Case Studies

Case Study: Maturing a Compliance Program for an Unexpected DIBCAC Assessment

Case Study: Maturing a Compliance Program for an Unexpected DIBCAC Assessment | 112Cyber Case Study Maturing a Compliance Program for an Unexpected DIBCAC Assessment A DoD prime contractor’s business unit faced a surprise DIBCAC assessment with only one month to prepare — and inherited controls that didn’t meet CMMC standards. 112Cyber stepped in with full-spectrum […]

Blog
FIPS Encryption Requirements in CMMC and NIST SP 800-171

FIPS Encryption Requirements in CMMC and NIST SP 800-171 

When handling Controlled Unclassified Information (CUI), compliance with NIST SP 800-171 and the CMMC framework mandates strict data protection measures—including the use of FIPS-validated encryption in specific scenarios. But one requirement that consistently generates questions is exactly what “FIPS-validated” means in practice, where it applies, and how it differs from the looser “FIPS-compliant” language that […]

Blog

CMMC Compliance in 2026: How Did We Get Here and What’s Coming Next

2025 was the year CMMC stopped being theoretical and started impacting contracts, costs, and careers. For defense contractors, certification is no longer just compliance; it’s a competitive edge, a risk mitigation strategy, and an operational imperative in an era of elevated requirements for organizations in the Defense Industrial Base (DIB).  But it didn’t start that way. January 2025 was still a time of uncertainty and what felt like […]

Blog

Top 10 CMMC Resources in 2025: What OSCs Found Most Helpful 

2025 was a year of undeniable progress when it came to the establishment and enforcement of CMMC (Cybersecurity Maturity Model Certification). As we left 2025 and CMMC moved from anticipated requirement to full-on enforcement, one thing became clear: the companies that made the most CMMC progress weren’t just guessing—they were informed.  Over the past year, our most-read and most-shared CMMC guides reflected the real questions […]

Blog

Where Can You Store CUI and FCI?

Proper storage of Controlled Unclassified Information (CUI) and Federal Contract Information (FCI) is at the core of a healthy and satisfactory compliance program. The issue? There seems to be ample confusion on what CUI and FCI are, the difference between the two, and where they officially can be stored.   Improper storage of both CUI […]

Blog White Papers

Whitepaper: Continuous Controls Monitoring in CMMC Level 2 Compliance: An In-Depth Exploration of Control 3.12.3 

In CMMC, continuous monitoring stands as a pivotal component in safeguarding sensitive information. For organizations aiming to achieve Cybersecurity Maturity Model Certification (CMMC) Level 2 compliance, a thorough understanding and implementation of ‘continuous monitoring’ and its role in Risk Management is essential.  It is easy to conflate three closely related topics, Continuous Controls Monitoring (CCM), […]

  • 1
  • 2