US Cyber Command Begins A Strategic Review

The US Cyber Command is undergoing a significant review intended to update its organisation and  capabilities to make sure it  is positioned  to deal with threats in a highly dynamic environment. 

 The review, which US government officials are referring to as Cybercom 2.0, includes an expansion in size and scope with 14 new teams to be added over five years to the current 39 teams.

In particular, Cybercom's strategic focus will shift  from counter-terrorism and combating violent extremist organisations, to dealing with nation-state threats actors.

The outgoing commander General Paul Nakasone said, “As cyber threats to the nation have evolved, as technology has advanced at rapid pace, so too has Cyber National Mission Force, constantly evolving to meet the nation’s challenges in cyberspace, responding to major cyber-attacks, defending forward in every geographic theater, confronting and engaging the world’s most dangerous cyber actors, and defending the democratic processes of our nation.”

With hacktivist groups and cyber criminals increasingly exploit the Internet and social media for propaganda, fake news and offensive cyber activities, it seems the threat level can only escalate. 

Based on how the Ukraine war has reshaped how the military views the way cyber attacks are used during periods of armed conflict, Cybercom has shifted its focus toward nation state threats. Expanded operational size will provide Cybercom not only more capable teams to deploy quickly, but expand its global reach, able to operate in many different geographic areas simultaneously.  

Over the past two yeas, US agencies have been very active addressing some of the more state and non-state cyber threats the US faces and Cybercom has demonstrated a high level of capability in confronting adversaries in cyberspace.

With a larger team and stronger capabilities, US adversaries like China, Russia and Iran are likely to come under greater pressure from US offensive cyber activity than ever before and while the world may have suspected the United States conducts these types of offensive cyber missions, it is now public knowledge that it is doing so.

CyberCom:     CyberCom:     National Security Agency:     Oodaloop:       DefenseScoop:     

SSRN / Peter Patacsil:   

You Might Also Read: 

Cyber Operations In Wartime:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Building A Cyber-Savvy Nation In The Face Of A Talent Shortage
Ten Ways To Elevate Public Sector Cyber Security »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

SealPath

SealPath

SealPath enables companies to protect and control their documents wherever they are: In their PC, in their corporate network, on a partner’s network, in the cloud.

Applicure Technologies

Applicure Technologies

Applicure Technologies develops the leading multi-platform web application security software products to protect web sites and web applications from external and internal attacks.

Lloyd's

Lloyd's

As an insurance market, Lloyd’s can provide access to more than 65 expert cyber risk insurers in one place.

File Centre

File Centre

File Centre is a leading specialist when it comes to data backup, we offer our clients a premium backup retrieval and delivery solution.

Computest

Computest

Computest security testing services include Mobile app security, Vulnerability assessments, Attack & penetration testing, Security awareness training, Network security assessments.

Tecnalia Research & Innovation

Tecnalia Research & Innovation

Tecnalia is the largest center of applied research and technological development in Spain, a benchmark in Europe and a member of the Basque Research and Technology Alliance.

Bradley-Morris

Bradley-Morris

Bradley-Morris is a leading recruiting firm specializing in transitioning military and veteran talent into civilian careers including Cybersecurity.

Enso Security

Enso Security

Enso is the first Application Security Posture Management (ASPM) solution, helping security teams everywhere eliminate their AppSec chaos with application discovery, classification and management.

Secura B.V.

Secura B.V.

Secura is an independent specialized cybersecurity expert, providing insights to protect valuable assets and data.

Graylog

Graylog

Graylog provides answers to your team’s security, application, and IT infrastructure questions by enabling you to combine, enrich, correlate, query, and visualize all your log data in one place.

Sourcepass

Sourcepass

Sourcepass is an IT consulting company that focuses on providing expert IT services, cloud computing solutions, cybersecurity services, website, and application development.

Riskonnect

Riskonnect

Riskonnect technology empowers organizations with the ability to anticipate, manage, and respond in real-time to strategic, operational, and digital risks across the extended enterprise.

BitLyft

BitLyft

BitLyft is a managed detection and response provider that is dedicated to delivering unparalleled protection from cyber attacks for organizations of all sizes.

Evo Security

Evo Security

Evo Security is an Identity and Access Management company focused exclusively on serving MSPs, MSSPs and their SMB and Mid-Market customers.

Siometrix

Siometrix

Siometrix addresses digital identity fraud. It steals your attacker's time and prevents many prevalent attack vectors.

Sardine

Sardine

Sardine is a leader in financial crime prevention. Using unparalleled device intelligence and behavior biometrics, Sardine applies machine learning to detect and stop fraud before it happens.