<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:media="http://search.yahoo.com/mrss/" >

<channel>
	<title>Dashview &#8211; SteelCloud</title>
	<atom:link href="https://www.steelcloud.com/tag/dashview/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.steelcloud.com</link>
	<description></description>
	<lastBuildDate>Wed, 25 Mar 2026 18:50:08 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.steelcloud.com/wp-content/uploads/favicon.png</url>
	<title>Dashview &#8211; SteelCloud</title>
	<link>https://www.steelcloud.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Stay CORA-Ready with Automated Cybersecurity Compliance</title>
		<link>https://www.steelcloud.com/stay-cora-ready-with-automated-cybersecurity-compliance/</link>
		
		<dc:creator><![CDATA[Stephanie Plona]]></dc:creator>
		<pubDate>Tue, 24 Mar 2026 15:17:37 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[baseline hardening]]></category>
		<category><![CDATA[CORA]]></category>
		<category><![CDATA[cyber operational readiness assessment; CCRI]]></category>
		<category><![CDATA[Dashview]]></category>
		<category><![CDATA[reporting]]></category>
		<category><![CDATA[Splunk]]></category>
		<category><![CDATA[STIG automation]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=89865</guid>

					<description><![CDATA[Stay CORA-Ready with Automated Cybersecurity Compliance   Automated Remediation and Reporting: The Unsung Heroes of CORA Readiness While there may still be some question marks in the air about DISA’s Cyber Operational Readiness Assessment (CORA), one thing has become clear—automation can make the journey so much easier. For organizations transitioning from the Command Cyber Readiness ...]]></description>
		
		
		
			</item>
		<item>
		<title>What If Every Compliance Metric Lived on One Dashboard?</title>
		<link>https://www.steelcloud.com/what-if-every-compliance-metric-lived-on-one-dashboard/</link>
		
		<dc:creator><![CDATA[Stephanie Plona]]></dc:creator>
		<pubDate>Tue, 09 Dec 2025 17:59:45 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Automation]]></category>
		<category><![CDATA[Compliance]]></category>
		<category><![CDATA[ConfigOS MPO]]></category>
		<category><![CDATA[Dashview]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=91293</guid>

					<description><![CDATA[What If Every Compliance Metric Lived on One Dashboard? Imagine real-time visibility across every endpoint, every policy, every risk &#8211; all in one place. Written by: Joe Montgomery In today&#8217;s enterprise environments, compliance data is everywhere. Scattered across operating systems, policy frameworks, and geographic locations. Security teams spend hours, and sometimes days, piecing together spreadsheets, ...]]></description>
		
		
		
			</item>
		<item>
		<title>Outpacing the Threat: Staying Mission Aligned</title>
		<link>https://www.steelcloud.com/the-urgency-of-action-staying-mission-aligned/</link>
		
		<dc:creator><![CDATA[Stephanie Plona]]></dc:creator>
		<pubDate>Mon, 03 Jun 2024 14:17:34 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Action]]></category>
		<category><![CDATA[Automation]]></category>
		<category><![CDATA[Compliance]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[Continuous Compliance]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[cyberworkforce]]></category>
		<category><![CDATA[Dashview]]></category>
		<category><![CDATA[disa]]></category>
		<category><![CDATA[DoD]]></category>
		<category><![CDATA[drift]]></category>
		<category><![CDATA[Executive Order]]></category>
		<category><![CDATA[Mission]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[secure]]></category>
		<category><![CDATA[SIEM]]></category>
		<category><![CDATA[STIG]]></category>
		<category><![CDATA[systems]]></category>
		<category><![CDATA[Urgency]]></category>
		<category><![CDATA[Zero Trust]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=88213</guid>

					<description><![CDATA[Outpacing the Threat: Staying Mission Aligned Continuous STIG Compliance Keeps Systems Mission Aligned One of today’s most sure-fire—and challenging—ways to protect our nation’s sensitive data is STIG compliance. Security Technical Implementation Guides (STIGs) identify areas of critical technology that are vulnerable to attack so they can be hardened. In a time of increasingly sophisticated ransomware ...]]></description>
		
		
		
			</item>
		<item>
		<title>Make checklist work more agile with eMASS automation</title>
		<link>https://www.steelcloud.com/make-checklist-work-more-agile-with-emass-automation/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Sat, 20 May 2023 14:14:29 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[dahsview splunk]]></category>
		<category><![CDATA[Dashview]]></category>
		<category><![CDATA[emass automation]]></category>
		<category><![CDATA[emass files]]></category>
		<category><![CDATA[endpoint security]]></category>
		<category><![CDATA[Federal Contractor]]></category>
		<category><![CDATA[FedRAMP]]></category>
		<category><![CDATA[information assurance]]></category>
		<category><![CDATA[integrating ckl]]></category>
		<category><![CDATA[IT infrastructure]]></category>
		<category><![CDATA[rmf accreditation]]></category>
		<category><![CDATA[splunk integration]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[stig viewer checklist]]></category>
		<category><![CDATA[system hardening]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=86603</guid>

					<description><![CDATA[Accelerating your RMF accreditation means getting more agile with eMASS automation. If you have ever tried loading STIG Viewer Checklist data into eMASS, you know one thing— it is a burdensome process! Yet the comprehensive view of your manual and machine configuration management and cybersecurity checklist are valuable, especially for accelerating your RMF accreditation. eMASS, ...]]></description>
		
		
		
			</item>
		<item>
		<title>Inflation: The Unseen Threat to the Cyberworkforce.</title>
		<link>https://www.steelcloud.com/inflation-the-unseen-threat-to-the-cyberworkforce/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Mon, 09 Jan 2023 16:10:43 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Dashview]]></category>
		<category><![CDATA[emass automation]]></category>
		<category><![CDATA[emass files]]></category>
		<category><![CDATA[endpoint security]]></category>
		<category><![CDATA[Federal Contractor]]></category>
		<category><![CDATA[FedRAMP]]></category>
		<category><![CDATA[information assurance]]></category>
		<category><![CDATA[integrating ckl]]></category>
		<category><![CDATA[rmf accreditation]]></category>
		<category><![CDATA[splunk integration]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[stig viewer checklist]]></category>
		<category><![CDATA[system hardening]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=87852</guid>

					<description><![CDATA[Inflation is eroding budgets and employee compensation in the cyberworkforce. When it comes to the culprits of inflation, there are many places to point blame. Pandemic-induced supply chain shortages, followed by the Russian invasion of Ukraine and disrupted supplies of commodities from the region, certainly top the list.    Gartner asked C-suite executives what they were focusing on in ...]]></description>
		
		
		
			</item>
		<item>
		<title>MITRE ATT&#038;CK and Automated Endpoint Remediation</title>
		<link>https://www.steelcloud.com/mitre-attck-and-endpoint-remediation/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Fri, 03 Sep 2021 19:17:57 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[CIS]]></category>
		<category><![CDATA[cis controls]]></category>
		<category><![CDATA[compliance mandates]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[configuration drift]]></category>
		<category><![CDATA[Dashview]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[DevOps]]></category>
		<category><![CDATA[DFARS]]></category>
		<category><![CDATA[DoD]]></category>
		<category><![CDATA[Federal Contractor]]></category>
		<category><![CDATA[FedRAMP]]></category>
		<category><![CDATA[IT infrastructure]]></category>
		<category><![CDATA[linux]]></category>
		<category><![CDATA[mitre att&ck]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[stig policy]]></category>
		<category><![CDATA[system hardening]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=82332</guid>

					<description><![CDATA[MITRE ATT&#38;CK &#8211; Is it breaking and entering even if the door is unlocked? MITRE developed ATT&#38;CK as a model to document and track various techniques attackers use throughout the different stages of a cyberattack to infiltrate your network and exfiltrate data. ATT&#38;CK stands for Adversarial Tactics, Techniques, and Common Knowledge. MITRE ATT&#38;CK® is a comprehensive ...]]></description>
		
		
		
			</item>
	</channel>
</rss>
