive cyber activity than ever before and while the world may have suspected the United States conducts these types of offensive cyber missions, it is now public knowledge that it is doing so.

CyberCom:     CyberCom:     National Security Agency:     Oodaloop:       DefenseScoop:     

SSRN / Peter Patacsil:   

You Might Also Read: 

Cyber Operations In Wartime:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Building A Cyber-Savvy Nation In The Face Of A Talent Shortage
Ten Ways To Elevate Public Sector Cyber Security »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

ON-DEMAND WEBINAR: Gen AI for Security: Adoption strategies with Amazon Bedrock

ON-DEMAND WEBINAR: Gen AI for Security: Adoption strategies with Amazon Bedrock

Watch this webinar and get a comprehensive roadmap for securely adopting generative AI using Amazon Bedrock, a fully managed service that offers a choice of high-performing foundation models (FMs).

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Datto

Datto

Datto delivers a single toolbox of easy to use products and services designed specifically for managed service providers and the businesses they serve.

Optimum Insurance

Optimum Insurance

Optimum's Cyber Risk & Data Protection Insurance policies are designed to protect against cyber exposures that arise when a company’s data and customer information is breached or stolen.

International Conference on Information Systems Security & Privacy (ICISSP)

International Conference on Information Systems Security & Privacy (ICISSP)

The ICISSP event is a meeting point for researchers and practitioners to address security and privacy challenges concerning information systems.

My Data Recovery Lab

My Data Recovery Lab

We recover data from: HDDs, RAIDs, NAS, SSDs, USB Flash Devices, Desktop Computers, Mobile devices and other data storage media.

Array Networks

Array Networks

Array Networks, the network functions platform company, develops purpose-built systems for hosting virtual networking and security functions with guaranteed performance.

Swiss Cyber Storm

Swiss Cyber Storm

Swiss Cyber Storm is a non profit organization hosting the international Swiss Cyber Storm Conference and running the Swiss part of the European Cyber Security Challenges.

Oak Ridge National Laboratory (ORNL)

Oak Ridge National Laboratory (ORNL)

ORNL conducts basic and applied research and development in key areas of science for energy, advanced materials, supercomputing and national security including cybersecurity.

Segusoft

Segusoft

With its encryption platform SEGULINK, Segusoft provides standard software for companies to securely transfer files and messages.

Emsisoft

Emsisoft

Emsisoft protects your devices against all types of malware, ransomware and other threats with no-bloat anti-malware & antivirus solutions.

Miratech

Miratech

Miratech is a global IT services and consulting organization offering a full range of IT infrastructure solutions and services including cyber security.

Crosspring

Crosspring

Crosspring is an incubator/accelerator for people who have the ambition to start a successful business or want to extend their existing business in the areas of FinTech, AR, VR, Cybersecurity and SaaS

Secure Forensics

Secure Forensics

Secure Forensics can assist in any situation that requires digital forensics or an investigation ranging from complex criminal matters to fraud and file tampering to cyber crime.

ZARIOT

ZARIOT

ZARIOT's mission is to restore order to what is becoming connected chaos in IoT by bringing unrivalled security, control and quality of service.

Navisite

Navisite

Navisite is a combination of eight respected IT consulting and managed service providers that were brought together under the Navisite brand.

Ibento Global

Ibento Global

Ibento organises the CyberX series of cybersecurity conferences.

Protectt.ai Labs

Protectt.ai Labs

Protectt.ai Labs is India’s first mobile security start up building awareness & providing solutions for mobile app, device & transaction security.