<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:media="http://search.yahoo.com/mrss/" >

<channel>
	<title>CUI &#8211; SteelCloud</title>
	<atom:link href="https://www.steelcloud.com/tag/cui/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.steelcloud.com</link>
	<description></description>
	<lastBuildDate>Mon, 30 Mar 2026 19:11:15 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.steelcloud.com/wp-content/uploads/favicon.png</url>
	<title>CUI &#8211; SteelCloud</title>
	<link>https://www.steelcloud.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>7 Reasons to Automate Your CMMC 2+ Compliance</title>
		<link>https://www.steelcloud.com/7-reasons-to-automate-your-cmmc-compliance/</link>
		
		<dc:creator><![CDATA[Stephanie Plona]]></dc:creator>
		<pubDate>Wed, 26 Nov 2025 20:30:29 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Collaterals]]></category>
		<category><![CDATA[Automation]]></category>
		<category><![CDATA[CMMC]]></category>
		<category><![CDATA[Compliance]]></category>
		<category><![CDATA[compliance automation]]></category>
		<category><![CDATA[CUI]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[DIB]]></category>
		<category><![CDATA[DoD]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=88857</guid>

					<description><![CDATA[7 Reasons to Automate Your CMMC 2+ Compliance Curious about the transformative power of compliance automation? Here are seven compelling benefits that streamline your journey towards meeting CMMC 2+ compliance and beyond. Let&#8217;s dive into the advantages that could reshape your approach to cybersecurity. Download the free data sheet now! ]]></description>
		
		
		
			</item>
		<item>
		<title>eBook: CMMC For Dummies</title>
		<link>https://www.steelcloud.com/ebook-cmmc-for-dummies/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Wed, 16 Jul 2025 15:47:09 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[eBooks]]></category>
		<category><![CDATA[ATO]]></category>
		<category><![CDATA[Automate CMMC Compliance]]></category>
		<category><![CDATA[Automated STIG Compliance]]></category>
		<category><![CDATA[center internet security]]></category>
		<category><![CDATA[CMMC]]></category>
		<category><![CDATA[CMMC for Dummies eBook]]></category>
		<category><![CDATA[compliance automation]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[CUI]]></category>
		<category><![CDATA[Cybersecurity Maturity Model]]></category>
		<category><![CDATA[dod stig]]></category>
		<category><![CDATA[FedRAMP]]></category>
		<category><![CDATA[nist 800-171]]></category>
		<category><![CDATA[nist 800-53]]></category>
		<category><![CDATA[RMF]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=81653</guid>

					<description><![CDATA[CMMC For Dummies simplifies the program’s impact for the leadership of any DoD contractor, both big and small Ashburn, Virginia – July 16, 2025 &#8211; SteelCloud LLC, a leading STIG and CIS compliance automation software developer, announced today the release of the updated 3rd edition of “CMMC For Dummies,” an eBook to help Defense Industrial ...]]></description>
		
		
		
			</item>
		<item>
		<title>VIDEO: CMMC 2.0&#8217;s Final Rule</title>
		<link>https://www.steelcloud.com/video-cmmc-2-0s-final-rule/</link>
		
		<dc:creator><![CDATA[Stephanie Plona]]></dc:creator>
		<pubDate>Thu, 02 Jan 2025 21:30:49 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Videos]]></category>
		<category><![CDATA[Automation]]></category>
		<category><![CDATA[CMMC]]></category>
		<category><![CDATA[CMMC 2.0]]></category>
		<category><![CDATA[Compliance]]></category>
		<category><![CDATA[CUI]]></category>
		<category><![CDATA[FCI]]></category>
		<category><![CDATA[Final Rule]]></category>
		<category><![CDATA[Level 2+]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=90041</guid>

					<description><![CDATA[VIDEO: CMMC 2.0&#8217;s Final Rule If you are a contractor doing business with the DoD, your contracts will soon become dependent on a Cybersecurity Maturity Model Certification (CMMC). The final rule for CMMC 2.0 was published on October 15, 2024. It became effective on Dec 16, 2024, and enter contracts in mid-2025. CMMC 2.0 verifies ...]]></description>
		
		
		
		<media:content url="https://www.youtube.com/embed/Lh7EvySNzpQ" medium="video" width="1280" height="720">
			<media:player url="https://www.youtube.com/embed/Lh7EvySNzpQ" />
			<media:title type="plain">CMMC 2.0&#039;s Final Rule</media:title>
			<media:description type="html"><![CDATA[If you are a contractor doing business with the DoD, your contracts will soon become dependent on a Cybersecurity Maturity Model Certification (CMMC). The fi...]]></media:description>
			<media:thumbnail url="https://www.steelcloud.com/wp-content/uploads/cmmc-2-0s-final-rule.jpg" />
			<media:rating scheme="urn:simple">nonadult</media:rating>
		</media:content>
	</item>
		<item>
		<title>FCI, CUI and CMMC 2.0’s Final Rule</title>
		<link>https://www.steelcloud.com/fci-cui-and-cmmc-2-0s-final-rule/</link>
		
		<dc:creator><![CDATA[Stephanie Plona]]></dc:creator>
		<pubDate>Tue, 05 Nov 2024 15:58:43 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Automation]]></category>
		<category><![CDATA[CMMC]]></category>
		<category><![CDATA[CMMC 2.0]]></category>
		<category><![CDATA[Compliance]]></category>
		<category><![CDATA[CUI]]></category>
		<category><![CDATA[DIB]]></category>
		<category><![CDATA[DoD]]></category>
		<category><![CDATA[FCI]]></category>
		<category><![CDATA[nist 800-171]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=89884</guid>

					<description><![CDATA[FCI, CUI and CMMC 2.0’s Final Rule If you are a contractor doing business with the DoD, your contracts will soon become (and maybe already are) dependent on a Cybersecurity Maturity Model Certification (CMMC). The final rule for CMMC 2.0 was published on October 15, 2024. It will become effective on Dec 16, 2024, and enter ...]]></description>
		
		
		
			</item>
		<item>
		<title>There’s a Breach in the Supply Chain. What Do You Do?</title>
		<link>https://www.steelcloud.com/theres-a-breach-in-the-supply-chain-what-do-you-do/</link>
		
		<dc:creator><![CDATA[Stephanie Plona]]></dc:creator>
		<pubDate>Mon, 26 Feb 2024 19:45:04 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[breach]]></category>
		<category><![CDATA[critical software]]></category>
		<category><![CDATA[CUI]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[DoD]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[securing the software supply chain]]></category>
		<category><![CDATA[software]]></category>
		<category><![CDATA[supply chain]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=89050</guid>

					<description><![CDATA[There’s a breach in the supply chain. What do you do? What to do in case of a breach. Let’s say you’ve established government-level cybersecurity in your organization. You’ve assessed your risks. You’ve aligned with stringent compliance standards such as STIG, CIS or CMMC. Your systems are continually updated with security measures. And, you have ...]]></description>
		
		
		
			</item>
		<item>
		<title>NIST and CUI: Aligning with Government Software Supply Chain Mandates</title>
		<link>https://www.steelcloud.com/government-software-supply-chain-mandates/</link>
		
		<dc:creator><![CDATA[Stephanie Plona]]></dc:creator>
		<pubDate>Tue, 13 Feb 2024 15:16:47 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Automation]]></category>
		<category><![CDATA[CMMC]]></category>
		<category><![CDATA[Compliance]]></category>
		<category><![CDATA[CUI]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[government]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[nist 800-171]]></category>
		<category><![CDATA[software supply chain]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=89037</guid>

					<description><![CDATA[NIST and CUI: Aligning with Government Software Supply Chain Mandates What are the Mandates in the Government Software Supply Chain? If you want to be or stay part of the federal software supply chain, the rules of engagement have changed drastically over the past few years. Executive Order 14028 lists multiple requirements for developers of ...]]></description>
		
		
		
			</item>
		<item>
		<title>VIDEO: CORA Inspections: What You Should Know</title>
		<link>https://www.steelcloud.com/video-ccri-inspections/</link>
		
		<dc:creator><![CDATA[Stephanie Plona]]></dc:creator>
		<pubDate>Fri, 30 Jun 2023 18:10:40 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Videos]]></category>
		<category><![CDATA[Automation]]></category>
		<category><![CDATA[CCRI]]></category>
		<category><![CDATA[Command Cyber Readiness Inspection]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[CORA]]></category>
		<category><![CDATA[CUI]]></category>
		<category><![CDATA[disa]]></category>
		<category><![CDATA[federal government]]></category>
		<category><![CDATA[secure]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=88532</guid>

					<description><![CDATA[Watch Now: CORA Inspections: What You Should Know The goal of the DISA CORA (formerly known as CCRI) program is to protect sensitive Department of Defense data and networks from cyberattack. Inspections are often scheduled with just a month or two notice—not nearly enough time to scramble and shore up neglected cyber and physical assets, ...]]></description>
		
		
		
		<media:content url="https://www.youtube.com/embed/GrE_pPMLuRY" medium="video" width="1280" height="720">
			<media:player url="https://www.youtube.com/embed/GrE_pPMLuRY" />
			<media:title type="plain">Securing the Software Supply Chain</media:title>
			<media:description type="html"><![CDATA[Gartner predicts that, by 2025, 45% of organizations worldwide will have experienced attacks on their software supply chains. That is a three-fold increase s...]]></media:description>
			<media:thumbnail url="https://www.steelcloud.com/wp-content/uploads/securing-the-software-supply-cha.jpg" />
			<media:rating scheme="urn:simple">nonadult</media:rating>
		</media:content>
	</item>
		<item>
		<title>Securing the Software Supply Chain 101</title>
		<link>https://www.steelcloud.com/securing-the-software-supply-chain-101/</link>
		
		<dc:creator><![CDATA[Stephanie Plona]]></dc:creator>
		<pubDate>Tue, 27 Jun 2023 15:24:05 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Automation]]></category>
		<category><![CDATA[CMMC 2.0]]></category>
		<category><![CDATA[CUI]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[EO]]></category>
		<category><![CDATA[mission-critical software]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[SBOM]]></category>
		<category><![CDATA[secure]]></category>
		<category><![CDATA[software supply chain]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=88520</guid>

					<description><![CDATA[Securing the Software Supply Chain 101 Class is now in session. CUI. SBOM. NIST. Executive orders. Critical software. Mix them all together and you’ve got a more secure supply chain. But it’s all just a mishmash of words until you know what they mean. A supply chain attack happens when someone infiltrates your system through ...]]></description>
		
		
		
			</item>
		<item>
		<title>VIDEO: Securing the Software Supply Chain</title>
		<link>https://www.steelcloud.com/video-securing-the-software-supply-chain/</link>
		
		<dc:creator><![CDATA[Stephanie Plona]]></dc:creator>
		<pubDate>Mon, 19 Jun 2023 15:51:00 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Videos]]></category>
		<category><![CDATA[CMMC 2.0]]></category>
		<category><![CDATA[CUI]]></category>
		<category><![CDATA[federal government]]></category>
		<category><![CDATA[secure]]></category>
		<category><![CDATA[software supply chain]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=88500</guid>

					<description><![CDATA[Watch Now: Securing the Software Supply Chain Gartner predicts that, by 2025, 45% of organizations worldwide will have experienced attacks on their software supply chains. That is a three-fold increase since 2021. Meanwhile, the government is issuing mandates attached to CMMC certification within their own supply chain to protect controlled unclassified information (CUI). Things are ...]]></description>
		
		
		
		<media:content url="https://www.youtube.com/embed/GrE_pPMLuRY" medium="video" width="1280" height="720">
			<media:player url="https://www.youtube.com/embed/GrE_pPMLuRY" />
			<media:title type="plain">Securing the Software Supply Chain</media:title>
			<media:description type="html"><![CDATA[Gartner predicts that, by 2025, 45% of organizations worldwide will have experienced attacks on their software supply chains. That is a three-fold increase s...]]></media:description>
			<media:thumbnail url="https://www.steelcloud.com/wp-content/uploads/securing-the-software-supply-cha.jpg" />
			<media:rating scheme="urn:simple">nonadult</media:rating>
		</media:content>
	</item>
		<item>
		<title>CBOM: Bridging the Gap Between Authorization and Operations</title>
		<link>https://www.steelcloud.com/cbom-bridging-the-gap-between-authorization-and-operations/</link>
		
		<dc:creator><![CDATA[Stephanie Plona]]></dc:creator>
		<pubDate>Wed, 24 May 2023 15:22:47 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[ATO]]></category>
		<category><![CDATA[cATO]]></category>
		<category><![CDATA[CBOM]]></category>
		<category><![CDATA[CMMC]]></category>
		<category><![CDATA[Compliance]]></category>
		<category><![CDATA[Compliance Bill of Materials]]></category>
		<category><![CDATA[CUI]]></category>
		<category><![CDATA[EO]]></category>
		<category><![CDATA[Executive Order]]></category>
		<category><![CDATA[nist 800-53]]></category>
		<category><![CDATA[RMF]]></category>
		<category><![CDATA[SBOM]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[software bill of materials]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=88463</guid>

					<description><![CDATA[CBOM: Bridging the Gap Between Authorization and Operations Everyone in the cybersecurity field knows what a software bill of materials (SBOM) is. Mandated by the President’s Executive Order on Improving Our Nation’s Security the SBOM is intended to enhance supply chain security. Like the ingredients list on a bag of processed snacks, the SBOM is ...]]></description>
		
		
		
			</item>
	</channel>
</rss>
