<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:media="http://search.yahoo.com/mrss/" >

<channel>
	<title>Digital transformation &#8211; SteelCloud</title>
	<atom:link href="https://www.steelcloud.com/tag/digital-transformation/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.steelcloud.com</link>
	<description></description>
	<lastBuildDate>Mon, 25 Aug 2025 19:50:25 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.steelcloud.com/wp-content/uploads/favicon.png</url>
	<title>Digital transformation &#8211; SteelCloud</title>
	<link>https://www.steelcloud.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>PODCAST: ContinuousX with SteelCloud’s Brian Hajost on Automating Compliance-as-Code</title>
		<link>https://www.steelcloud.com/podcast-continuousx-automating-compliance-as-code/</link>
		
		<dc:creator><![CDATA[Stephanie Plona]]></dc:creator>
		<pubDate>Sat, 22 Apr 2023 18:45:16 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Podcasts]]></category>
		<category><![CDATA[ATO]]></category>
		<category><![CDATA[automated compliance]]></category>
		<category><![CDATA[Automation]]></category>
		<category><![CDATA[cATO]]></category>
		<category><![CDATA[CBOM]]></category>
		<category><![CDATA[Compliance]]></category>
		<category><![CDATA[Compliance Bill of Materials]]></category>
		<category><![CDATA[compliance-as-code]]></category>
		<category><![CDATA[Configuration Management]]></category>
		<category><![CDATA[ContinuousX]]></category>
		<category><![CDATA[cyber hygiene]]></category>
		<category><![CDATA[Digital transformation]]></category>
		<category><![CDATA[DoD]]></category>
		<category><![CDATA[federal government]]></category>
		<category><![CDATA[IT operations]]></category>
		<category><![CDATA[ITmodernization]]></category>
		<category><![CDATA[Podcast]]></category>
		<category><![CDATA[security podcast]]></category>
		<category><![CDATA[vulnerability management]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=88377</guid>

					<description><![CDATA[About This Podcast Episode: Automating Compliance-as-Code Learn how to automate compliance-as-code for faster continuous authorizations and streamlined ATOs in the federal government on this episode of the ContinuousX Podcast featuring Brian Hajost. Click the link or image below to listen to episode. &#160; &#160; &#160; &#160;]]></description>
		
		
		
			</item>
		<item>
		<title>PODCAST: ContinuousX with SteelCloud’s Brian Hajost on Implicit and Explicit Compliance and Control</title>
		<link>https://www.steelcloud.com/podcast-continuousx-with-steelclouds-brian-hajost-on-implicit-and-explicit-compliance-and-control/</link>
		
		<dc:creator><![CDATA[Stephanie Plona]]></dc:creator>
		<pubDate>Mon, 27 Mar 2023 01:53:58 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Podcasts]]></category>
		<category><![CDATA[ATO]]></category>
		<category><![CDATA[CBOM]]></category>
		<category><![CDATA[Compliance]]></category>
		<category><![CDATA[Compliance Bill of Materials]]></category>
		<category><![CDATA[Configuration Management]]></category>
		<category><![CDATA[ContinuousX]]></category>
		<category><![CDATA[cyber hygiene]]></category>
		<category><![CDATA[Digital transformation]]></category>
		<category><![CDATA[explicit compliance]]></category>
		<category><![CDATA[IT operations]]></category>
		<category><![CDATA[ITmodernization]]></category>
		<category><![CDATA[security podcast]]></category>
		<category><![CDATA[vulnerability management]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=88170</guid>

					<description><![CDATA[About This Episode: Implicit and Explicit Compliance and Control The ContinuousX Podcast welcomes back Brian Hajost to discuss the importance of explicit compliance in the ATO and A&#38;A processes as well as the benefits of using machine-readable CBOMs (Configuration Bill of Materials) to ensure closed-loop compliance reporting in production. Click the link or image below ...]]></description>
		
		
		
			</item>
		<item>
		<title>PODCAST: ContinuousX with SteelCloud’s Brian Hajost on CBOMs: The Foundation for ATO/RMF</title>
		<link>https://www.steelcloud.com/podcast-cboms-the-foundation-for-security/</link>
		
		<dc:creator><![CDATA[Jamie Coffey]]></dc:creator>
		<pubDate>Tue, 14 Mar 2023 12:25:46 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Podcasts]]></category>
		<category><![CDATA[CBOM]]></category>
		<category><![CDATA[Compliance Bill of Materiasl]]></category>
		<category><![CDATA[Configuration Management]]></category>
		<category><![CDATA[ContinuousX]]></category>
		<category><![CDATA[cyber hygiene]]></category>
		<category><![CDATA[Digital transformation]]></category>
		<category><![CDATA[IT operations]]></category>
		<category><![CDATA[ITmodernization]]></category>
		<category><![CDATA[security podcast]]></category>
		<category><![CDATA[The Foundation of Security]]></category>
		<category><![CDATA[vulnerability management]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=88032</guid>

					<description><![CDATA[About This Episode CBOMs: The Foundation for ATO/RMF. The ContinuousX Podcast welcomes Brian Hajost, SteelCloud’s Chief Operating Officer, to discuss the Compliance Bill of Materials (CBOM) and how automating your CBOM serves as the bedrock for threat hunting, prevention, intrusion detection and all your security needs. Click the link or image below to listen to ...]]></description>
		
		
		
			</item>
		<item>
		<title>PODCAST: CBOMs and Automating Compliance Problem Solving with Brian Hajost</title>
		<link>https://www.steelcloud.com/cboms-and-automating-compliance-problem-solving/</link>
		
		<dc:creator><![CDATA[Jamie Coffey]]></dc:creator>
		<pubDate>Tue, 14 Feb 2023 17:08:08 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Podcasts]]></category>
		<category><![CDATA[CBOM]]></category>
		<category><![CDATA[Compliance Bill of Materiasl]]></category>
		<category><![CDATA[Configuration Management]]></category>
		<category><![CDATA[cyber hygiene]]></category>
		<category><![CDATA[Digital transformation]]></category>
		<category><![CDATA[IT operations]]></category>
		<category><![CDATA[ITmodernization]]></category>
		<category><![CDATA[security podcast]]></category>
		<category><![CDATA[vulnerability management]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=87920</guid>

					<description><![CDATA[About This Episode Brian Hajost shares insights on his concept of a Compliance Bill of Materials (CBOMs). For those that have heard of Software Bill of Materials (SBOMs) it’s a similar concept. In addition to CBOMs, Brian also breaks down the challenges and opportunities in automating compliance as well as frameworks organizations can leverage to ...]]></description>
		
		
		
			</item>
		<item>
		<title>PODCAST: Automating the Secure Configuration Management Process</title>
		<link>https://www.steelcloud.com/automating-the-secure-configuration-management-process/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Tue, 19 Jul 2022 18:28:19 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Podcasts]]></category>
		<category><![CDATA[Automated STIG Compliance]]></category>
		<category><![CDATA[CIS Benchmarks]]></category>
		<category><![CDATA[Configuration Management]]></category>
		<category><![CDATA[Digital transformation]]></category>
		<category><![CDATA[FedRAMP]]></category>
		<category><![CDATA[IT operations]]></category>
		<category><![CDATA[ITmodernization]]></category>
		<category><![CDATA[security podcast]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[system level controls]]></category>
		<category><![CDATA[vulnerability management]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=83108</guid>

					<description><![CDATA[Why automating the secure configuration management process is the best kept secret in security. In episode 26 of Cybersecurity Where You Are, co-host Tony Sager is joined by Brian Hajost, Chief Operating Officer at SteelCloud. They discuss some of the common issues around secure configuration management, the struggles that organizations face, and ways to overcome those ...]]></description>
		
		
		
			</item>
		<item>
		<title>RMF Acceleration Through eMASS Automation</title>
		<link>https://www.steelcloud.com/rmf-acceleration-through-emass-automation/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Tue, 29 Mar 2022 18:19:00 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Webinars]]></category>
		<category><![CDATA[Configuration Management]]></category>
		<category><![CDATA[Digital transformation]]></category>
		<category><![CDATA[emass automation]]></category>
		<category><![CDATA[FedRAMP]]></category>
		<category><![CDATA[IT operations]]></category>
		<category><![CDATA[ITmodernization]]></category>
		<category><![CDATA[Risk Management Framework]]></category>
		<category><![CDATA[SIEM]]></category>
		<category><![CDATA[stig viewer checklist]]></category>
		<category><![CDATA[vulnerability management]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=83143</guid>

					<description><![CDATA[Enterprise Mission Assurance Support Service—eMASS—acts as a repository uniting technical/machine data generated from endpoint scans with the human/non-technical data documented by security/IA personnel. Traditionally, this &#8220;uniting&#8221; process is accomplished by completing a STIG Viewer Checklist for each policy for each endpoint, quickly generating a cumbersome number of hand-created checklist files. With these overwhelming manual processes, ...]]></description>
		
		
		
			</item>
		<item>
		<title>PODCAST: How Configuration Management Makes Security Simple</title>
		<link>https://www.steelcloud.com/podcast-how-configuration-management-makes-security-simple/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Tue, 30 Nov 2021 12:07:31 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Podcasts]]></category>
		<category><![CDATA[Configuration Management]]></category>
		<category><![CDATA[Digital transformation]]></category>
		<category><![CDATA[FedRAMP]]></category>
		<category><![CDATA[IT operations]]></category>
		<category><![CDATA[ITmodernization]]></category>
		<category><![CDATA[security podcast]]></category>
		<category><![CDATA[vulnerability management]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=82757</guid>

					<description><![CDATA[Configuration management is the best kept secret in security. In this podcast interview, Brian Hajost, President and COO of SteelCloud, discusses vulnerability management and configuration management as being fundamental foundational elements of any security program. SteelCloud develops technology software for automated remediation of endpoints to meet compliance mandates effectively. Brian states that CIS Critical Security ...]]></description>
		
		
		
			</item>
		<item>
		<title>Interview: STIG Challenges for Government Leadership</title>
		<link>https://www.steelcloud.com/interview-stig-challenges-for-government-leadership/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Mon, 05 Jul 2021 12:45:54 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Videos]]></category>
		<category><![CDATA[afcea]]></category>
		<category><![CDATA[Digital transformation]]></category>
		<category><![CDATA[FedRAMP]]></category>
		<category><![CDATA[IT operations]]></category>
		<category><![CDATA[ITmodernization]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=78921</guid>

					<description><![CDATA[In this CyberSecurity TV interview, Dave Gardy interviews Sandra Jamshidi, retired Naval Officer &#38; Information Professional Officer, to get an understanding of STIG challenges from the trenches. In her most recent assignment, Sandra served to validate Navy&#8217;s IT requirements and resource planning for Computer Defense programs from the Pentagon. Sandra shares her experience on the ...]]></description>
		
		
		
			</item>
		<item>
		<title>PODCAST: Automated Remediation</title>
		<link>https://www.steelcloud.com/automated-remediation/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Wed, 16 Jun 2021 15:00:03 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Podcasts]]></category>
		<category><![CDATA[compliance automation]]></category>
		<category><![CDATA[Digital transformation]]></category>
		<category><![CDATA[IT operations]]></category>
		<category><![CDATA[ITmodernization]]></category>
		<category><![CDATA[remediation]]></category>
		<category><![CDATA[security podcast]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=81808</guid>

					<description><![CDATA[Automated remediation is not new to SteelCloud. Listen as Brian Hajost discusses how enterprises can automate remediation of their endpoints. In Episode S3E6, Brian Hajost, Founder and COO of SteelCloud, shares how SteelCloud&#8217;s ConfigOS technology automates the remediation of endpoints to effectively meet compliance mandates. Click the image below to listen to this episode on Brilliance ...]]></description>
		
		
		
			</item>
		<item>
		<title>Prepare now for a more agile and secure government environment</title>
		<link>https://www.steelcloud.com/prepare-now-for-a-more-agile-and-secure-government-environment/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Mon, 01 Feb 2021 20:27:10 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[agile]]></category>
		<category><![CDATA[ATO]]></category>
		<category><![CDATA[CMMC]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[Cybersecurity risk]]></category>
		<category><![CDATA[Digital transformation]]></category>
		<category><![CDATA[Network security]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[RMF process]]></category>
		<category><![CDATA[Secure baseline]]></category>
		<category><![CDATA[STIG automation]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[stig policy]]></category>
		<category><![CDATA[Vulnerabilty]]></category>
		<category><![CDATA[workforce transformation]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=81010</guid>

					<description><![CDATA[How to be agile while embracing new technologies begins with being prepared. The use of on-premise technologies and the cloud continue to increase in the Federal space as agencies pursue modernization through digital and workforce transformation. But with those agile technologies evolving daily, threats and vulnerabilities have also increased. Even when the government uses the ...]]></description>
		
		
		
			</item>
	</channel>
</rss>
