<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:media="http://search.yahoo.com/mrss/" >

<channel>
	<title>cybersecurity &#8211; SteelCloud</title>
	<atom:link href="https://www.steelcloud.com/tag/cybersecurity/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.steelcloud.com</link>
	<description></description>
	<lastBuildDate>Mon, 30 Mar 2026 19:11:15 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.steelcloud.com/wp-content/uploads/favicon.png</url>
	<title>cybersecurity &#8211; SteelCloud</title>
	<link>https://www.steelcloud.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Continuous Monitoring: What It Is, Why It Matters and How To Get It Right</title>
		<link>https://www.steelcloud.com/continuous-monitoring-cybersecurity-compliance/</link>
		
		<dc:creator><![CDATA[Brightlark]]></dc:creator>
		<pubDate>Mon, 23 Feb 2026 18:05:22 +0000</pubDate>
				<category><![CDATA[Articles]]></category>
		<category><![CDATA[Continuous Monitoring]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[STIG]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=91453</guid>

					<description><![CDATA[Continuous Monitoring: What It Is, Why It Matters and How To Get It Right In today’s rapidly evolving—and increasingly aggressive—threat landscape, cybersecurity can no longer be treated as a periodic activity. Yearly assessments, quarterly scans, and point-in-time audits can’t keep pace with the speed at which systems change or attackers adapt. That’s why continuous monitoring ...]]></description>
		
		
		
			</item>
		<item>
		<title>7 Reasons to Automate Your CMMC 2+ Compliance</title>
		<link>https://www.steelcloud.com/7-reasons-to-automate-your-cmmc-compliance/</link>
		
		<dc:creator><![CDATA[Stephanie Plona]]></dc:creator>
		<pubDate>Wed, 26 Nov 2025 20:30:29 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Collaterals]]></category>
		<category><![CDATA[Automation]]></category>
		<category><![CDATA[CMMC]]></category>
		<category><![CDATA[Compliance]]></category>
		<category><![CDATA[compliance automation]]></category>
		<category><![CDATA[CUI]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[DIB]]></category>
		<category><![CDATA[DoD]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=88857</guid>

					<description><![CDATA[7 Reasons to Automate Your CMMC 2+ Compliance Curious about the transformative power of compliance automation? Here are seven compelling benefits that streamline your journey towards meeting CMMC 2+ compliance and beyond. Let&#8217;s dive into the advantages that could reshape your approach to cybersecurity. Download the free data sheet now! ]]></description>
		
		
		
			</item>
		<item>
		<title>eBook: Mental Health in Cybersecurity</title>
		<link>https://www.steelcloud.com/ebook-mental-health-in-cybersecurity/</link>
		
		<dc:creator><![CDATA[Stephanie Plona]]></dc:creator>
		<pubDate>Tue, 13 May 2025 14:14:24 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[eBooks]]></category>
		<category><![CDATA[Automated STIG Compliance]]></category>
		<category><![CDATA[CIS Benchmarks]]></category>
		<category><![CDATA[cyber ready workforce]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[cybersecurity workforce]]></category>
		<category><![CDATA[DIB]]></category>
		<category><![CDATA[Mental Health]]></category>
		<category><![CDATA[STIG automation]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=88527</guid>

					<description><![CDATA[Mental Health in Cybersecurity eBook The industry faces its toughest adversary yet. It’s a topic we traditionally don’t discuss in professional environments. There is stigma attached. And, if we don’t know how to handle mental health issues, it can be a very intimidating topic to broach. But you must. Your security depends on it. It’s ...]]></description>
		
		
		
			</item>
		<item>
		<title>VIDEO: How to Overcome Budget and Staff Cuts with Automation</title>
		<link>https://www.steelcloud.com/video-how-to-overcome-budget-and-staff-cuts-with-automation/</link>
		
		<dc:creator><![CDATA[Stephanie Plona]]></dc:creator>
		<pubDate>Mon, 31 Mar 2025 15:43:57 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Videos]]></category>
		<category><![CDATA[ATO]]></category>
		<category><![CDATA[Automation]]></category>
		<category><![CDATA[budget]]></category>
		<category><![CDATA[Compliance]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[DoD]]></category>
		<category><![CDATA[RMF]]></category>
		<category><![CDATA[STIG]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=90218</guid>

					<description><![CDATA[Automation Enables Cybersecurity Compliance Amid Budget and Staff Uncertainty In times of uncertainty, automation solutions can help organizations reduce attack surfaces, improve processes, and do more with less to maximize efficiency. Shrinking budgets, shrinking staff, and a need to get capabilities into the hands of the warfighter faster—everything points to automation. With hiring freezes and ...]]></description>
		
		
		
		<media:content url="https://www.youtube.com/embed/nn8WlzidqAQ" medium="video" width="1280" height="720">
			<media:player url="https://www.youtube.com/embed/nn8WlzidqAQ" />
			<media:title type="plain">How to Overcome Budget and Staff Cuts with Automation</media:title>
			<media:description type="html"><![CDATA[In times of uncertainty, automation solutions can help organizations reduce attack surfaces, improve processes, and do more with less to maximize efficiency....]]></media:description>
			<media:thumbnail url="https://www.steelcloud.com/wp-content/uploads/how-to-overcome-budget-and-staff.jpg" />
			<media:rating scheme="urn:simple">nonadult</media:rating>
		</media:content>
	</item>
		<item>
		<title>Meet Jamie Coffey: Chief Marketing Officer</title>
		<link>https://www.steelcloud.com/meet-jamie-coffey-steelcloud-chief-marketing-officer/</link>
		
		<dc:creator><![CDATA[Stephanie Plona]]></dc:creator>
		<pubDate>Tue, 25 Mar 2025 15:37:56 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[employee]]></category>
		<category><![CDATA[Faces of SteelCloud]]></category>
		<category><![CDATA[marketing]]></category>
		<category><![CDATA[STIG]]></category>
		<category><![CDATA[STIG Wars]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=90211</guid>

					<description><![CDATA[Behind the SteelCloud Brand with Jamie Coffey Jamie Coffey is an accomplished marketing executive with 20+ years of proven success. In the time she has been the Chief Marketing Officer at SteelCloud, revenue has quintupled and continues to grow. Which should give you an idea of the kind of professional she is—passionate, strategic, determined and, ...]]></description>
		
		
		
			</item>
		<item>
		<title>Automation Reaches a Tipping Point with Hegseth Memo</title>
		<link>https://www.steelcloud.com/automation-reaches-a-tipping-point-with-hegseth-memo/</link>
		
		<dc:creator><![CDATA[Stephanie Plona]]></dc:creator>
		<pubDate>Wed, 12 Mar 2025 16:02:22 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[ATO]]></category>
		<category><![CDATA[Automation]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[DoD]]></category>
		<category><![CDATA[news]]></category>
		<category><![CDATA[RMF]]></category>
		<category><![CDATA[software]]></category>
		<category><![CDATA[STIG]]></category>
		<category><![CDATA[warfighter]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=90189</guid>

					<description><![CDATA[DoD Accelerates Software Acquisition: Automation Takes Center Stage Last Friday, Secretary Pete Hegseth made a move in the right direction to secure a more efficient and effective path for getting weapons and capabilities to the warfighter sooner. He issued a memo to senior leaders directing the DoD to embrace a rapid software acquisition pathway (SWP) ...]]></description>
		
		
		
			</item>
		<item>
		<title>Faces of SteelCloud: Meet Nicolas Barham – Client Executive</title>
		<link>https://www.steelcloud.com/faces-of-steelcloud-meet-nicolas-barham-client-executive/</link>
		
		<dc:creator><![CDATA[Stephanie Plona]]></dc:creator>
		<pubDate>Tue, 04 Feb 2025 15:31:39 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[air force]]></category>
		<category><![CDATA[Automation]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[DoD]]></category>
		<category><![CDATA[Faces of SteelCloud]]></category>
		<category><![CDATA[Systems Integrators]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=90109</guid>

					<description><![CDATA[Fretting Over Cybersecurity, Not the Blues: The Nicolas Barham Story   By day, Nicolas Barham is a SteelCloud Client Executive, serving mainly System Integrators and Air Force clients. By night he’s a soccer playing blues guitarist with a penchant for philosophy. If any of that sounds incompatible, it’s only because you haven’t met Nicolas Barham ...]]></description>
		
		
		
			</item>
		<item>
		<title>Happy Data Protection Day!</title>
		<link>https://www.steelcloud.com/happy-data-protection-day/</link>
		
		<dc:creator><![CDATA[Stephanie Plona]]></dc:creator>
		<pubDate>Tue, 28 Jan 2025 18:11:13 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Collaterals]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data privacy]]></category>
		<category><![CDATA[data security]]></category>
		<category><![CDATA[internet of things]]></category>
		<category><![CDATA[IoT]]></category>
		<category><![CDATA[password protection]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=90105</guid>

					<description><![CDATA[Data Protection Infographic: 5 Ways You Can Protect Your Data Data privacy and data security are completely different things, but the two are inextricably intertwined. Both are integral to protecting and securing your computers, devices and data from bad actors. Here are SteelCloud’s recommendations for small changes you can make on Data Privacy Day—and every ...]]></description>
		
		
		
			</item>
		<item>
		<title>VIDEO: CORA Updates</title>
		<link>https://www.steelcloud.com/video-cora-updates/</link>
		
		<dc:creator><![CDATA[Stephanie Plona]]></dc:creator>
		<pubDate>Thu, 16 Jan 2025 20:45:08 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Videos]]></category>
		<category><![CDATA[Automation]]></category>
		<category><![CDATA[CCRI]]></category>
		<category><![CDATA[CORA]]></category>
		<category><![CDATA[Cyber Readiness]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Secure Configurations]]></category>
		<category><![CDATA[STIG automation]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=90056</guid>

					<description><![CDATA[VIDEO: CORA Updates &#8211; It&#8217;s More Than a Name Change! Established in 2010 by DISA, the Command Cyber Readiness Inspection (CCRI) was known to cause sweat to break out on the brows of cybersecurity professionals throughout the DoD. This rigid assessment was a DoD-led formal inspection to assure accountability and the security posture of DoD ...]]></description>
		
		
		
		<media:content url="https://www.youtube.com/embed/_gAUEYXiRr0" medium="video" width="1280" height="720">
			<media:player url="https://www.youtube.com/embed/_gAUEYXiRr0" />
			<media:title type="plain">CORA - It&#039;s More Than a Name Change!</media:title>
			<media:description type="html"><![CDATA[Established in 2010 by DISA, the Command Cyber Readiness Inspection (CCRI) was known to cause sweat to break out on the brows of cybersecurity professionals ...]]></media:description>
			<media:thumbnail url="https://www.steelcloud.com/wp-content/uploads/cora-its-more-than-a-name-change.jpg" />
			<media:rating scheme="urn:simple">nonadult</media:rating>
		</media:content>
	</item>
		<item>
		<title>Top Cybersecurity Threats of 2025</title>
		<link>https://www.steelcloud.com/top-cybersecurity-threats-of-2025/</link>
		
		<dc:creator><![CDATA[Stephanie Plona]]></dc:creator>
		<pubDate>Tue, 14 Jan 2025 16:51:00 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[CIS Benchmarks]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[STIG]]></category>
		<category><![CDATA[supply chain]]></category>
		<category><![CDATA[threat mitigation]]></category>
		<category><![CDATA[threats]]></category>
		<category><![CDATA[Zero Trust]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=90050</guid>

					<description><![CDATA[4 Cybersecurity Threats to Have on Your Radar In 2025 If there’s one thing to know as we enter 2025, it’s that the bad guys are getting better and stronger. The statistics are daunting. In 2024, the costs of cybercrime were projected to be $9.5 trillion. From ransomware threats to phishing, the pace, number and ...]]></description>
		
		
		
			</item>
	</channel>
</rss>
