<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:media="http://search.yahoo.com/mrss/" >

<channel>
	<title>Asset Management &#8211; SteelCloud</title>
	<atom:link href="https://www.steelcloud.com/tag/asset-management/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.steelcloud.com</link>
	<description></description>
	<lastBuildDate>Mon, 25 Aug 2025 19:51:00 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.steelcloud.com/wp-content/uploads/favicon.png</url>
	<title>Asset Management &#8211; SteelCloud</title>
	<link>https://www.steelcloud.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>White Paper: Realizing the Promise of Zero Trust</title>
		<link>https://www.steelcloud.com/white-paper-realizing-the-promise-of-zero-trust/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Tue, 20 Aug 2024 20:25:26 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[White Papers]]></category>
		<category><![CDATA[Asset Management]]></category>
		<category><![CDATA[ATO]]></category>
		<category><![CDATA[Authority To Operate]]></category>
		<category><![CDATA[CDM]]></category>
		<category><![CDATA[compliance automation]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[dashview splunk]]></category>
		<category><![CDATA[Data protection]]></category>
		<category><![CDATA[emass automation]]></category>
		<category><![CDATA[FISHMA]]></category>
		<category><![CDATA[NIST 800]]></category>
		<category><![CDATA[RMF]]></category>
		<category><![CDATA[siem data]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[stig viewer checklist]]></category>
		<category><![CDATA[Zero Trust]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=86626</guid>

					<description><![CDATA[Hardening is foundational with Zero Trust. Automation helps.  Establishing Zero Trust goes beyond protecting your perimeter. You also need to put a metal detector at the entrance, secure the locker room, and provide continual surveillance. And ZT is not a one-size-fits-all approach. Instead, the result will be a continuum of solutions and outcomes tailored to ...]]></description>
		
		
		
			</item>
		<item>
		<title>SteelCloud Named Amongst “2021 Top 10 Endpoint Solution Providers” by GRC Outlook Magazine</title>
		<link>https://www.steelcloud.com/steelcloud-named-amongst-2021-top-10-endpoint-solution-providers-by-grc-outlook-magazine/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Wed, 12 Jan 2022 09:48:35 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Press Releases]]></category>
		<category><![CDATA[Asset Management]]></category>
		<category><![CDATA[ATO]]></category>
		<category><![CDATA[Authority To Operate]]></category>
		<category><![CDATA[compliance automation]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[Data protection]]></category>
		<category><![CDATA[endpoint solution provider]]></category>
		<category><![CDATA[Federal Contractor]]></category>
		<category><![CDATA[grc magazine]]></category>
		<category><![CDATA[NIST 800]]></category>
		<category><![CDATA[RMF]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=82898</guid>

					<description><![CDATA[GRC Outlook Magazine names SteelCloud amongst the &#8220;2021 Top 10 Endpoint Solution Providers&#8221; Ashburn, Virginia – January 12, 2022 – SteelCloud LLC, a STIG and CIS compliance automation software developer, announced today that it has been selected as one of the “Top 10 Endpoint  Solution Providers for 2021” by GRC Outlook  Magazine. It is clear ...]]></description>
		
		
		
			</item>
		<item>
		<title>White Paper: eMASS Automation</title>
		<link>https://www.steelcloud.com/white-paper-emass-automation/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Tue, 11 Jan 2022 12:27:01 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[White Papers]]></category>
		<category><![CDATA[Asset Management]]></category>
		<category><![CDATA[ATO]]></category>
		<category><![CDATA[Authority To Operate]]></category>
		<category><![CDATA[compliance automation]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[dashview splunk]]></category>
		<category><![CDATA[Data protection]]></category>
		<category><![CDATA[emass automation]]></category>
		<category><![CDATA[NIST 800]]></category>
		<category><![CDATA[RMF]]></category>
		<category><![CDATA[siem data]]></category>
		<category><![CDATA[stig viewer checklist]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=82887</guid>

					<description><![CDATA[White Paper: eMASS Automation – The Search for a Solution to Unite and Automate Security Compliance Data eMASS, or the Enterprise Mission Assurance Support Service, was developed by the DoD, in part, as a repository that unites technical/machine data generated from endpoint scans with the human/non-technical data documented by security/IA personnel. Imagine a 1,000 workstation ...]]></description>
		
		
		
			</item>
		<item>
		<title>White Paper: A Consultant&#8217;s Guide to Lower-Level Controls for CMMC</title>
		<link>https://www.steelcloud.com/white-paper-consultants-guide-to-lower-level-controls-for-cmmc/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Sun, 01 Aug 2021 15:45:40 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[White Papers]]></category>
		<category><![CDATA[Asset Management]]></category>
		<category><![CDATA[ATO]]></category>
		<category><![CDATA[Authority To Operate]]></category>
		<category><![CDATA[C3PAO]]></category>
		<category><![CDATA[certified assessors]]></category>
		<category><![CDATA[cmmc audit]]></category>
		<category><![CDATA[CMMC certification]]></category>
		<category><![CDATA[compliance automation]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[Cybersecurity Maturity Model Cybersecurity Maturity Model]]></category>
		<category><![CDATA[Data protection]]></category>
		<category><![CDATA[Federal Contractor]]></category>
		<category><![CDATA[Guide for CMMC consultants]]></category>
		<category><![CDATA[NIST 800]]></category>
		<category><![CDATA[RMF]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=81785</guid>

					<description><![CDATA[No need to paddle against the current when you have A Consultant&#8217;s Guide to Lower-Level Controls for CMMC Certified Third-party Assessor Organizations (C3PAOs), Registered Provider Organizations (RPOs), Certified Assessors (CAs), and Registered Practitioners (RPs) are beginning to mobilize as plans for implementing the Cybersecurity Maturity Model Certification (CMMC) start to roll out slowly. While the compliance landscape ...]]></description>
		
		
		
			</item>
		<item>
		<title>White Paper: Using STIGs to Accelerate CDM Compliance </title>
		<link>https://www.steelcloud.com/white-paper-using-stigs-to-accelerate-cdm-compliance/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Sun, 01 Aug 2021 11:44:17 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[White Papers]]></category>
		<category><![CDATA[accelerate cdm]]></category>
		<category><![CDATA[Asset Management]]></category>
		<category><![CDATA[CDM]]></category>
		<category><![CDATA[CDM DEFEND]]></category>
		<category><![CDATA[CDM program]]></category>
		<category><![CDATA[compliance automation]]></category>
		<category><![CDATA[continuous diagnostic mitigation capabilities]]></category>
		<category><![CDATA[Continuous Diagnostics and Mitigation]]></category>
		<category><![CDATA[Data protection]]></category>
		<category><![CDATA[DHS]]></category>
		<category><![CDATA[Federal Contractor]]></category>
		<category><![CDATA[NIST 800]]></category>
		<category><![CDATA[nist 800171]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=81863</guid>

					<description><![CDATA[Accelerate CDM compliance and reimagine your traditional network security As part of the Executive Order on Improving the Nation’s Cybersecurity (Executive Order), Federal Civilian Executive Branch (FCEB) Agencies need to establish or update their Memoranda of Agreement with CISA for the CDM (Continuous Diagnostics and Mitigation) program ensure that the object level data are available ...]]></description>
		
		
		
			</item>
		<item>
		<title>Ebook: Securing our Nation’s Infrastructure: Decoding STIG, CIS and CDM</title>
		<link>https://www.steelcloud.com/securing-our-nations-infrastructure-decoding-stig-cis-and-cdm/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Sun, 01 Aug 2021 15:28:01 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[eBooks]]></category>
		<category><![CDATA[accelerate cdm]]></category>
		<category><![CDATA[Asset Management]]></category>
		<category><![CDATA[CDM]]></category>
		<category><![CDATA[CDM DEFEND]]></category>
		<category><![CDATA[CDM program]]></category>
		<category><![CDATA[compliance automation]]></category>
		<category><![CDATA[continuous diagnostic mitigation capabilities]]></category>
		<category><![CDATA[Continuous Diagnostics and Mitigation]]></category>
		<category><![CDATA[Data protection]]></category>
		<category><![CDATA[DHS]]></category>
		<category><![CDATA[Federal Contractor]]></category>
		<category><![CDATA[NIST 800]]></category>
		<category><![CDATA[nist 800171]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=82291</guid>

					<description><![CDATA[It seems like every time you turn around, somebody’s website has been hacked or their data has been compromised. In 2013, the Cybersecurity and Infrastructure Security Agency (CISA), who leads the national effort to defend critical government and private sector infrastructure against threats and evolving risks, established their Continuous Diagnostics and Mitigation (CDM) program to ...]]></description>
		
		
		
			</item>
		<item>
		<title>How to Meet CMMC Compliance Mandates with STIG Automation</title>
		<link>https://www.steelcloud.com/how-to-meet-cmmc-compliance-mandates-with-stig-automation/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Tue, 06 Jul 2021 14:48:48 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Asset Management]]></category>
		<category><![CDATA[ATO]]></category>
		<category><![CDATA[Authority To Operate]]></category>
		<category><![CDATA[C3PAO]]></category>
		<category><![CDATA[certified assessors]]></category>
		<category><![CDATA[cmmc audit]]></category>
		<category><![CDATA[CMMC certification]]></category>
		<category><![CDATA[CMMC Compliance Mandate]]></category>
		<category><![CDATA[CMMC Consultants]]></category>
		<category><![CDATA[compliance automation]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[Cybersecurity Maturity Model Cybersecurity Maturity Model]]></category>
		<category><![CDATA[Data protection]]></category>
		<category><![CDATA[DFARS]]></category>
		<category><![CDATA[Federal Contractor]]></category>
		<category><![CDATA[Guide for CMMC consultants]]></category>
		<category><![CDATA[NIST 800]]></category>
		<category><![CDATA[RMF]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=81997</guid>

					<description><![CDATA[How to Meet CMMC Compliance Mandates with STIG Automation Everyone is talking about the cost of complying with the CMMC Compliance Mandate Contractors across the Defense Industrial Base (DIB) are still trying to figure out how to fit CMMC into their long-term business goals. As a DIB member, you might be considering whether the certification ...]]></description>
		
		
		
			</item>
		<item>
		<title>Interview: Continuous Diagnostics &#038; Mitigation &#8211; CDM Program</title>
		<link>https://www.steelcloud.com/interview-continuous-diagnostic-mitigation-cdm-program/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Mon, 05 Jul 2021 13:10:59 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Videos]]></category>
		<category><![CDATA[Asset Management]]></category>
		<category><![CDATA[CDM]]></category>
		<category><![CDATA[Network security]]></category>
		<category><![CDATA[RMF]]></category>
		<category><![CDATA[STIG]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=78664</guid>

					<description><![CDATA[SteelCloud helps contractors comply with DHS&#8217;s Continuous Diagnostics &#38; Mitigation (CDM) Program. What does (CDM) really mean to contractors wishing to deliver compliant solutions and programs to the federal government? In support of government-wide and agency-specific efforts to provide adequate, risk-based, and cost-effective cybersecurity, the Department of Homeland Security (DHS) established the Listen to Brian Hajost, ...]]></description>
		
		
		
			</item>
		<item>
		<title>Top Things CMMC Consultants Needs to Consider</title>
		<link>https://www.steelcloud.com/top-things-cmmc-consultants-needs-to-consider/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Mon, 28 Jun 2021 15:23:25 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Asset Management]]></category>
		<category><![CDATA[ATO]]></category>
		<category><![CDATA[Authority To Operate]]></category>
		<category><![CDATA[C3PAO]]></category>
		<category><![CDATA[certified assessors]]></category>
		<category><![CDATA[cmmc audit]]></category>
		<category><![CDATA[CMMC certification]]></category>
		<category><![CDATA[CMMC Consultants]]></category>
		<category><![CDATA[compliance automation]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[Cybersecurity Maturity Model Cybersecurity Maturity Model]]></category>
		<category><![CDATA[Data protection]]></category>
		<category><![CDATA[DFARS]]></category>
		<category><![CDATA[Federal Contractor]]></category>
		<category><![CDATA[Guide for CMMC consultants]]></category>
		<category><![CDATA[NIST 800]]></category>
		<category><![CDATA[RMF]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=81985</guid>

					<description><![CDATA[With so little guidance on building Cybersecurity Maturity Model Certification (CMMC) programs, consultants struggle to help their clients. Meanwhile, a standardized approach to achieving compliance has not been established yet, either. As a Registered Practitioner (RP) or Certified Assessor (CA), your clients rely on your experience, but your unique background might make it hard to ...]]></description>
		
		
		
			</item>
	</channel>
</rss>
