Ptechhub
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
PtechHub
No Result
View All Result

With Iran Cyberthreat Growing, CMMC Isn’t Looking So Crazy: Analysis

CRN by CRN
July 2, 2025
Home News
Share on FacebookShare on Twitter


The rising Iranian threat shows why the DoD’s ultra-stringent security requirements for compliance with its CMMC program are probably worthwhile — despite all the messiness associated with the program.

Perhaps more than any other segment of IT, cybersecurity is ultimately not about working with human nature – but about thwarting it.

This would seem to be true whether we’re talking about individuals (getting you to stop clicking those phishing emails) or organizations.

In the latter case, a good cybersecurity program involves forcing an organization to make major investments in advance — maybe even far in advance — of those investments actually being needed.

This is rarely easy because, well, humans are involved. This sort of longer-term planning frequently conflicts with the human tendency for short-term thinking.

[Related: MSPs Need To Keep CMMC Compliance Top Of Mind]

The arrival of tangible threats, however, tends to bring greater clarity around cybersecurity priorities to the human mind. And one such threat, from Iran, is in the spotlight right now, and could be for the foreseeable future.

Following the Iran-Israel war and U.S. intervention last month, the FBI and other federal agencies this week released a stark warning — saying they “strongly urge organizations to remain vigilant for potential targeted cyber activity against U.S. critical infrastructure and other U.S. entities by Iranian-affiliated cyber actors.”

“Despite a declared ceasefire and ongoing negotiations towards a permanent solution, Iranian-affiliated cyber actors and hacktivist groups may still conduct malicious cyber activity,” the agencies, which also included CISA and the NSA, said in the advisory Monday.

Specifically, the agencies pinpointed Defense Industrial Base contractors as among those at an “increased risk” from Iran going forward.

Reading that line made me think of the conversations I have had recently with MSPs and security experts about Department of Defense efforts to dramatically raise the security posture of its Defense Industrial Base contractors, through the DoD’s Cybersecurity Maturity Model Certification (CMMC) program.

CMMC is complex, stringent and expensive. There’s no denying that the program is very, very messy.

But the more subtle challenge for many defense contractors and MSPs is simply that, like with so many other aspects of cybersecurity, buy-in really requires taking a longer-term view than usual.

Why is it necessary to meet the 110 — yes, 110 — different security requirements for achieving compliance with CMMC? And furthermore, why are there hundreds of associated objectives that must also be met?

The answers may have been harder to grasp a year or two ago, than they are today. The possible threat of a coordinated cyber assault from Iran against vast swaths of the Defense Industrial Base would tend to cast CMMC and the array of requirements that comes with it in a more sympathetic light.

Now this is not to let the federal government off the hook for the countless ways it has made CMMC more difficult for contractors and MSPs to take seriously, through years of delays and lack of clarity. But crucially, all indications now suggest the program is not in fact going to fall victim to White House deregulation efforts.

And with the specter of expanding cyberthreats from Iran — not to mention from other hostile nation-states — one would expect that CMMC is not only here to stay, but may just be a key to winning the cyberwar.



Source link

Tags: CyberattacksCybersecurityData breaches
CRN

CRN

Next Post
What Could a Healthy AI Companion Look Like?

What Could a Healthy AI Companion Look Like?

Recommended.

UK MoD awards more than two dozen contracts for AI targeting systems | Computer Weekly

UK MoD awards more than two dozen contracts for AI targeting systems | Computer Weekly

March 18, 2026
Private Cellular Deployment Takes a Hit in U.S. Manufacturing, with Initial Private 5G Rollout Numbers Dipping by 11% Since 2024

Private Cellular Deployment Takes a Hit in U.S. Manufacturing, with Initial Private 5G Rollout Numbers Dipping by 11% Since 2024

May 13, 2025

Trending.

Spirit of openness helps banks get serious about stopping scams | Computer Weekly

Spirit of openness helps banks get serious about stopping scams | Computer Weekly

April 10, 2025
Microsoft Q3 Earnings Preview: What To Watch On Azure, Copilot, OpenAI

Microsoft Q3 Earnings Preview: What To Watch On Azure, Copilot, OpenAI

April 29, 2026
Weibo Publishes 2025 Environmental, Social and Governance Report

Weibo Publishes 2025 Environmental, Social and Governance Report

April 28, 2026
It Takes 2 Minutes to Hack the EU’s New Age-Verification App

It Takes 2 Minutes to Hack the EU’s New Age-Verification App

April 18, 2026
Chunghwa Telecom 2025 Form 20-F filed with the U.S. SEC

Chunghwa Telecom 2025 Form 20-F filed with the U.S. SEC

April 15, 2026

PTechHub

A tech news platform delivering fresh perspectives, critical insights, and in-depth reporting — beyond the buzz. We cover innovation, policy, and digital culture with clarity, independence, and a sharp editorial edge.

Follow Us

Industries

  • AI & ML
  • Cybersecurity
  • Enterprise IT
  • Finance
  • Telco

Navigation

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Subscribe to Our Newsletter

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Copyright © 2025 | Powered By Porpholio

No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs

Copyright © 2025 | Powered By Porpholio