US Cyber Command Begins A Strategic Review

The US Cyber Command is undergoing a significant review intended to update its organisation and  capabilities to make sure it  is positioned  to deal with threats in a highly dynamic environment. 

 The review, which US government officials are referring to as Cybercom 2.0, includes an expansion in size and scope with 14 new teams to be added over five years to the current 39 teams.

In particular, Cybercom's strategic focus will shift  from counter-terrorism and combating violent extremist organisations, to dealing with nation-state threats actors.

The outgoing commander General Paul Nakasone said, “As cyber threats to the nation have evolved, as technology has advanced at rapid pace, so too has Cyber National Mission Force, constantly evolving to meet the nation’s challenges in cyberspace, responding to major cyber-attacks, defending forward in every geographic theater, confronting and engaging the world’s most dangerous cyber actors, and defending the democratic processes of our nation.”

With hacktivist groups and cyber criminals increasingly exploit the Internet and social media for propaganda, fake news and offensive cyber activities, it seems the threat level can only escalate. 

Based on how the Ukraine war has reshaped how the military views the way cyber attacks are used during periods of armed conflict, Cybercom has shifted its focus toward nation state threats. Expanded operational size will provide Cybercom not only more capable teams to deploy quickly, but expand its global reach, able to operate in many different geographic areas simultaneously.  

Over the past two yeas, US agencies have been very active addressing some of the more state and non-state cyber threats the US faces and Cybercom has demonstrated a high level of capability in confronting adversaries in cyberspace.

With a larger team and stronger capabilities, US adversaries like China, Russia and Iran are likely to come under greater pressure from US offensive cyber activity than ever before and while the world may have suspected the United States conducts these types of offensive cyber missions, it is now public knowledge that it is doing so.

CyberCom:     CyberCom:     National Security Agency:     Oodaloop:       DefenseScoop:     

SSRN / Peter Patacsil:   

You Might Also Read: 

Cyber Operations In Wartime:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Building A Cyber-Savvy Nation In The Face Of A Talent Shortage
Ten Ways To Elevate Public Sector Cyber Security »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

Teradata

Teradata

Teradata is a leading provider of enterprise big data analytics and services. Applications include Cyber Security Analytics.

Centripetal Networks

Centripetal Networks

Centripetal Networks was founded with one vision - to protect networks from advanced threats by simplifying intelligence-driven security.

mnemonic

mnemonic

mnemonic helps businesses manage their security risks, protect their data and defend against cyber threats.

Nexusguard

Nexusguard

Nexusguard is at the forefront of the fight against malicious Internet attacks, protecting organizations worldwide from threats to their websites, services, and reputations.

RiskIQ

RiskIQ

RiskIQ is the leader in digital threat management, providing the most comprehensive discovery, intelligence, and mitigation of threats associated with an organization’s digital presence.

National Cyber Security Centre (NCSC) - Switzerland

National Cyber Security Centre (NCSC) - Switzerland

The National Cyber Security Centre is Swizerland's competence centre for cybersecurity and the first contact point for businesses, public administrations, and the public for cyber issues.

Langner

Langner

Langner is a software and consulting firm specialized in cyber security for critical infrastructure and large-scale manufacturing.

Slovak National Accreditation Service (SNAS)

Slovak National Accreditation Service (SNAS)

SNAS is the national accreditation body for Slovakia. The directory of members provides details of organisations offering certification services for ISO 27001.

Trusted Objects

Trusted Objects

Trusted Object's mission is to provide state of the art security solutions and services enabling a strong root of trust for the IoT ecosystem.

Asia Center of Excellence for Smart Technologies (ACES)

Asia Center of Excellence for Smart Technologies (ACES)

ACES is a one-stop competency center and incubator for the development of Industry 4.0 and associated technologies including cybersecurity, robotics, IoT and Big Data.

AppOmni

AppOmni

AppOmni is the only SaaS CSPM solution that gives teams all the tools they need to be successful – from security posture management to monitoring and detection to continuous compliance.

GajShield

GajShield

GajShield Infotech provides Data Security Firewall solutions to Corporate’s and Government agencies.

Sidcon International Consulting Company

Sidcon International Consulting Company

SIDCON International Consulting Company has been providing consulting services since 2002 for private and public organizations in Ukraine and other countries.

Sterling Information Technologies

Sterling Information Technologies

Sterling is an information security, operational risk consulting and advisory group. Our Advisory services help to safeguard information assets while supporting business operations.

Fulcrum IT Partners

Fulcrum IT Partners

Fulcrum IT Partners is the parent company of an expanding portfolio of established IT solution companies around the world with proven expertise in cyber security, cloud, and managed services.

Ronet Cyber Security

Ronet Cyber Security

Ronet Cyber Security offers crypto forensics services for regulators, law enforcement, companies and individuals to ensure that your transactions are safe and secure.