<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:media="http://search.yahoo.com/mrss/" >

<channel>
	<title>Mechanized &#8211; SteelCloud</title>
	<atom:link href="https://www.steelcloud.com/tag/mechanized/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.steelcloud.com</link>
	<description></description>
	<lastBuildDate>Mon, 25 Aug 2025 19:41:34 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.steelcloud.com/wp-content/uploads/favicon.png</url>
	<title>Mechanized &#8211; SteelCloud</title>
	<link>https://www.steelcloud.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Access a “net-neutral” approach to cybersecurity</title>
		<link>https://www.steelcloud.com/access-a-net-neutral-approach-to-cybersecurity/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Sat, 16 Jan 2021 02:23:33 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[Cybersecurity risk]]></category>
		<category><![CDATA[Mechanized]]></category>
		<category><![CDATA[net-neutral]]></category>
		<category><![CDATA[Risk Assessment]]></category>
		<category><![CDATA[RMF process]]></category>
		<category><![CDATA[RPA]]></category>
		<category><![CDATA[Secure baseline]]></category>
		<category><![CDATA[STIG automation]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[stig policy]]></category>
		<category><![CDATA[Vulnerabilty]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=80984</guid>

					<description><![CDATA[Is a &#8220;net-neutral&#8221; concept truly open all? While there have always been divides in society, the digital divide is a relatively new chasm that has only grown deeper as technology expands. It used to be that the only way to access information was through your public library, which is equally free and open to all. ...]]></description>
		
		
		
			</item>
		<item>
		<title>Simplifying your adoption of the new NIST Cybersecurity Framework</title>
		<link>https://www.steelcloud.com/simplifying-your-adoption-of-the-new-nist-cybersecurity-framework/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Mon, 11 Jan 2021 15:26:23 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[Cybersecurity risk]]></category>
		<category><![CDATA[Mechanized]]></category>
		<category><![CDATA[Risk Assessment]]></category>
		<category><![CDATA[RMF process]]></category>
		<category><![CDATA[RPA]]></category>
		<category><![CDATA[Secure baseline]]></category>
		<category><![CDATA[STIG automation]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[stig policy]]></category>
		<category><![CDATA[Vulnerabilty]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=80972</guid>

					<description><![CDATA[How easy is it to adopt the new NIST Cybersecurity Framework? New and changing regulations and guidelines are a mainstay in the cybersecurity field. Keeping up with the changes and more importantly, understanding and applying them is not for the faint of heart. So, here’s a breakdown of the new IoT Cybersecurity Law signed by ...]]></description>
		
		
		
			</item>
		<item>
		<title>Complete Your Playbook with Ansible Integration</title>
		<link>https://www.steelcloud.com/complete-your-playbook-with-ansible-integration/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Tue, 01 Dec 2020 13:54:34 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Ansible Integration]]></category>
		<category><![CDATA[Ansible Inventory]]></category>
		<category><![CDATA[Ansible Vault]]></category>
		<category><![CDATA[CIS]]></category>
		<category><![CDATA[DevOps]]></category>
		<category><![CDATA[Mechanized]]></category>
		<category><![CDATA[Red Hat Ansible]]></category>
		<category><![CDATA[Risk Assessment]]></category>
		<category><![CDATA[Secure baseline]]></category>
		<category><![CDATA[STIG automation]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[stig policy]]></category>
		<category><![CDATA[Vulnerabilty]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=80789</guid>

					<description><![CDATA[How Ansible Integration automates your STIG/CIS Compliance If you have Ansible currently deployed in your environment, you know your IT environment management process is simplified. Ansible Inventory and Ansible Vault allows scaling out and configuring new systems automatically. This article will go over a few tips for Ansible integration with STIG/CIS automation compliance software such ...]]></description>
		
		
		
			</item>
		<item>
		<title>Get more done with Splunk Integration using STIG Compliance Software</title>
		<link>https://www.steelcloud.com/get-more-done-with-splunk-integration-using-stig-compliance-software/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Wed, 18 Nov 2020 16:40:58 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Bots]]></category>
		<category><![CDATA[CDM]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[Cybersecurity risk]]></category>
		<category><![CDATA[DevOps]]></category>
		<category><![CDATA[Mechanized]]></category>
		<category><![CDATA[Risk Assessment]]></category>
		<category><![CDATA[RMF process]]></category>
		<category><![CDATA[Secure baseline]]></category>
		<category><![CDATA[splunk integration]]></category>
		<category><![CDATA[STIG automation]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[stig policy]]></category>
		<category><![CDATA[Vulnerabilty]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=80641</guid>

					<description><![CDATA[Tips for Splunk integration with STIG automation compliance software By Joe Montgomery If you have Splunk currently deployed in your environment, you should already be aware of the platform&#8217;s expansive capabilities, but if you have not integrated your reports with Splunk, there are some key benefits of integrating the two that could make your life ...]]></description>
		
		
		
			</item>
		<item>
		<title>Security knows no season—10 tips for year-round cybersecurity</title>
		<link>https://www.steelcloud.com/security-knows-no-season-10-tips-for-year-round-cybersecurity/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Tue, 27 Oct 2020 23:44:44 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Bots]]></category>
		<category><![CDATA[CDM]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[Cybersecurity risk]]></category>
		<category><![CDATA[DevOps]]></category>
		<category><![CDATA[Mechanized]]></category>
		<category><![CDATA[Risk Assessment]]></category>
		<category><![CDATA[RMF process]]></category>
		<category><![CDATA[Secure baseline]]></category>
		<category><![CDATA[STIG automation]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[stig policy]]></category>
		<category><![CDATA[Vulnerabilty]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=80592</guid>

					<description><![CDATA[Listed below is a summary of our top 10 security tips for National Cybersecurity Awareness Month Each October, the industry hosts National Cybersecurity Awareness Month and this year SteelCloud compiled a list compliance tips to help our readers. But the truth is, there is never a month, week, day, hour or minute that we don’t ...]]></description>
		
		
		
			</item>
		<item>
		<title>How to know when bots are better than humans</title>
		<link>https://www.steelcloud.com/how-to-know-when-bots-are-better-than-humans/</link>
		
		<dc:creator><![CDATA[Jamie Coffey]]></dc:creator>
		<pubDate>Tue, 06 Oct 2020 19:11:50 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[Cybersecurity risk]]></category>
		<category><![CDATA[Mechanized]]></category>
		<category><![CDATA[Risk Assessment]]></category>
		<category><![CDATA[RMF process]]></category>
		<category><![CDATA[RPA]]></category>
		<category><![CDATA[Secure baseline]]></category>
		<category><![CDATA[STIG automation]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[stig policy]]></category>
		<category><![CDATA[Vulnerabilty]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=80449</guid>

					<description><![CDATA[By Brian Hajost Can Bots really be better than humans? In a “do more with less” business environment, robotic process automation (aka RPA, aka “automation”, aka “bots”) is gaining traction. With human performance optimization and digital transformations well established in the public and private sectors, some of today’s biggest advancements in time-, money- and effort-saving ...]]></description>
		
		
		
			</item>
	</channel>
</rss>
