<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:media="http://search.yahoo.com/mrss/" >

<channel>
	<title>Defensive line &#8211; SteelCloud</title>
	<atom:link href="https://www.steelcloud.com/tag/defensive-line/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.steelcloud.com</link>
	<description></description>
	<lastBuildDate>Mon, 25 Aug 2025 19:40:13 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.steelcloud.com/wp-content/uploads/favicon.png</url>
	<title>Defensive line &#8211; SteelCloud</title>
	<link>https://www.steelcloud.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Mission-Critical Infrastructure Combined with DevSecOps</title>
		<link>https://www.steelcloud.com/securing-mission-critical-infrastructure-with-devsecops/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Tue, 15 Mar 2022 17:55:34 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[compliance mandates]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[Defensive line]]></category>
		<category><![CDATA[DFARS]]></category>
		<category><![CDATA[DoD]]></category>
		<category><![CDATA[Federal Contractor]]></category>
		<category><![CDATA[FedRAMP]]></category>
		<category><![CDATA[IT infrastructure]]></category>
		<category><![CDATA[IT modernization]]></category>
		<category><![CDATA[lot vulnerabilities]]></category>
		<category><![CDATA[Security Technical Implementation Guide]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[stig policy]]></category>
		<category><![CDATA[system hardening]]></category>
		<category><![CDATA[Zero Trust]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=83097</guid>

					<description><![CDATA[Securing a mission-critical infrastructure means improving DevSecOps process to focus on vulnerabilities. As Gartner recently observed, “Concerns are growing for the security of cyber-physical systems (CPS) in mission-critical infrastructure, whether “brownfield” CPS from OT/IT convergence or “greenfield” CPS from digital efforts.” With cyberattacks increasing 3,900% between 2013 and 2020, organizations need all the help they ...]]></description>
		
		
		
			</item>
		<item>
		<title>Zero Trust: How to Adapt Accordingly</title>
		<link>https://www.steelcloud.com/zero-trust-how-to-adapt-accordingly/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Tue, 15 Feb 2022 18:03:08 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[cisa]]></category>
		<category><![CDATA[compliance mandates]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[configuration drift]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[Defensive line]]></category>
		<category><![CDATA[DFARS]]></category>
		<category><![CDATA[DoD]]></category>
		<category><![CDATA[Federal Contractor]]></category>
		<category><![CDATA[FedRAMP]]></category>
		<category><![CDATA[IT infrastructure]]></category>
		<category><![CDATA[lot vulnerabilities]]></category>
		<category><![CDATA[mitre att&ck]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[ransomware attacks]]></category>
		<category><![CDATA[Security Technical Implementation Guide]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[stig policy]]></category>
		<category><![CDATA[system hardening]]></category>
		<category><![CDATA[Zero Trust]]></category>
		<category><![CDATA[Zero Trust: How to adapt accordingly]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=83009</guid>

					<description><![CDATA[Zero Trust: How to adapt accordingly with secure and compliant baselines using automation January’s OMB Memorandum detailing the White House Executive Order on Zero Trust has government and defense industrial base (DIB) organizations talking. In last week’s Tech Talk Tuesday, we shared some basics of Zero Trust, including a refresher on network access control (NAC) ...]]></description>
		
		
		
			</item>
		<item>
		<title>Zero Trust, NAC and a New Era of Cybersecurity</title>
		<link>https://www.steelcloud.com/zero-trust-nac-and-a-new-era-of-cybersecurity/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Mon, 07 Feb 2022 16:56:18 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[cisa]]></category>
		<category><![CDATA[compliance mandates]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[configuration drift]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[Defensive line]]></category>
		<category><![CDATA[DFARS]]></category>
		<category><![CDATA[DoD]]></category>
		<category><![CDATA[Federal Contractor]]></category>
		<category><![CDATA[FedRAMP]]></category>
		<category><![CDATA[IT infrastructure]]></category>
		<category><![CDATA[lot vulnerabilities]]></category>
		<category><![CDATA[mitre att&ck]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[ransomware attacks]]></category>
		<category><![CDATA[Security Technical Implementation Guide]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[stig policy]]></category>
		<category><![CDATA[system hardening]]></category>
		<category><![CDATA[Zero Trust]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=82984</guid>

					<description><![CDATA[The game is well underway when talking about Zero Trust, NAC and ushering in the new era of cybersecurity In January, the US Office of Management and Budget (OMB) presented its Federal Zero Trust Memorandum on Improving the Cybersecurity of National Security, Department of Defense, and Intelligence Community Systems. It focuses primarily on a Zero ...]]></description>
		
		
		
			</item>
		<item>
		<title>Moving Forward with Zero Trust and the Cybersecurity Executive Order</title>
		<link>https://www.steelcloud.com/moving-forward-with-zero-trust-and-the-cybersecurity-executive-order/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Tue, 30 Nov 2021 13:06:40 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[cisa]]></category>
		<category><![CDATA[compliance mandates]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[configuration drift]]></category>
		<category><![CDATA[cybersecurity executive order]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[Defensive line]]></category>
		<category><![CDATA[DFARS]]></category>
		<category><![CDATA[DoD]]></category>
		<category><![CDATA[Federal Contractor]]></category>
		<category><![CDATA[FedRAMP]]></category>
		<category><![CDATA[IT infrastructure]]></category>
		<category><![CDATA[lot vulnerabilities]]></category>
		<category><![CDATA[mitre att&ck]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[ransomware attacks]]></category>
		<category><![CDATA[Security Technical Implementation Guide]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[stig policy]]></category>
		<category><![CDATA[system hardening]]></category>
		<category><![CDATA[Zero Trust]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=82748</guid>

					<description><![CDATA[Cybersecurity Executive Order  It has been a little over six months since the White House released their Cybersecurity Executive Order (EO) mandating, among other things, a move toward both the cloud and Zero Trust architectures for government agencies. So, where do we stand? In December, the Pentagon is expected to launch its Zero Trust office ...]]></description>
		
		
		
			</item>
		<item>
		<title>Zero Trust Architecture – A Holistic Approach to Network Security</title>
		<link>https://www.steelcloud.com/zero-trust-architecture-a-holistic-approach-to-network-security/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Sat, 16 Oct 2021 15:44:13 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[cisa]]></category>
		<category><![CDATA[compliance mandates]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[configuration drift]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[Defensive line]]></category>
		<category><![CDATA[DFARS]]></category>
		<category><![CDATA[DoD]]></category>
		<category><![CDATA[Federal Contractor]]></category>
		<category><![CDATA[FedRAMP]]></category>
		<category><![CDATA[IT infrastructure]]></category>
		<category><![CDATA[lot vulnerabilities]]></category>
		<category><![CDATA[mitre att&ck]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[ransomware attacks]]></category>
		<category><![CDATA[Security Technical Implementation Guide]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[stig policy]]></category>
		<category><![CDATA[system hardening]]></category>
		<category><![CDATA[Zero Trust]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=82552</guid>

					<description><![CDATA[Zero Trust &#8211; the best security outcome for enterprises and government agencies of all sizes. October marks National Cybersecurity Month. But let&#8217;s be clear. Cybersecurity is a 24/7/365 thing. And NIST 800-53, as well as the White House&#8217;s cybersecurity executive order (EO), demand that Zero Trust Architecture (ZTA) should form the foundation of secure systems moving forward, whether in ...]]></description>
		
		
		
			</item>
		<item>
		<title>Zero Trust + STIGs &#8211; Your Dream Team for Winning the Cybersecurity Game</title>
		<link>https://www.steelcloud.com/zero-trust-stigs-your-dream-team-for-winning-the-cybersecurity-game/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Tue, 21 Sep 2021 15:59:48 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[cisa]]></category>
		<category><![CDATA[compliance mandates]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[configuration drift]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[Defensive line]]></category>
		<category><![CDATA[DFARS]]></category>
		<category><![CDATA[DoD]]></category>
		<category><![CDATA[Federal Contractor]]></category>
		<category><![CDATA[FedRAMP]]></category>
		<category><![CDATA[IT infrastructure]]></category>
		<category><![CDATA[lot vulnerabilities]]></category>
		<category><![CDATA[mitre att&ck]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[ransomware attacks]]></category>
		<category><![CDATA[Security Technical Implementation Guide]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[stig policy]]></category>
		<category><![CDATA[system hardening]]></category>
		<category><![CDATA[Zero Trust]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=82475</guid>

					<description><![CDATA[As we reach the end of the government’s 4th quarter, hackers have got the ball, and they are heading down the field toward your data. Whom the defense decides to play and whom they choose to sideline while defending the field is critical to determining who ultimately seizes the advantage. Only the most trusted players ...]]></description>
		
		
		
			</item>
	</channel>
</rss>
