<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:media="http://search.yahoo.com/mrss/" >

<channel>
	<title>disa &#8211; SteelCloud</title>
	<atom:link href="https://www.steelcloud.com/tag/disa/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.steelcloud.com</link>
	<description></description>
	<lastBuildDate>Mon, 25 Aug 2025 19:48:58 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.steelcloud.com/wp-content/uploads/favicon.png</url>
	<title>disa &#8211; SteelCloud</title>
	<link>https://www.steelcloud.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Outpacing the Threat: Staying Mission Aligned</title>
		<link>https://www.steelcloud.com/the-urgency-of-action-staying-mission-aligned/</link>
		
		<dc:creator><![CDATA[Stephanie Plona]]></dc:creator>
		<pubDate>Mon, 03 Jun 2024 14:17:34 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Action]]></category>
		<category><![CDATA[Automation]]></category>
		<category><![CDATA[Compliance]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[Continuous Compliance]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[cyberworkforce]]></category>
		<category><![CDATA[Dashview]]></category>
		<category><![CDATA[disa]]></category>
		<category><![CDATA[DoD]]></category>
		<category><![CDATA[drift]]></category>
		<category><![CDATA[Executive Order]]></category>
		<category><![CDATA[Mission]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[secure]]></category>
		<category><![CDATA[SIEM]]></category>
		<category><![CDATA[STIG]]></category>
		<category><![CDATA[systems]]></category>
		<category><![CDATA[Urgency]]></category>
		<category><![CDATA[Zero Trust]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=88213</guid>

					<description><![CDATA[Outpacing the Threat: Staying Mission Aligned Continuous STIG Compliance Keeps Systems Mission Aligned One of today’s most sure-fire—and challenging—ways to protect our nation’s sensitive data is STIG compliance. Security Technical Implementation Guides (STIGs) identify areas of critical technology that are vulnerable to attack so they can be hardened. In a time of increasingly sophisticated ransomware ...]]></description>
		
		
		
			</item>
		<item>
		<title>STIG 101: Understanding the Basics of Compliance</title>
		<link>https://www.steelcloud.com/security-technical-implementation-guides-101/</link>
		
		<dc:creator><![CDATA[Stephanie Plona]]></dc:creator>
		<pubDate>Mon, 08 Jan 2024 04:33:25 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[disa]]></category>
		<category><![CDATA[DoD]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[STIG]]></category>
		<category><![CDATA[STIG automation]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=88936</guid>

					<description><![CDATA[Security Technical Implementation Guides 101: The Basics What are Security Technical Implementation Guides? As we speak, there are as many as 10,000 vulnerabilities in your system that, if not secured, could be a gateway to phishing, hacking or malware. This is why the Defense Information Systems Agency (DISA) created Security Technical Implementation Guides (STIGs). Security Technical ...]]></description>
		
		
		
			</item>
		<item>
		<title>Faces of SteelCloud: Automating the Automators</title>
		<link>https://www.steelcloud.com/faces-of-steelcloud-automating-the-automators/</link>
		
		<dc:creator><![CDATA[Stephanie Plona]]></dc:creator>
		<pubDate>Tue, 19 Dec 2023 15:51:52 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Automation]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[ConfigOS MPO]]></category>
		<category><![CDATA[Developer]]></category>
		<category><![CDATA[disa]]></category>
		<category><![CDATA[linux]]></category>
		<category><![CDATA[red hat]]></category>
		<category><![CDATA[STIG]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=88903</guid>

					<description><![CDATA[Faces of SteelCloud: Automating the Automators There’s an old saying, “the cobbler’s children have no shoes.” That’s because dad is too busy to make them. You also might see that happen in business, where businesses don’t take their own medicine. But Luke Wilson will have none of that at SteelCloud. He creates the internal apps ...]]></description>
		
		
		
			</item>
		<item>
		<title>Cybersecurity 101: Creating Higher Standards for Higher Education</title>
		<link>https://www.steelcloud.com/cybersecurity-101-creating-higher-standards-for-higher-education/</link>
		
		<dc:creator><![CDATA[Stephanie Plona]]></dc:creator>
		<pubDate>Thu, 16 Nov 2023 17:21:08 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Automation]]></category>
		<category><![CDATA[CIS Benchmarks]]></category>
		<category><![CDATA[disa]]></category>
		<category><![CDATA[education]]></category>
		<category><![CDATA[higher education]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[SLED]]></category>
		<category><![CDATA[STIG]]></category>
		<category><![CDATA[STIG and CIS Compliance]]></category>
		<category><![CDATA[system hardening]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=88837</guid>

					<description><![CDATA[Cybersecurity 101: Creating Higher Standards for Higher Education As the 2021 fall semester began in community colleges across the nation, two schools had to close from cyberattack. In July of 2022, another college took down its phone and online services for a month due to a malware attack. And in May of 2023, a group ...]]></description>
		
		
		
			</item>
		<item>
		<title>VIDEO: Confronting the Realities of a Remote/Hybrid Workforce in Cybersecurity</title>
		<link>https://www.steelcloud.com/video-confronting-the-realities-of-a-remote-hybrid-workforce-in-cybersecurity/</link>
		
		<dc:creator><![CDATA[Stephanie Plona]]></dc:creator>
		<pubDate>Wed, 05 Jul 2023 18:32:21 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Videos]]></category>
		<category><![CDATA[Automation]]></category>
		<category><![CDATA[Compliance]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[ConfigOS MPO]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[disa]]></category>
		<category><![CDATA[federal government]]></category>
		<category><![CDATA[hybrid workforce]]></category>
		<category><![CDATA[remote workforce]]></category>
		<category><![CDATA[secure]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=88540</guid>

					<description><![CDATA[Watch Now: Confronting the Realities of a Remote/Hybrid Workforce in Cybersecurity The recent rise of a remote and hybrid cybersecurity workforce presents a significant challenge to compliance operations. As more employees work remotely, their workstations may not always be connected to the organization’s network or users are connected to a slow network which makes it ...]]></description>
		
		
		
		<media:content url="https://www.youtube.com/embed/E2k6SCq3cII" medium="video" width="1280" height="720">
			<media:player url="https://www.youtube.com/embed/E2k6SCq3cII" />
			<media:title type="plain">CCRI Inspections: What You Should Know</media:title>
			<media:description type="html"><![CDATA[The goal of the DISA CCRI program is to protect sensitive Department of Defense data and networks from cyberattack. Inspections are often scheduled with just...]]></media:description>
			<media:thumbnail url="https://www.steelcloud.com/wp-content/uploads/ccri-inspections-what-you-should.jpg" />
			<media:rating scheme="urn:simple">nonadult</media:rating>
		</media:content>
	</item>
		<item>
		<title>VIDEO: CORA Inspections: What You Should Know</title>
		<link>https://www.steelcloud.com/video-ccri-inspections/</link>
		
		<dc:creator><![CDATA[Stephanie Plona]]></dc:creator>
		<pubDate>Fri, 30 Jun 2023 18:10:40 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Videos]]></category>
		<category><![CDATA[Automation]]></category>
		<category><![CDATA[CCRI]]></category>
		<category><![CDATA[Command Cyber Readiness Inspection]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[CORA]]></category>
		<category><![CDATA[CUI]]></category>
		<category><![CDATA[disa]]></category>
		<category><![CDATA[federal government]]></category>
		<category><![CDATA[secure]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=88532</guid>

					<description><![CDATA[Watch Now: CORA Inspections: What You Should Know The goal of the DISA CORA (formerly known as CCRI) program is to protect sensitive Department of Defense data and networks from cyberattack. Inspections are often scheduled with just a month or two notice—not nearly enough time to scramble and shore up neglected cyber and physical assets, ...]]></description>
		
		
		
		<media:content url="https://www.youtube.com/embed/GrE_pPMLuRY" medium="video" width="1280" height="720">
			<media:player url="https://www.youtube.com/embed/GrE_pPMLuRY" />
			<media:title type="plain">Securing the Software Supply Chain</media:title>
			<media:description type="html"><![CDATA[Gartner predicts that, by 2025, 45% of organizations worldwide will have experienced attacks on their software supply chains. That is a three-fold increase s...]]></media:description>
			<media:thumbnail url="https://www.steelcloud.com/wp-content/uploads/securing-the-software-supply-cha.jpg" />
			<media:rating scheme="urn:simple">nonadult</media:rating>
		</media:content>
	</item>
		<item>
		<title>The Urgency of Action: Gain More Focus on Cybersecurity Initiatives</title>
		<link>https://www.steelcloud.com/the-urgency-of-action-gain-more-focus-on-cybersecurity-initiatives/</link>
		
		<dc:creator><![CDATA[Stephanie Plona]]></dc:creator>
		<pubDate>Tue, 04 Apr 2023 14:59:17 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Action]]></category>
		<category><![CDATA[Audit]]></category>
		<category><![CDATA[Automation]]></category>
		<category><![CDATA[CCRI]]></category>
		<category><![CDATA[CCRI Preparedness]]></category>
		<category><![CDATA[CCRI Process]]></category>
		<category><![CDATA[Command Cyber Readiness Inspection]]></category>
		<category><![CDATA[Compliance]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[cyberworkforce]]></category>
		<category><![CDATA[disa]]></category>
		<category><![CDATA[DoD]]></category>
		<category><![CDATA[Executive Order]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[STIG]]></category>
		<category><![CDATA[Urgency]]></category>
		<category><![CDATA[Zero Trust]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=88184</guid>

					<description><![CDATA[The Urgency of Action: Gain More Focus on Cybersecurity Initiatives A focused approach to cybersecurity is an automated approach. Between STIG compliance requirements, Zero Trust and CCRIs, DoD agencies have a lot on their cybersecurity plates at a time when the supply of qualified workers is far outnumbered by demand. The constant scramble to meet ...]]></description>
		
		
		
			</item>
		<item>
		<title>Interview: Making Policy Compliance Work for You &#8211; CIS Benchmarks</title>
		<link>https://www.steelcloud.com/interview-making-policy-compliance-work-for-you-cis-benchmarks/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Mon, 27 Jun 2022 16:57:34 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Videos]]></category>
		<category><![CDATA[Asset Security]]></category>
		<category><![CDATA[ATO]]></category>
		<category><![CDATA[Authority To Operate]]></category>
		<category><![CDATA[baseline security controls]]></category>
		<category><![CDATA[CIS Benchmarks]]></category>
		<category><![CDATA[cis controls]]></category>
		<category><![CDATA[disa]]></category>
		<category><![CDATA[Disa STIG]]></category>
		<category><![CDATA[FedRAMP]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[NIST 800]]></category>
		<category><![CDATA[Risk Management Frame]]></category>
		<category><![CDATA[RMF]]></category>
		<category><![CDATA[Secure baseline]]></category>
		<category><![CDATA[Security Technical Implementation Guide STIG]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=86890</guid>

					<description><![CDATA[How the CIS Benchmarks and the DISA STIGs come together to form the bedrock principle for policy compliance. What is the best way to manage and configure for best security affect to support the mission and operation? In this CyberSecurity TV episode, Tony Sager, Sr VP Center for Internet Security (CIS), and Brian Hajost, SteelCloud ...]]></description>
		
		
		
		<media:content url="https://www.youtube.com/embed/3aE5JjKUVIs" medium="video" width="1280" height="720">
			<media:player url="https://www.youtube.com/embed/3aE5JjKUVIs" />
			<media:title type="plain">Making Policy Compliance Work for You - CIS Benchmarks &amp; DISA STIGs</media:title>
			<media:description type="html"><![CDATA[In this CyberSecurity TV episode, Tony Sager, Sr VP  Center for Internet Security (CIS),  and Brian Hajost, SteelCloud Founder and COO, discuss making policy...]]></media:description>
			<media:thumbnail url="https://www.steelcloud.com/wp-content/uploads/making-policy-compliance-work-fo.jpg" />
			<media:rating scheme="urn:simple">nonadult</media:rating>
		</media:content>
	</item>
		<item>
		<title>Interview: Zero Trust and How to Protect the Crown Jewels</title>
		<link>https://www.steelcloud.com/interview-zero-trust-and-how-to-protect-the-crown-jewels/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Mon, 14 Feb 2022 15:19:24 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Videos]]></category>
		<category><![CDATA[Asset Security]]></category>
		<category><![CDATA[ATO]]></category>
		<category><![CDATA[Authority To Operate]]></category>
		<category><![CDATA[baseline security controls]]></category>
		<category><![CDATA[CMMC 2.0]]></category>
		<category><![CDATA[disa]]></category>
		<category><![CDATA[Disa STIG]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[NIST 800]]></category>
		<category><![CDATA[nist 800-53]]></category>
		<category><![CDATA[Risk Management Frame]]></category>
		<category><![CDATA[RMF]]></category>
		<category><![CDATA[Secure baseline]]></category>
		<category><![CDATA[Security Technical Implementation Guide STIG]]></category>
		<category><![CDATA[system level control]]></category>
		<category><![CDATA[Zero Trust]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=83019</guid>

					<description><![CDATA[Zero Trust: Do you build a higher fence or wider moat? In this CyberSecurity TV episode, Glen Hernandez, Captain, U.S. Coast Guard (Retired), Former U.S. Coast Guard CISO Chair, AFCEA Zero Trust Strategies Subcommittee, and Brian Hajost, SteelCloud Founder and COO, discuss Zero Trust and how it differs from the traditional cybersecurity practices. Zero Trust ...]]></description>
		
		
		
			</item>
		<item>
		<title>Interview: Compliance Risk Mitigation and Risk Optimization at Scale</title>
		<link>https://www.steelcloud.com/interview-compliance-risk-mitigation-and-risk-optimization-at-scale/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Wed, 26 Jan 2022 16:52:56 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Videos]]></category>
		<category><![CDATA[Asset Security]]></category>
		<category><![CDATA[ATO]]></category>
		<category><![CDATA[Authority To Operate]]></category>
		<category><![CDATA[baseline security controls]]></category>
		<category><![CDATA[CMMC 2.0]]></category>
		<category><![CDATA[disa]]></category>
		<category><![CDATA[Disa STIG]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[NIST 800]]></category>
		<category><![CDATA[nist 800-53]]></category>
		<category><![CDATA[Risk Management Frame]]></category>
		<category><![CDATA[RMF]]></category>
		<category><![CDATA[Secure baseline]]></category>
		<category><![CDATA[Security Technical Implementation Guide STIG]]></category>
		<category><![CDATA[system level control]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=82948</guid>

					<description><![CDATA[Keep your inbox empty (compliance) while managing compliance risk mitigation and risk optimization to scale effectively with automation. In this CyberSecurity TV episode, Terry Roberts Founder and  CEO, White Hawk Inc. and Brian Hajost, SteelCloud Founder and COO, discuss risk mitigation and risk optimization with automation to scale effectiveness. Cybersecurity for computer networks and systems ...]]></description>
		
		
		
			</item>
	</channel>
</rss>
