<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:media="http://search.yahoo.com/mrss/" >

<channel>
	<title>government &#8211; SteelCloud</title>
	<atom:link href="https://www.steelcloud.com/tag/government/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.steelcloud.com</link>
	<description></description>
	<lastBuildDate>Mon, 25 Aug 2025 19:28:02 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.steelcloud.com/wp-content/uploads/favicon.png</url>
	<title>government &#8211; SteelCloud</title>
	<link>https://www.steelcloud.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>From Year-End Spending to Year-Round STIG Compliance</title>
		<link>https://www.steelcloud.com/year-round-stig-compliance/</link>
		
		<dc:creator><![CDATA[Stephanie Plona]]></dc:creator>
		<pubDate>Tue, 12 Aug 2025 15:20:48 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[government]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[unified automation]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=90611</guid>

					<description><![CDATA[Year-Round STIG Compliance Automation: Year-End Spending for Continuous Year-Round STIG Compliance Results How unified STIG automation turns year-end spending into lasting results Where do you want your cyber compliance program to be three months, six months, or a year from now: right where it is today? Or stronger, faster, and always audit-ready? Most leaders would ...]]></description>
		
		
		
			</item>
		<item>
		<title>PODCAST: Zero Trust Playbook: Practical Strategies for Public Sector Agencies</title>
		<link>https://www.steelcloud.com/podcast-zero-trust-playbook-practical-strategies-for-public-sector-agencies/</link>
		
		<dc:creator><![CDATA[Stephanie Plona]]></dc:creator>
		<pubDate>Thu, 21 Nov 2024 17:27:28 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Podcasts]]></category>
		<category><![CDATA[government]]></category>
		<category><![CDATA[Podcast]]></category>
		<category><![CDATA[public sector]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[Zero Trust]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=89909</guid>

					<description><![CDATA[PODCAST: Zero Trust Playbook: Practical Strategies for Public Sector Agencies Zero Trust is the topic on everyone’s minds as the initial September 2024 deadline for federal agencies to implement Zero Trust architecture and demonstrate a shift in cybersecurity approach has just passed. As the journey toward the Department of Defense 2027 goal of across-the-board baseline ...]]></description>
		
		
		
			</item>
		<item>
		<title>NIST and CUI: Aligning with Government Software Supply Chain Mandates</title>
		<link>https://www.steelcloud.com/government-software-supply-chain-mandates/</link>
		
		<dc:creator><![CDATA[Stephanie Plona]]></dc:creator>
		<pubDate>Tue, 13 Feb 2024 15:16:47 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Automation]]></category>
		<category><![CDATA[CMMC]]></category>
		<category><![CDATA[Compliance]]></category>
		<category><![CDATA[CUI]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[government]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[nist 800-171]]></category>
		<category><![CDATA[software supply chain]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=89037</guid>

					<description><![CDATA[NIST and CUI: Aligning with Government Software Supply Chain Mandates What are the Mandates in the Government Software Supply Chain? If you want to be or stay part of the federal software supply chain, the rules of engagement have changed drastically over the past few years. Executive Order 14028 lists multiple requirements for developers of ...]]></description>
		
		
		
			</item>
		<item>
		<title>STIG 101 eBook</title>
		<link>https://www.steelcloud.com/stig-101-ebook/</link>
		
		<dc:creator><![CDATA[Stephanie Plona]]></dc:creator>
		<pubDate>Tue, 23 Jan 2024 20:31:54 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[eBooks]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Compliance]]></category>
		<category><![CDATA[compliance automation]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[DoD]]></category>
		<category><![CDATA[eBook]]></category>
		<category><![CDATA[government]]></category>
		<category><![CDATA[STIG]]></category>
		<category><![CDATA[STIG automation]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=88984</guid>

					<description><![CDATA[STIG 101 eBook Everything you&#8217;ve always wanted to know about STIGs but were afraid to ask. &#160; Class is now in session. STIGs are critical to protecting our most sensitive data. Throughout the Department of Defense and other agencies—such as TSA and the DoJ—they are a mandated part of securing and maintaining systems and devices. ...]]></description>
		
		
		
			</item>
		<item>
		<title>STIG 101: How Do STIGs Work?</title>
		<link>https://www.steelcloud.com/stig-101-how-do-stigs-work/</link>
		
		<dc:creator><![CDATA[Stephanie Plona]]></dc:creator>
		<pubDate>Tue, 16 Jan 2024 16:55:47 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[ATO]]></category>
		<category><![CDATA[Authority To Operate]]></category>
		<category><![CDATA[cybersecurity compliance]]></category>
		<category><![CDATA[DoD]]></category>
		<category><![CDATA[government]]></category>
		<category><![CDATA[STIG]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=88945</guid>

					<description><![CDATA[STIG 101: How Do STIGs Work? And why do STIGs break things? There is one truth that everyone who has ever touched a Security Technical Implementation Guide (STIG) knows—STIGs break things. Systems, apps, and devices that work perfectly well in an unsecure environment “break” when STIGs are applied. There are two sides to this truth. ...]]></description>
		
		
		
			</item>
	</channel>
</rss>
