<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:media="http://search.yahoo.com/mrss/" >

<channel>
	<title>critical software &#8211; SteelCloud</title>
	<atom:link href="https://www.steelcloud.com/tag/critical-software/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.steelcloud.com</link>
	<description></description>
	<lastBuildDate>Mon, 25 Aug 2025 19:27:54 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.steelcloud.com/wp-content/uploads/favicon.png</url>
	<title>critical software &#8211; SteelCloud</title>
	<link>https://www.steelcloud.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>eBook: Securing the Software Supply Chain</title>
		<link>https://www.steelcloud.com/ebook-securing-the-software-supply-chain/</link>
		
		<dc:creator><![CDATA[Stephanie Plona]]></dc:creator>
		<pubDate>Tue, 27 Feb 2024 18:32:33 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[eBooks]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[critical software]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[eBook]]></category>
		<category><![CDATA[SBOM]]></category>
		<category><![CDATA[securing the software supply chain]]></category>
		<category><![CDATA[software bill of materials]]></category>
		<category><![CDATA[supply chain security]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=89055</guid>

					<description><![CDATA[eBook: Securing the Software Supply Chain &#160; If you want to be or stay part of the federal software supply chain, the rules of engagement have changed drastically over the past few years. Dive into this free eBook resource, &#8220;Securing the Software Supply Chain&#8221; and discover: Compliance Requirements in the Supply Chain Conducting A Risk ...]]></description>
		
		
		
			</item>
		<item>
		<title>There’s a Breach in the Supply Chain. What Do You Do?</title>
		<link>https://www.steelcloud.com/theres-a-breach-in-the-supply-chain-what-do-you-do/</link>
		
		<dc:creator><![CDATA[Stephanie Plona]]></dc:creator>
		<pubDate>Mon, 26 Feb 2024 19:45:04 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[breach]]></category>
		<category><![CDATA[critical software]]></category>
		<category><![CDATA[CUI]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[DoD]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[securing the software supply chain]]></category>
		<category><![CDATA[software]]></category>
		<category><![CDATA[supply chain]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=89050</guid>

					<description><![CDATA[There’s a breach in the supply chain. What do you do? What to do in case of a breach. Let’s say you’ve established government-level cybersecurity in your organization. You’ve assessed your risks. You’ve aligned with stringent compliance standards such as STIG, CIS or CMMC. Your systems are continually updated with security measures. And, you have ...]]></description>
		
		
		
			</item>
		<item>
		<title>Assessing Risk in the Government Software Supply Chain</title>
		<link>https://www.steelcloud.com/assessing-risk-in-the-government-software-supply-chain/</link>
		
		<dc:creator><![CDATA[Stephanie Plona]]></dc:creator>
		<pubDate>Tue, 06 Feb 2024 15:42:04 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[critical software]]></category>
		<category><![CDATA[EO 14028]]></category>
		<category><![CDATA[nist 800-53]]></category>
		<category><![CDATA[risk assesment]]></category>
		<category><![CDATA[SBOM]]></category>
		<category><![CDATA[secure configuration management]]></category>
		<category><![CDATA[securing the software supply chain]]></category>
		<category><![CDATA[software supply chain]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=89027</guid>

					<description><![CDATA[Assessing Risk in the Government&#8217;s Software Supply Chain &#160; Critical elements of a risk assessment. &#160; In 2020, hackers found their way into the back door of an IT performance monitoring solution called Orion, made by SolarWinds. And through this breach, the 30,000 organizations that used the Orion solution became vulnerable. More than 18,000 customers ...]]></description>
		
		
		
			</item>
	</channel>
</rss>
