<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:media="http://search.yahoo.com/mrss/" >

<channel>
	<title>ransomware attacks &#8211; SteelCloud</title>
	<atom:link href="https://www.steelcloud.com/tag/ransomware-attacks/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.steelcloud.com</link>
	<description></description>
	<lastBuildDate>Mon, 25 Aug 2025 19:40:14 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.steelcloud.com/wp-content/uploads/favicon.png</url>
	<title>ransomware attacks &#8211; SteelCloud</title>
	<link>https://www.steelcloud.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>To Trust or Not to Trust? The Answer is Both</title>
		<link>https://www.steelcloud.com/to-trust-or-not-to-trust-the-answer-is-both/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Mon, 04 Apr 2022 15:20:52 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[cisa]]></category>
		<category><![CDATA[compliance mandates]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[DoD]]></category>
		<category><![CDATA[FedRAMP]]></category>
		<category><![CDATA[IT infrastructure]]></category>
		<category><![CDATA[lot vulnerabilities]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[ransomware attacks]]></category>
		<category><![CDATA[Security Technical Implementation Guide]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[stig policy]]></category>
		<category><![CDATA[system hardening]]></category>
		<category><![CDATA[Zero Trust]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=83154</guid>

					<description><![CDATA[In Cybersecurity partnerships, you have to trust to achieve Zero Trust Our nation’s computer networks are on high alert. There are credible threats to our cybersecurity. And the Department of Defense urges us to take a Zero Trust posture. But before you can have Zero Trust, you’ll need help identifying and prioritizing your most critical ...]]></description>
		
		
		
			</item>
		<item>
		<title>Zero Trust: How to Adapt Accordingly</title>
		<link>https://www.steelcloud.com/zero-trust-how-to-adapt-accordingly/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Tue, 15 Feb 2022 18:03:08 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[cisa]]></category>
		<category><![CDATA[compliance mandates]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[configuration drift]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[Defensive line]]></category>
		<category><![CDATA[DFARS]]></category>
		<category><![CDATA[DoD]]></category>
		<category><![CDATA[Federal Contractor]]></category>
		<category><![CDATA[FedRAMP]]></category>
		<category><![CDATA[IT infrastructure]]></category>
		<category><![CDATA[lot vulnerabilities]]></category>
		<category><![CDATA[mitre att&ck]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[ransomware attacks]]></category>
		<category><![CDATA[Security Technical Implementation Guide]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[stig policy]]></category>
		<category><![CDATA[system hardening]]></category>
		<category><![CDATA[Zero Trust]]></category>
		<category><![CDATA[Zero Trust: How to adapt accordingly]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=83009</guid>

					<description><![CDATA[Zero Trust: How to adapt accordingly with secure and compliant baselines using automation January’s OMB Memorandum detailing the White House Executive Order on Zero Trust has government and defense industrial base (DIB) organizations talking. In last week’s Tech Talk Tuesday, we shared some basics of Zero Trust, including a refresher on network access control (NAC) ...]]></description>
		
		
		
			</item>
		<item>
		<title>Zero Trust, NAC and a New Era of Cybersecurity</title>
		<link>https://www.steelcloud.com/zero-trust-nac-and-a-new-era-of-cybersecurity/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Mon, 07 Feb 2022 16:56:18 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[cisa]]></category>
		<category><![CDATA[compliance mandates]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[configuration drift]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[Defensive line]]></category>
		<category><![CDATA[DFARS]]></category>
		<category><![CDATA[DoD]]></category>
		<category><![CDATA[Federal Contractor]]></category>
		<category><![CDATA[FedRAMP]]></category>
		<category><![CDATA[IT infrastructure]]></category>
		<category><![CDATA[lot vulnerabilities]]></category>
		<category><![CDATA[mitre att&ck]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[ransomware attacks]]></category>
		<category><![CDATA[Security Technical Implementation Guide]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[stig policy]]></category>
		<category><![CDATA[system hardening]]></category>
		<category><![CDATA[Zero Trust]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=82984</guid>

					<description><![CDATA[The game is well underway when talking about Zero Trust, NAC and ushering in the new era of cybersecurity In January, the US Office of Management and Budget (OMB) presented its Federal Zero Trust Memorandum on Improving the Cybersecurity of National Security, Department of Defense, and Intelligence Community Systems. It focuses primarily on a Zero ...]]></description>
		
		
		
			</item>
		<item>
		<title>Moving Forward with Zero Trust and the Cybersecurity Executive Order</title>
		<link>https://www.steelcloud.com/moving-forward-with-zero-trust-and-the-cybersecurity-executive-order/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Tue, 30 Nov 2021 13:06:40 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[cisa]]></category>
		<category><![CDATA[compliance mandates]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[configuration drift]]></category>
		<category><![CDATA[cybersecurity executive order]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[Defensive line]]></category>
		<category><![CDATA[DFARS]]></category>
		<category><![CDATA[DoD]]></category>
		<category><![CDATA[Federal Contractor]]></category>
		<category><![CDATA[FedRAMP]]></category>
		<category><![CDATA[IT infrastructure]]></category>
		<category><![CDATA[lot vulnerabilities]]></category>
		<category><![CDATA[mitre att&ck]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[ransomware attacks]]></category>
		<category><![CDATA[Security Technical Implementation Guide]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[stig policy]]></category>
		<category><![CDATA[system hardening]]></category>
		<category><![CDATA[Zero Trust]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=82748</guid>

					<description><![CDATA[Cybersecurity Executive Order  It has been a little over six months since the White House released their Cybersecurity Executive Order (EO) mandating, among other things, a move toward both the cloud and Zero Trust architectures for government agencies. So, where do we stand? In December, the Pentagon is expected to launch its Zero Trust office ...]]></description>
		
		
		
			</item>
		<item>
		<title>Zero Trust Architecture – A Holistic Approach to Network Security</title>
		<link>https://www.steelcloud.com/zero-trust-architecture-a-holistic-approach-to-network-security/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Sat, 16 Oct 2021 15:44:13 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[cisa]]></category>
		<category><![CDATA[compliance mandates]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[configuration drift]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[Defensive line]]></category>
		<category><![CDATA[DFARS]]></category>
		<category><![CDATA[DoD]]></category>
		<category><![CDATA[Federal Contractor]]></category>
		<category><![CDATA[FedRAMP]]></category>
		<category><![CDATA[IT infrastructure]]></category>
		<category><![CDATA[lot vulnerabilities]]></category>
		<category><![CDATA[mitre att&ck]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[ransomware attacks]]></category>
		<category><![CDATA[Security Technical Implementation Guide]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[stig policy]]></category>
		<category><![CDATA[system hardening]]></category>
		<category><![CDATA[Zero Trust]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=82552</guid>

					<description><![CDATA[Zero Trust &#8211; the best security outcome for enterprises and government agencies of all sizes. October marks National Cybersecurity Month. But let&#8217;s be clear. Cybersecurity is a 24/7/365 thing. And NIST 800-53, as well as the White House&#8217;s cybersecurity executive order (EO), demand that Zero Trust Architecture (ZTA) should form the foundation of secure systems moving forward, whether in ...]]></description>
		
		
		
			</item>
		<item>
		<title>Zero Trust + STIGs &#8211; Your Dream Team for Winning the Cybersecurity Game</title>
		<link>https://www.steelcloud.com/zero-trust-stigs-your-dream-team-for-winning-the-cybersecurity-game/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Tue, 21 Sep 2021 15:59:48 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[cisa]]></category>
		<category><![CDATA[compliance mandates]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[configuration drift]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[Defensive line]]></category>
		<category><![CDATA[DFARS]]></category>
		<category><![CDATA[DoD]]></category>
		<category><![CDATA[Federal Contractor]]></category>
		<category><![CDATA[FedRAMP]]></category>
		<category><![CDATA[IT infrastructure]]></category>
		<category><![CDATA[lot vulnerabilities]]></category>
		<category><![CDATA[mitre att&ck]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[ransomware attacks]]></category>
		<category><![CDATA[Security Technical Implementation Guide]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[stig policy]]></category>
		<category><![CDATA[system hardening]]></category>
		<category><![CDATA[Zero Trust]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=82475</guid>

					<description><![CDATA[As we reach the end of the government’s 4th quarter, hackers have got the ball, and they are heading down the field toward your data. Whom the defense decides to play and whom they choose to sideline while defending the field is critical to determining who ultimately seizes the advantage. Only the most trusted players ...]]></description>
		
		
		
			</item>
		<item>
		<title>How STIGs Keep Ransomware From Gashing Your Defensive Line</title>
		<link>https://www.steelcloud.com/how-stigs-keep-ransomware-from-gashing-your-defensive-line/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Tue, 14 Sep 2021 13:26:06 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[cisa]]></category>
		<category><![CDATA[compliance mandates]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[configuration drift]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[DFARS]]></category>
		<category><![CDATA[DoD]]></category>
		<category><![CDATA[Federal Contractor]]></category>
		<category><![CDATA[FedRAMP]]></category>
		<category><![CDATA[IT infrastructure]]></category>
		<category><![CDATA[mitre att&ck]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[ransomware attacks]]></category>
		<category><![CDATA[Security Technical Implementation Guide]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[stig policy]]></category>
		<category><![CDATA[system hardening]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=82445</guid>

					<description><![CDATA[It’s fall. The federal government is in the 4th quarter at the 2-minute warning. Ransomware has the ball and is heading down the field. Will your defense be strong enough to hold? In their Ransomware Guide, the Cybersecurity &#38; Infrastructure Security Agency (CISA) defines ransomware as “a form of malware designed to encrypt files on ...]]></description>
		
		
		
			</item>
	</channel>
</rss>
