<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:media="http://search.yahoo.com/mrss/" >

<channel>
	<title>cybersecurity executive order &#8211; SteelCloud</title>
	<atom:link href="https://www.steelcloud.com/tag/cybersecurity-executive-order/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.steelcloud.com</link>
	<description></description>
	<lastBuildDate>Mon, 25 Aug 2025 19:39:55 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.steelcloud.com/wp-content/uploads/favicon.png</url>
	<title>cybersecurity executive order &#8211; SteelCloud</title>
	<link>https://www.steelcloud.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>VIDEO: What is a CBOM?</title>
		<link>https://www.steelcloud.com/video-what-is-a-cbom/</link>
		
		<dc:creator><![CDATA[Stephanie Plona]]></dc:creator>
		<pubDate>Wed, 14 Jun 2023 16:04:19 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Videos]]></category>
		<category><![CDATA[ATO]]></category>
		<category><![CDATA[CBOM]]></category>
		<category><![CDATA[Compliance Bill of Materials]]></category>
		<category><![CDATA[cybersecurity executive order]]></category>
		<category><![CDATA[RMF]]></category>
		<category><![CDATA[SBOM]]></category>
		<category><![CDATA[software bill of materials]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=88489</guid>

					<description><![CDATA[Video: What is a CBOM? In today’s complex digital technology landscape there is an ever-evolving threat that requires securing and protecting critical infrastructure, information, and assets. Several initiatives are under way throughout the Government to support the presidential Executive Order on Improving the Nation’s Cybersecurity which includes implementing a zero-trust framework and providing greater visibility ...]]></description>
		
		
		
		<media:content url="https://www.youtube.com/embed/a6-7qtgP-RQ" medium="video" width="1280" height="720">
			<media:player url="https://www.youtube.com/embed/a6-7qtgP-RQ" />
			<media:title type="plain">What is a CBOM?</media:title>
			<media:description type="html"><![CDATA[In today’s complex digital technology landscape there is an ever-evolving threat that requires securing and protecting critical infrastructure, information, ...]]></media:description>
			<media:thumbnail url="https://www.steelcloud.com/wp-content/uploads/what-is-a-cbom.jpg" />
			<media:rating scheme="urn:simple">nonadult</media:rating>
		</media:content>
	</item>
		<item>
		<title>Moving Forward with Zero Trust and the Cybersecurity Executive Order</title>
		<link>https://www.steelcloud.com/moving-forward-with-zero-trust-and-the-cybersecurity-executive-order/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Tue, 30 Nov 2021 13:06:40 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[cisa]]></category>
		<category><![CDATA[compliance mandates]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[configuration drift]]></category>
		<category><![CDATA[cybersecurity executive order]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[Defensive line]]></category>
		<category><![CDATA[DFARS]]></category>
		<category><![CDATA[DoD]]></category>
		<category><![CDATA[Federal Contractor]]></category>
		<category><![CDATA[FedRAMP]]></category>
		<category><![CDATA[IT infrastructure]]></category>
		<category><![CDATA[lot vulnerabilities]]></category>
		<category><![CDATA[mitre att&ck]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[ransomware attacks]]></category>
		<category><![CDATA[Security Technical Implementation Guide]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[stig policy]]></category>
		<category><![CDATA[system hardening]]></category>
		<category><![CDATA[Zero Trust]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=82748</guid>

					<description><![CDATA[Cybersecurity Executive Order  It has been a little over six months since the White House released their Cybersecurity Executive Order (EO) mandating, among other things, a move toward both the cloud and Zero Trust architectures for government agencies. So, where do we stand? In December, the Pentagon is expected to launch its Zero Trust office ...]]></description>
		
		
		
			</item>
	</channel>
</rss>
