Blog
FIPS Encryption Requirements in CMMC and NIST SP 800-171

FIPS Encryption Requirements in CMMC and NIST SP 800-171 

When handling Controlled Unclassified Information (CUI), compliance with NIST SP 800-171 and the CMMC framework mandates strict data protection measures—including the use of FIPS-validated encryption in specific scenarios. But one requirement that consistently generates questions is exactly what “FIPS-validated” means in practice, where it applies, and how it differs from the looser “FIPS-compliant” language that […]

Blog

CMMC Compliance in 2026: How Did We Get Here and What’s Coming Next

2025 was the year CMMC stopped being theoretical and started impacting contracts, costs, and careers. For defense contractors, certification is no longer just compliance; it’s a competitive edge, a risk mitigation strategy, and an operational imperative in an era of elevated requirements for organizations in the Defense Industrial Base (DIB).  But it didn’t start that way. January 2025 was still a time of uncertainty and what felt like […]

Blog

Top 10 CMMC Resources in 2025: What OSCs Found Most Helpful 

2025 was a year of undeniable progress when it came to the establishment and enforcement of CMMC (Cybersecurity Maturity Model Certification). As we left 2025 and CMMC moved from anticipated requirement to full-on enforcement, one thing became clear: the companies that made the most CMMC progress weren’t just guessing—they were informed.  Over the past year, our most-read and most-shared CMMC guides reflected the real questions […]

Blog

Introducing 112Cyber’s Certified CMMC Assessors

Compliance is a massive lift, there’s no understating it. As an Organization Seeking Compliance (OSC), you invest critical resources and time into your compliance program. You wouldn’t want an inexperienced or careless consultant in your environment. There has to be trust. So, let our team of Certified CMMC Assessors and Lead Assessors make your acquaintance. […]

Blog

Where Can You Store CUI and FCI?

Proper storage of Controlled Unclassified Information (CUI) and Federal Contract Information (FCI) is at the core of a healthy and satisfactory compliance program. The issue? There seems to be ample confusion on what CUI and FCI are, the difference between the two, and where they officially can be stored.   Improper storage of both CUI […]

Blog

ISC2 2025: Our Top 8 CMMC Observations 

We recently attended one of the most anticipated cybersecurity conferences of the year—ISC2 Security Congress 2025. Held at the Gaylord Opryland Nashville, thousands gathered to learn the latest in cybersecurity. While it wasn’t a Defense Industrial Base-focused show, the overlap between cybersecurity and compliance was clear.  Our exhibitor booth welcomed several compliance professionals, all of […]

Blog

Timeline of CMMC Phases and Contractor Requirements: A Quick Guide

It’s official, 48CFR has been published and the CMMC Phase 1 rollout is just 60 days away. Defense Industrial Base (DIB) contractors are understandably beginning to search for information regarding the recently finalized DFARS rule (Case 2019-D041), formally integrating the Cybersecurity Maturity Model Certification (CMMC) requirements into the DoD acquisition process.   This is a big deal—especially […]

Blog White Papers

Whitepaper: Continuous Controls Monitoring in CMMC Level 2 Compliance: An In-Depth Exploration of Control 3.12.3 

In CMMC, continuous monitoring stands as a pivotal component in safeguarding sensitive information. For organizations aiming to achieve Cybersecurity Maturity Model Certification (CMMC) Level 2 compliance, a thorough understanding and implementation of ‘continuous monitoring’ and its role in Risk Management is essential.  It is easy to conflate three closely related topics, Continuous Controls Monitoring (CCM), […]