<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:media="http://search.yahoo.com/mrss/" >

<channel>
	<title>endpoint security &#8211; SteelCloud</title>
	<atom:link href="https://www.steelcloud.com/tag/endpoint-security/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.steelcloud.com</link>
	<description></description>
	<lastBuildDate>Mon, 06 Oct 2025 20:32:58 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.steelcloud.com/wp-content/uploads/favicon.png</url>
	<title>endpoint security &#8211; SteelCloud</title>
	<link>https://www.steelcloud.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Datasheet: ConfigOS DashView</title>
		<link>https://www.steelcloud.com/datasheet-configos-dashview/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Mon, 06 Oct 2025 15:51:33 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Collaterals]]></category>
		<category><![CDATA[ccri audit]]></category>
		<category><![CDATA[CIS Benchmarks]]></category>
		<category><![CDATA[cis controls]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[ConfigOS Dashview]]></category>
		<category><![CDATA[DevOps]]></category>
		<category><![CDATA[DFARS]]></category>
		<category><![CDATA[disa stigs]]></category>
		<category><![CDATA[endpoint security]]></category>
		<category><![CDATA[Federal Contractor]]></category>
		<category><![CDATA[FedRAMP]]></category>
		<category><![CDATA[information assurance]]></category>
		<category><![CDATA[IT infrastructure]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[security infrastructure]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[stig policy]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=81535</guid>

					<description><![CDATA[Revolutionize the monitoring of your infrastructure hardening compliance. Dramatically reduce the time spent monitoring, detecting, and maintaining the enterprise&#8217;s DISA STIG/CIS Benchmark infrastructure hardening compliance. ConfigOS DashView is revolutionizing the way organizations monitor and maintain their infrastructure hardening compliance.  Maintaining risk awareness; performing compliance trend analysis; discovering and correcting hardening drift is usually a cumbersome, ...]]></description>
		
		
		
			</item>
		<item>
		<title>Make checklist work more agile with eMASS automation</title>
		<link>https://www.steelcloud.com/make-checklist-work-more-agile-with-emass-automation/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Sat, 20 May 2023 14:14:29 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[dahsview splunk]]></category>
		<category><![CDATA[Dashview]]></category>
		<category><![CDATA[emass automation]]></category>
		<category><![CDATA[emass files]]></category>
		<category><![CDATA[endpoint security]]></category>
		<category><![CDATA[Federal Contractor]]></category>
		<category><![CDATA[FedRAMP]]></category>
		<category><![CDATA[information assurance]]></category>
		<category><![CDATA[integrating ckl]]></category>
		<category><![CDATA[IT infrastructure]]></category>
		<category><![CDATA[rmf accreditation]]></category>
		<category><![CDATA[splunk integration]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[stig viewer checklist]]></category>
		<category><![CDATA[system hardening]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=86603</guid>

					<description><![CDATA[Accelerating your RMF accreditation means getting more agile with eMASS automation. If you have ever tried loading STIG Viewer Checklist data into eMASS, you know one thing— it is a burdensome process! Yet the comprehensive view of your manual and machine configuration management and cybersecurity checklist are valuable, especially for accelerating your RMF accreditation. eMASS, ...]]></description>
		
		
		
			</item>
		<item>
		<title>Take Control of Your Information with DevSecOps Automation</title>
		<link>https://www.steelcloud.com/take-control-of-your-information-with-devsecops-automation/</link>
		
		<dc:creator><![CDATA[Jamie Coffey]]></dc:creator>
		<pubDate>Mon, 16 Jan 2023 14:47:03 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[CDM]]></category>
		<category><![CDATA[CIS Benchmarks]]></category>
		<category><![CDATA[cisa]]></category>
		<category><![CDATA[Contiunous Diagnostics Mitigation]]></category>
		<category><![CDATA[DevOps]]></category>
		<category><![CDATA[DevSecOps]]></category>
		<category><![CDATA[drift]]></category>
		<category><![CDATA[endpoint security]]></category>
		<category><![CDATA[FISMA]]></category>
		<category><![CDATA[rmf accreditation]]></category>
		<category><![CDATA[STIG]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[system hardening]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=87872</guid>

					<description><![CDATA[DevSecOps: Build Security at Every Step of the Process The demands of modern work put pressure on professionals and engineers to deliver quick and proficient solutions. That expectation is growing as technologies, mandates, and cybercriminals get more complex and sophisticated. Case in point: Federal agencies have until September 30, 2023, to report at least 80 ...]]></description>
		
		
		
			</item>
		<item>
		<title>Inflation: The Unseen Threat to the Cyberworkforce.</title>
		<link>https://www.steelcloud.com/inflation-the-unseen-threat-to-the-cyberworkforce/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Mon, 09 Jan 2023 16:10:43 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Dashview]]></category>
		<category><![CDATA[emass automation]]></category>
		<category><![CDATA[emass files]]></category>
		<category><![CDATA[endpoint security]]></category>
		<category><![CDATA[Federal Contractor]]></category>
		<category><![CDATA[FedRAMP]]></category>
		<category><![CDATA[information assurance]]></category>
		<category><![CDATA[integrating ckl]]></category>
		<category><![CDATA[rmf accreditation]]></category>
		<category><![CDATA[splunk integration]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[stig viewer checklist]]></category>
		<category><![CDATA[system hardening]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=87852</guid>

					<description><![CDATA[Inflation is eroding budgets and employee compensation in the cyberworkforce. When it comes to the culprits of inflation, there are many places to point blame. Pandemic-induced supply chain shortages, followed by the Russian invasion of Ukraine and disrupted supplies of commodities from the region, certainly top the list.    Gartner asked C-suite executives what they were focusing on in ...]]></description>
		
		
		
			</item>
		<item>
		<title>SIEM 2.84: Do You Have All the Actionable Intel You Need?</title>
		<link>https://www.steelcloud.com/siem-284-do-you-have-all-the-actionable-intel-you-need/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Mon, 02 May 2022 14:06:25 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[dahsview splunk]]></category>
		<category><![CDATA[emass automation]]></category>
		<category><![CDATA[emass files]]></category>
		<category><![CDATA[endpoint security]]></category>
		<category><![CDATA[Federal Contractor]]></category>
		<category><![CDATA[FedRAMP]]></category>
		<category><![CDATA[information assurance]]></category>
		<category><![CDATA[integrating ckl]]></category>
		<category><![CDATA[IT infrastructure]]></category>
		<category><![CDATA[SIEM automation]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[stig viewer checklist]]></category>
		<category><![CDATA[system hardening]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=86671</guid>

					<description><![CDATA[Automation, in conjunction with Splunk and SIEM 2.84, gives you the best visibility into your enterprise. You can fix something without knowing why it broke. But the more complex the break, the more likely it will fail again. So, when dealing with something as complex and critical as cybersecurity, you need to know where the ...]]></description>
		
		
		
			</item>
		<item>
		<title>Integrating CKL, eMASS, and SIEM Data with Automation</title>
		<link>https://www.steelcloud.com/integrating-ckl-emass-and-siem-data-with-automation/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Wed, 12 Jan 2022 16:26:22 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[dahsview splunk]]></category>
		<category><![CDATA[emass automation]]></category>
		<category><![CDATA[emass files]]></category>
		<category><![CDATA[endpoint security]]></category>
		<category><![CDATA[Federal Contractor]]></category>
		<category><![CDATA[FedRAMP]]></category>
		<category><![CDATA[information assurance]]></category>
		<category><![CDATA[integrating ckl]]></category>
		<category><![CDATA[IT infrastructure]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[stig viewer checklist]]></category>
		<category><![CDATA[system hardening]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=82878</guid>

					<description><![CDATA[Automating eMASS There are four significant areas that automation can be applied to provide real advantage to the operationalization of cyber compliance within the DoD. 1, Automate and reduce the effort/errors in merging non-technical CKL data with machine-generated technical data. 2. Automate and simplify the production and input of compliance data into eMASS. 3. Automate ...]]></description>
		
		
		
			</item>
		<item>
		<title>eMASS Automation and Uniting the Missing Security Compliance Data</title>
		<link>https://www.steelcloud.com/emass-automation-and-uniting-the-missing-security-compliance-data/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Tue, 11 Jan 2022 15:55:04 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[CDM]]></category>
		<category><![CDATA[CIS]]></category>
		<category><![CDATA[cis controls]]></category>
		<category><![CDATA[compliance drift]]></category>
		<category><![CDATA[compliance mandates]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[configuration drift]]></category>
		<category><![CDATA[DevOps]]></category>
		<category><![CDATA[DFARS]]></category>
		<category><![CDATA[disa stigs]]></category>
		<category><![CDATA[endpoint security]]></category>
		<category><![CDATA[Federal Contractor]]></category>
		<category><![CDATA[FedRAMP]]></category>
		<category><![CDATA[information assurance]]></category>
		<category><![CDATA[IT infrastructure]]></category>
		<category><![CDATA[linux]]></category>
		<category><![CDATA[nist 800-53]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[stig policy]]></category>
		<category><![CDATA[system drift]]></category>
		<category><![CDATA[system hardening]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=82869</guid>

					<description><![CDATA[How eMASS Automation Unites the Missing Security Compliance Data eMASS, or the Enterprise Mission Assurance Support Service, was developed by the DoD, in part, as a repository that unites technical/machine data generated from endpoint scans with the human/non-technical data documented by security/IA personnel.  Traditionally the “uniting” process is accomplished by completing a STIG Viewer Checklist ...]]></description>
		
		
		
			</item>
		<item>
		<title>Automating Security Configuration Management: The Time to Hesitate is Over</title>
		<link>https://www.steelcloud.com/automating-security-configuration-management-the-time-to-hesitate-is-over/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Fri, 10 Dec 2021 17:45:07 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Automated STIG Compliance]]></category>
		<category><![CDATA[automating security configuration management]]></category>
		<category><![CDATA[CIS security benchmarks]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[cyber hardening]]></category>
		<category><![CDATA[DFARS]]></category>
		<category><![CDATA[endpoint security]]></category>
		<category><![CDATA[FedRAMP]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[secure baselines]]></category>
		<category><![CDATA[security podcast]]></category>
		<category><![CDATA[STIG CIS controls]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=82800</guid>

					<description><![CDATA[Security configuration management and resistance to change simplified by automating security configuration management with automation. From the Ford Mustang and Dodge Challenger to the Cadillac Coupe De Ville, American cars were admired back in the 1970s. They were manufactured as they had always been—cars would come off the manufacturing line and be full of defects ...]]></description>
		
		
		
			</item>
		<item>
		<title>Stop the Drift &#8211; How to Spot and Stop Compliance Drift</title>
		<link>https://www.steelcloud.com/get-the-drift-how-to-spot-and-stop-compliance-drift/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Fri, 22 Oct 2021 14:34:25 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[CDM]]></category>
		<category><![CDATA[CIS]]></category>
		<category><![CDATA[cis controls]]></category>
		<category><![CDATA[compliance drift]]></category>
		<category><![CDATA[compliance mandates]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[configuration drift]]></category>
		<category><![CDATA[DevOps]]></category>
		<category><![CDATA[DFARS]]></category>
		<category><![CDATA[disa stigs]]></category>
		<category><![CDATA[endpoint security]]></category>
		<category><![CDATA[Federal Contractor]]></category>
		<category><![CDATA[FedRAMP]]></category>
		<category><![CDATA[information assurance]]></category>
		<category><![CDATA[IT infrastructure]]></category>
		<category><![CDATA[linux]]></category>
		<category><![CDATA[nist 800-53]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[stig policy]]></category>
		<category><![CDATA[system drift]]></category>
		<category><![CDATA[system hardening]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=82589</guid>

					<description><![CDATA[“No man ever steps in the same river twice, for it&#8217;s not the same river and he&#8217;s not the same man.” Heraclitus The same thing is true when it comes to your IT infrastructure. Catching your STIGs from compliance drift means the minute you make one change, you are dealing with a different network and ...]]></description>
		
		
		
			</item>
		<item>
		<title>Video: Building Compliance into DevOps Process</title>
		<link>https://www.steelcloud.com/overview-building-compliance-into-devops-process/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Mon, 05 Jul 2021 13:25:35 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Videos]]></category>
		<category><![CDATA[Cybersecurity risk]]></category>
		<category><![CDATA[DevOps]]></category>
		<category><![CDATA[DevSecOps]]></category>
		<category><![CDATA[DoD]]></category>
		<category><![CDATA[endpoint security]]></category>
		<category><![CDATA[mitigate threats]]></category>
		<category><![CDATA[RMF]]></category>
		<category><![CDATA[Secure baseline]]></category>
		<category><![CDATA[secure infrastructure]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=80325</guid>

					<description><![CDATA[Integrating policy compliance into DevOps is not a new concept to SteelCloud. With our patented policy remediation software, ConfigOS, you can easily integrate STIG or CIS policy compliance into every step of the DevOps process – from unit testing in development to ongoing sustainment in production.]]></description>
		
		
		
			</item>
	</channel>
</rss>
