Ptechhub
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
PtechHub
No Result
View All Result

With Iran Cyberthreat Growing, CMMC Isn’t Looking So Crazy: Analysis

CRN by CRN
July 2, 2025
Home News
Share on FacebookShare on Twitter


The rising Iranian threat shows why the DoD’s ultra-stringent security requirements for compliance with its CMMC program are probably worthwhile — despite all the messiness associated with the program.

Perhaps more than any other segment of IT, cybersecurity is ultimately not about working with human nature – but about thwarting it.

This would seem to be true whether we’re talking about individuals (getting you to stop clicking those phishing emails) or organizations.

In the latter case, a good cybersecurity program involves forcing an organization to make major investments in advance — maybe even far in advance — of those investments actually being needed.

This is rarely easy because, well, humans are involved. This sort of longer-term planning frequently conflicts with the human tendency for short-term thinking.

[Related: MSPs Need To Keep CMMC Compliance Top Of Mind]

The arrival of tangible threats, however, tends to bring greater clarity around cybersecurity priorities to the human mind. And one such threat, from Iran, is in the spotlight right now, and could be for the foreseeable future.

Following the Iran-Israel war and U.S. intervention last month, the FBI and other federal agencies this week released a stark warning — saying they “strongly urge organizations to remain vigilant for potential targeted cyber activity against U.S. critical infrastructure and other U.S. entities by Iranian-affiliated cyber actors.”

“Despite a declared ceasefire and ongoing negotiations towards a permanent solution, Iranian-affiliated cyber actors and hacktivist groups may still conduct malicious cyber activity,” the agencies, which also included CISA and the NSA, said in the advisory Monday.

Specifically, the agencies pinpointed Defense Industrial Base contractors as among those at an “increased risk” from Iran going forward.

Reading that line made me think of the conversations I have had recently with MSPs and security experts about Department of Defense efforts to dramatically raise the security posture of its Defense Industrial Base contractors, through the DoD’s Cybersecurity Maturity Model Certification (CMMC) program.

CMMC is complex, stringent and expensive. There’s no denying that the program is very, very messy.

But the more subtle challenge for many defense contractors and MSPs is simply that, like with so many other aspects of cybersecurity, buy-in really requires taking a longer-term view than usual.

Why is it necessary to meet the 110 — yes, 110 — different security requirements for achieving compliance with CMMC? And furthermore, why are there hundreds of associated objectives that must also be met?

The answers may have been harder to grasp a year or two ago, than they are today. The possible threat of a coordinated cyber assault from Iran against vast swaths of the Defense Industrial Base would tend to cast CMMC and the array of requirements that comes with it in a more sympathetic light.

Now this is not to let the federal government off the hook for the countless ways it has made CMMC more difficult for contractors and MSPs to take seriously, through years of delays and lack of clarity. But crucially, all indications now suggest the program is not in fact going to fall victim to White House deregulation efforts.

And with the specter of expanding cyberthreats from Iran — not to mention from other hostile nation-states — one would expect that CMMC is not only here to stay, but may just be a key to winning the cyberwar.



Source link

Tags: CyberattacksCybersecurityData breaches
CRN

CRN

Next Post
What Could a Healthy AI Companion Look Like?

What Could a Healthy AI Companion Look Like?

Recommended.

Dutch cloud pioneers face the hard limits of digital sovereignty | Computer Weekly

Dutch cloud pioneers face the hard limits of digital sovereignty | Computer Weekly

June 20, 2025
Passwords for social media accounts could be required for some to enter country

Passwords for social media accounts could be required for some to enter country

March 25, 2025

Trending.

Chai AI Announces Upcoming Rollout of Apple and Google Age Verification APIs to Enhance Platform Safety

Chai AI Announces Upcoming Rollout of Apple and Google Age Verification APIs to Enhance Platform Safety

March 10, 2026
Huawei lanceert Next Generation FAN-oplossing

Huawei lanceert Next Generation FAN-oplossing

March 7, 2026
Baidu Announces Fourth Quarter and Fiscal Year 2025 Results

Baidu Announces Fourth Quarter and Fiscal Year 2025 Results

February 26, 2026
Half of Google’s software development now AI-generated | Computer Weekly

Half of Google’s software development now AI-generated | Computer Weekly

February 5, 2026
Ghost Campaign Uses 7 npm Packages to Steal Crypto Wallets and Credentials

Ghost Campaign Uses 7 npm Packages to Steal Crypto Wallets and Credentials

March 24, 2026

PTechHub

A tech news platform delivering fresh perspectives, critical insights, and in-depth reporting — beyond the buzz. We cover innovation, policy, and digital culture with clarity, independence, and a sharp editorial edge.

Follow Us

Industries

  • AI & ML
  • Cybersecurity
  • Enterprise IT
  • Finance
  • Telco

Navigation

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Subscribe to Our Newsletter

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Copyright © 2025 | Powered By Porpholio

No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs

Copyright © 2025 | Powered By Porpholio