<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:media="http://search.yahoo.com/mrss/" >

<channel>
	<title>emass automation &#8211; SteelCloud</title>
	<atom:link href="https://www.steelcloud.com/tag/emass-automation/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.steelcloud.com</link>
	<description></description>
	<lastBuildDate>Mon, 25 Aug 2025 19:50:56 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.steelcloud.com/wp-content/uploads/favicon.png</url>
	<title>emass automation &#8211; SteelCloud</title>
	<link>https://www.steelcloud.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>White Paper: Realizing the Promise of Zero Trust</title>
		<link>https://www.steelcloud.com/white-paper-realizing-the-promise-of-zero-trust/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Tue, 20 Aug 2024 20:25:26 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[White Papers]]></category>
		<category><![CDATA[Asset Management]]></category>
		<category><![CDATA[ATO]]></category>
		<category><![CDATA[Authority To Operate]]></category>
		<category><![CDATA[CDM]]></category>
		<category><![CDATA[compliance automation]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[dashview splunk]]></category>
		<category><![CDATA[Data protection]]></category>
		<category><![CDATA[emass automation]]></category>
		<category><![CDATA[FISHMA]]></category>
		<category><![CDATA[NIST 800]]></category>
		<category><![CDATA[RMF]]></category>
		<category><![CDATA[siem data]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[stig viewer checklist]]></category>
		<category><![CDATA[Zero Trust]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=86626</guid>

					<description><![CDATA[Hardening is foundational with Zero Trust. Automation helps.  Establishing Zero Trust goes beyond protecting your perimeter. You also need to put a metal detector at the entrance, secure the locker room, and provide continual surveillance. And ZT is not a one-size-fits-all approach. Instead, the result will be a continuum of solutions and outcomes tailored to ...]]></description>
		
		
		
			</item>
		<item>
		<title>Make checklist work more agile with eMASS automation</title>
		<link>https://www.steelcloud.com/make-checklist-work-more-agile-with-emass-automation/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Sat, 20 May 2023 14:14:29 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[dahsview splunk]]></category>
		<category><![CDATA[Dashview]]></category>
		<category><![CDATA[emass automation]]></category>
		<category><![CDATA[emass files]]></category>
		<category><![CDATA[endpoint security]]></category>
		<category><![CDATA[Federal Contractor]]></category>
		<category><![CDATA[FedRAMP]]></category>
		<category><![CDATA[information assurance]]></category>
		<category><![CDATA[integrating ckl]]></category>
		<category><![CDATA[IT infrastructure]]></category>
		<category><![CDATA[rmf accreditation]]></category>
		<category><![CDATA[splunk integration]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[stig viewer checklist]]></category>
		<category><![CDATA[system hardening]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=86603</guid>

					<description><![CDATA[Accelerating your RMF accreditation means getting more agile with eMASS automation. If you have ever tried loading STIG Viewer Checklist data into eMASS, you know one thing— it is a burdensome process! Yet the comprehensive view of your manual and machine configuration management and cybersecurity checklist are valuable, especially for accelerating your RMF accreditation. eMASS, ...]]></description>
		
		
		
			</item>
		<item>
		<title>Inflation: The Unseen Threat to the Cyberworkforce.</title>
		<link>https://www.steelcloud.com/inflation-the-unseen-threat-to-the-cyberworkforce/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Mon, 09 Jan 2023 16:10:43 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Dashview]]></category>
		<category><![CDATA[emass automation]]></category>
		<category><![CDATA[emass files]]></category>
		<category><![CDATA[endpoint security]]></category>
		<category><![CDATA[Federal Contractor]]></category>
		<category><![CDATA[FedRAMP]]></category>
		<category><![CDATA[information assurance]]></category>
		<category><![CDATA[integrating ckl]]></category>
		<category><![CDATA[rmf accreditation]]></category>
		<category><![CDATA[splunk integration]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[stig viewer checklist]]></category>
		<category><![CDATA[system hardening]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=87852</guid>

					<description><![CDATA[Inflation is eroding budgets and employee compensation in the cyberworkforce. When it comes to the culprits of inflation, there are many places to point blame. Pandemic-induced supply chain shortages, followed by the Russian invasion of Ukraine and disrupted supplies of commodities from the region, certainly top the list.    Gartner asked C-suite executives what they were focusing on in ...]]></description>
		
		
		
			</item>
		<item>
		<title>What Nobody Has Ever Told You About Compliance Automation</title>
		<link>https://www.steelcloud.com/what-nobody-has-ever-told-you-about-compliance-automation/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Sun, 28 Aug 2022 18:19:49 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Authority To Operate]]></category>
		<category><![CDATA[automated compliance]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[cyber ready workforce]]></category>
		<category><![CDATA[cybersecurity workforce shortage]]></category>
		<category><![CDATA[data based decisions]]></category>
		<category><![CDATA[DFARS]]></category>
		<category><![CDATA[DoD]]></category>
		<category><![CDATA[emass automation]]></category>
		<category><![CDATA[Federal Contractor]]></category>
		<category><![CDATA[FedRAMP]]></category>
		<category><![CDATA[information assurance]]></category>
		<category><![CDATA[IT infrastructure]]></category>
		<category><![CDATA[linux]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[Secure baseline]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[workforce]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=87266</guid>

					<description><![CDATA[With the Cyberworkforce shortage being top of mind for so many right now, we sat down with our own Brian Hajost, Founder and COO, to ask him about his thoughts on this concern and here&#8217;s what resulted. &#160; The hidden staffing benefits of compliance automation. The path to learning a professional craft has always been ...]]></description>
		
		
		
			</item>
		<item>
		<title>Automation Makes the Workforce Fonder</title>
		<link>https://www.steelcloud.com/automation-makes-the-workforce-fonder/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Sun, 21 Aug 2022 19:02:58 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Authority To Operate]]></category>
		<category><![CDATA[automated compliance]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[cyber ready workforce]]></category>
		<category><![CDATA[cybersecurity workforce shortage]]></category>
		<category><![CDATA[data based decisions]]></category>
		<category><![CDATA[DFARS]]></category>
		<category><![CDATA[DoD]]></category>
		<category><![CDATA[emass automation]]></category>
		<category><![CDATA[Federal Contractor]]></category>
		<category><![CDATA[FedRAMP]]></category>
		<category><![CDATA[information assurance]]></category>
		<category><![CDATA[IT infrastructure]]></category>
		<category><![CDATA[linux]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[Secure baseline]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[workforce]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=87242</guid>

					<description><![CDATA[Making the workforce place fun again with eMASS automation to accelerate RMF accreditation. There are many reasons to pursue a career in cybersecurity. Across the board, cybersecurity roles offer abundant employment possibilities, competitive pay, growth opportunities, job security, exciting day-to-day tasks, and the chance to make a difference. But what if your day-to-day is neither ...]]></description>
		
		
		
			</item>
		<item>
		<title>SIEM 2.84: Do You Have All the Actionable Intel You Need?</title>
		<link>https://www.steelcloud.com/siem-284-do-you-have-all-the-actionable-intel-you-need/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Mon, 02 May 2022 14:06:25 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[dahsview splunk]]></category>
		<category><![CDATA[emass automation]]></category>
		<category><![CDATA[emass files]]></category>
		<category><![CDATA[endpoint security]]></category>
		<category><![CDATA[Federal Contractor]]></category>
		<category><![CDATA[FedRAMP]]></category>
		<category><![CDATA[information assurance]]></category>
		<category><![CDATA[integrating ckl]]></category>
		<category><![CDATA[IT infrastructure]]></category>
		<category><![CDATA[SIEM automation]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[stig viewer checklist]]></category>
		<category><![CDATA[system hardening]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=86671</guid>

					<description><![CDATA[Automation, in conjunction with Splunk and SIEM 2.84, gives you the best visibility into your enterprise. You can fix something without knowing why it broke. But the more complex the break, the more likely it will fail again. So, when dealing with something as complex and critical as cybersecurity, you need to know where the ...]]></description>
		
		
		
			</item>
		<item>
		<title>RMF Acceleration Through eMASS Automation</title>
		<link>https://www.steelcloud.com/rmf-acceleration-through-emass-automation/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Tue, 29 Mar 2022 18:19:00 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Webinars]]></category>
		<category><![CDATA[Configuration Management]]></category>
		<category><![CDATA[Digital transformation]]></category>
		<category><![CDATA[emass automation]]></category>
		<category><![CDATA[FedRAMP]]></category>
		<category><![CDATA[IT operations]]></category>
		<category><![CDATA[ITmodernization]]></category>
		<category><![CDATA[Risk Management Framework]]></category>
		<category><![CDATA[SIEM]]></category>
		<category><![CDATA[stig viewer checklist]]></category>
		<category><![CDATA[vulnerability management]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=83143</guid>

					<description><![CDATA[Enterprise Mission Assurance Support Service—eMASS—acts as a repository uniting technical/machine data generated from endpoint scans with the human/non-technical data documented by security/IA personnel. Traditionally, this &#8220;uniting&#8221; process is accomplished by completing a STIG Viewer Checklist for each policy for each endpoint, quickly generating a cumbersome number of hand-created checklist files. With these overwhelming manual processes, ...]]></description>
		
		
		
			</item>
		<item>
		<title>Integrating CKL, eMASS, and SIEM Data with Automation</title>
		<link>https://www.steelcloud.com/integrating-ckl-emass-and-siem-data-with-automation/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Wed, 12 Jan 2022 16:26:22 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[dahsview splunk]]></category>
		<category><![CDATA[emass automation]]></category>
		<category><![CDATA[emass files]]></category>
		<category><![CDATA[endpoint security]]></category>
		<category><![CDATA[Federal Contractor]]></category>
		<category><![CDATA[FedRAMP]]></category>
		<category><![CDATA[information assurance]]></category>
		<category><![CDATA[integrating ckl]]></category>
		<category><![CDATA[IT infrastructure]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[stig viewer checklist]]></category>
		<category><![CDATA[system hardening]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=82878</guid>

					<description><![CDATA[Automating eMASS There are four significant areas that automation can be applied to provide real advantage to the operationalization of cyber compliance within the DoD. 1, Automate and reduce the effort/errors in merging non-technical CKL data with machine-generated technical data. 2. Automate and simplify the production and input of compliance data into eMASS. 3. Automate ...]]></description>
		
		
		
			</item>
		<item>
		<title>White Paper: eMASS Automation</title>
		<link>https://www.steelcloud.com/white-paper-emass-automation/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Tue, 11 Jan 2022 12:27:01 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[White Papers]]></category>
		<category><![CDATA[Asset Management]]></category>
		<category><![CDATA[ATO]]></category>
		<category><![CDATA[Authority To Operate]]></category>
		<category><![CDATA[compliance automation]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[dashview splunk]]></category>
		<category><![CDATA[Data protection]]></category>
		<category><![CDATA[emass automation]]></category>
		<category><![CDATA[NIST 800]]></category>
		<category><![CDATA[RMF]]></category>
		<category><![CDATA[siem data]]></category>
		<category><![CDATA[stig viewer checklist]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=82887</guid>

					<description><![CDATA[White Paper: eMASS Automation – The Search for a Solution to Unite and Automate Security Compliance Data eMASS, or the Enterprise Mission Assurance Support Service, was developed by the DoD, in part, as a repository that unites technical/machine data generated from endpoint scans with the human/non-technical data documented by security/IA personnel. Imagine a 1,000 workstation ...]]></description>
		
		
		
			</item>
	</channel>
</rss>
