<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:media="http://search.yahoo.com/mrss/" >

<channel>
	<title>NIST &#8211; SteelCloud</title>
	<atom:link href="https://www.steelcloud.com/tag/nist/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.steelcloud.com</link>
	<description></description>
	<lastBuildDate>Tue, 18 Nov 2025 18:33:27 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.steelcloud.com/wp-content/uploads/favicon.png</url>
	<title>NIST &#8211; SteelCloud</title>
	<link>https://www.steelcloud.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>How CMMC Automation Delivers a Competitive Advantage to the DIB</title>
		<link>https://www.steelcloud.com/how-cmmc-automation-delivers-a-competitive-advantage-to-the-dib/</link>
		
		<dc:creator><![CDATA[Stephanie Plona]]></dc:creator>
		<pubDate>Tue, 18 Nov 2025 18:32:52 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Automation]]></category>
		<category><![CDATA[CMMC]]></category>
		<category><![CDATA[CMMC Level 2+]]></category>
		<category><![CDATA[DIB]]></category>
		<category><![CDATA[DoD]]></category>
		<category><![CDATA[NIST]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=91265</guid>

					<description><![CDATA[How CMMC Automation Delivers a Competitive Advantage to the DIB &#160; Automate CMMC Compliance and Gain a Competitive Advantage with the DoD &#160; On November 10, 2025, the DoD officially instituted its new CMMC rule requiring Level 1 and Level 2 prime and subcontractors to perform self-assessments of their cybersecurity practices to ensure they are ...]]></description>
		
		
		
			</item>
		<item>
		<title>What is CMMC Phase 1?</title>
		<link>https://www.steelcloud.com/what-is-cmmc-phase-1/</link>
		
		<dc:creator><![CDATA[Stephanie Plona]]></dc:creator>
		<pubDate>Thu, 13 Nov 2025 19:18:39 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Automation]]></category>
		<category><![CDATA[CMMC]]></category>
		<category><![CDATA[Compliance]]></category>
		<category><![CDATA[DIB]]></category>
		<category><![CDATA[DoD]]></category>
		<category><![CDATA[Level 1]]></category>
		<category><![CDATA[Level 2+]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[Phase 1]]></category>
		<category><![CDATA[self assessment]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=91225</guid>

					<description><![CDATA[What is CMMC Phase 1? The DoD has made it official—the CMMC requirement for those in the Defense Industrial Base (DIB) went into effect on November 10, 2025. What that means is that CMMC certification via self-assessments will be required for Level 1 and Level 2 contractors in order to respond to DoD contracts moving forward. ...]]></description>
		
		
		
			</item>
		<item>
		<title>Automating Higher Ed Security at EDUCAUSE 2025</title>
		<link>https://www.steelcloud.com/automating-higher-ed-security-at-educause-2025/</link>
		
		<dc:creator><![CDATA[Jamie Coffey]]></dc:creator>
		<pubDate>Wed, 05 Nov 2025 15:48:16 +0000</pubDate>
				<category><![CDATA[Articles]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[CIS Benchmarks]]></category>
		<category><![CDATA[EDUCAUSE]]></category>
		<category><![CDATA[Higher Ed]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[SLED]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=91206</guid>

					<description><![CDATA[Why Proven Frameworks and Automation Matter for Higher Ed Security SteelCloud has just returned from exhibiting at the EDUCAUSE conference in Nashville. EDUCAUSE is a nonprofit organization supporting higher education technology leaders and professionals in the advancement of teaching, learning and decision making. Topics included everything from AI and chatbots to payment technologies and cybersecurity. ...]]></description>
		
		
		
			</item>
		<item>
		<title>Datasheet: ConfigOS DashView</title>
		<link>https://www.steelcloud.com/datasheet-configos-dashview/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Mon, 06 Oct 2025 15:51:33 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Collaterals]]></category>
		<category><![CDATA[ccri audit]]></category>
		<category><![CDATA[CIS Benchmarks]]></category>
		<category><![CDATA[cis controls]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[ConfigOS Dashview]]></category>
		<category><![CDATA[DevOps]]></category>
		<category><![CDATA[DFARS]]></category>
		<category><![CDATA[disa stigs]]></category>
		<category><![CDATA[endpoint security]]></category>
		<category><![CDATA[Federal Contractor]]></category>
		<category><![CDATA[FedRAMP]]></category>
		<category><![CDATA[information assurance]]></category>
		<category><![CDATA[IT infrastructure]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[security infrastructure]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[stig policy]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=81535</guid>

					<description><![CDATA[Revolutionize the monitoring of your infrastructure hardening compliance. Dramatically reduce the time spent monitoring, detecting, and maintaining the enterprise&#8217;s DISA STIG/CIS Benchmark infrastructure hardening compliance. ConfigOS DashView is revolutionizing the way organizations monitor and maintain their infrastructure hardening compliance.  Maintaining risk awareness; performing compliance trend analysis; discovering and correcting hardening drift is usually a cumbersome, ...]]></description>
		
		
		
			</item>
		<item>
		<title>A Look into the Future of Cybersecurity in the Water Industry.</title>
		<link>https://www.steelcloud.com/a-look-into-the-future-of-cybersecurity-in-the-water-industry/</link>
		
		<dc:creator><![CDATA[Stephanie Plona]]></dc:creator>
		<pubDate>Wed, 04 Dec 2024 19:19:38 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Automation]]></category>
		<category><![CDATA[baseline hardening]]></category>
		<category><![CDATA[CIS]]></category>
		<category><![CDATA[CIS Benchmarks]]></category>
		<category><![CDATA[CMMC]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[EIS Cyber]]></category>
		<category><![CDATA[NERC CIP]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[STIG]]></category>
		<category><![CDATA[system hardening]]></category>
		<category><![CDATA[Water Industry]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=89943</guid>

					<description><![CDATA[Securing the Future: Cybersecurity Challenges and Solutions for the Water Industry The EPA recently issued a report stating that more than 300 drinking water systems have cybersecurity vulnerabilities that could lead to functionality loss, denial-of-service (DoS) conditions, and customer information compromise. These systems serve roughly 110 million Americans. In fact, a recent attack in New ...]]></description>
		
		
		
			</item>
		<item>
		<title>WEBINAR: Confessions of a Software Supply Chain Participant</title>
		<link>https://www.steelcloud.com/webinar-confessions-of-a-software-supply-chain-participant/</link>
		
		<dc:creator><![CDATA[Stephanie Plona]]></dc:creator>
		<pubDate>Wed, 13 Mar 2024 17:06:40 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Webinars]]></category>
		<category><![CDATA[ATO]]></category>
		<category><![CDATA[CMMC]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[Pen Testing]]></category>
		<category><![CDATA[RMF]]></category>
		<category><![CDATA[SBOM]]></category>
		<category><![CDATA[software supply chain]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[supply chain security]]></category>
		<category><![CDATA[webinar]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=89096</guid>

					<description><![CDATA[WEBINAR: Confessions of a Software Supply Chain Participant Things are coming to a head within the federal supply chain as cyber-attacks become increasingly more common and sophisticated. Join Brian Hajost, SteelCloud’s COO and active contributor to AFCEA’s Secure Supply Chain subcommittee, as he helps you strategize your cyber response. Expectations: What should the government expect ...]]></description>
		
		
		
		<media:content url="https://www.youtube.com/embed/1PkeM8-YJh4" medium="video" width="1280" height="720">
			<media:player url="https://www.youtube.com/embed/1PkeM8-YJh4" />
			<media:title type="plain">Confessions of a Software Supply Chain Participant - Webinar Replay</media:title>
			<media:description type="html"><![CDATA[Things are coming to a head within the federal supply chain (and, frankly, every other supply chain) as cyber-attacks become increasingly more common and sop...]]></media:description>
			<media:thumbnail url="https://www.steelcloud.com/wp-content/uploads/confessions-of-a-software-supply.jpg" />
			<media:rating scheme="urn:simple">nonadult</media:rating>
		</media:content>
	</item>
		<item>
		<title>There’s a Breach in the Supply Chain. What Do You Do?</title>
		<link>https://www.steelcloud.com/theres-a-breach-in-the-supply-chain-what-do-you-do/</link>
		
		<dc:creator><![CDATA[Stephanie Plona]]></dc:creator>
		<pubDate>Mon, 26 Feb 2024 19:45:04 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[breach]]></category>
		<category><![CDATA[critical software]]></category>
		<category><![CDATA[CUI]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[DoD]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[securing the software supply chain]]></category>
		<category><![CDATA[software]]></category>
		<category><![CDATA[supply chain]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=89050</guid>

					<description><![CDATA[There’s a breach in the supply chain. What do you do? What to do in case of a breach. Let’s say you’ve established government-level cybersecurity in your organization. You’ve assessed your risks. You’ve aligned with stringent compliance standards such as STIG, CIS or CMMC. Your systems are continually updated with security measures. And, you have ...]]></description>
		
		
		
			</item>
		<item>
		<title>NIST and CUI: Aligning with Government Software Supply Chain Mandates</title>
		<link>https://www.steelcloud.com/government-software-supply-chain-mandates/</link>
		
		<dc:creator><![CDATA[Stephanie Plona]]></dc:creator>
		<pubDate>Tue, 13 Feb 2024 15:16:47 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Automation]]></category>
		<category><![CDATA[CMMC]]></category>
		<category><![CDATA[Compliance]]></category>
		<category><![CDATA[CUI]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[government]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[nist 800-171]]></category>
		<category><![CDATA[software supply chain]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=89037</guid>

					<description><![CDATA[NIST and CUI: Aligning with Government Software Supply Chain Mandates What are the Mandates in the Government Software Supply Chain? If you want to be or stay part of the federal software supply chain, the rules of engagement have changed drastically over the past few years. Executive Order 14028 lists multiple requirements for developers of ...]]></description>
		
		
		
			</item>
		<item>
		<title>STIG 101: Who Can Use STIGs?</title>
		<link>https://www.steelcloud.com/stig-101-who-can-use-stigs/</link>
		
		<dc:creator><![CDATA[Stephanie Plona]]></dc:creator>
		<pubDate>Tue, 23 Jan 2024 16:34:41 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[ATO]]></category>
		<category><![CDATA[Automation]]></category>
		<category><![CDATA[baseline hardening]]></category>
		<category><![CDATA[cATO]]></category>
		<category><![CDATA[CIS Benchmarks]]></category>
		<category><![CDATA[Compliance]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[DoD]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[RMF]]></category>
		<category><![CDATA[STIG]]></category>
		<category><![CDATA[STIG automation]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=88979</guid>

					<description><![CDATA[STIG 101: Who Can Use STIGs? They aren’t just for the Department of Defense. Extensive research. Seasoned knowledge. And a standardized approach. As it turns out, the federal government knows what it is doing when it comes to cybersecurity. Security Technical Implementation Guides or STIGs are the result of years of research into threats, vulnerabilities ...]]></description>
		
		
		
			</item>
		<item>
		<title>Securing the Software Supply Chain 101</title>
		<link>https://www.steelcloud.com/securing-the-software-supply-chain-101/</link>
		
		<dc:creator><![CDATA[Stephanie Plona]]></dc:creator>
		<pubDate>Tue, 27 Jun 2023 15:24:05 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Automation]]></category>
		<category><![CDATA[CMMC 2.0]]></category>
		<category><![CDATA[CUI]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[EO]]></category>
		<category><![CDATA[mission-critical software]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[SBOM]]></category>
		<category><![CDATA[secure]]></category>
		<category><![CDATA[software supply chain]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=88520</guid>

					<description><![CDATA[Securing the Software Supply Chain 101 Class is now in session. CUI. SBOM. NIST. Executive orders. Critical software. Mix them all together and you’ve got a more secure supply chain. But it’s all just a mishmash of words until you know what they mean. A supply chain attack happens when someone infiltrates your system through ...]]></description>
		
		
		
			</item>
	</channel>
</rss>
