<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:media="http://search.yahoo.com/mrss/" >

<channel>
	<title>Military &#8211; SteelCloud</title>
	<atom:link href="https://www.steelcloud.com/tag/military/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.steelcloud.com</link>
	<description></description>
	<lastBuildDate>Mon, 25 Aug 2025 19:26:57 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.steelcloud.com/wp-content/uploads/favicon.png</url>
	<title>Military &#8211; SteelCloud</title>
	<link>https://www.steelcloud.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Warfighters, C2ISR Systems and STIG Compliance</title>
		<link>https://www.steelcloud.com/warfighters-and-stig-compliance/</link>
		
		<dc:creator><![CDATA[Stephanie Plona]]></dc:creator>
		<pubDate>Tue, 13 Aug 2024 16:26:07 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[air force]]></category>
		<category><![CDATA[automated compliance]]></category>
		<category><![CDATA[Automation]]></category>
		<category><![CDATA[DoD]]></category>
		<category><![CDATA[Military]]></category>
		<category><![CDATA[STIG]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[tactical]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=89671</guid>

					<description><![CDATA[Warfighters, C2ISR Systems and STIG Compliance   Among the agencies and organizations that are required to implement Security Technical Implementation Guides (STIGs) to protect their systems and endpoints, the primary objectives are to protect data and system availability. The stakes rise, however, when those protections have a direct and immediate impact on the lives of ...]]></description>
		
		
		
			</item>
	</channel>
</rss>
