<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:media="http://search.yahoo.com/mrss/" >

<channel>
	<title>SBOM &#8211; SteelCloud</title>
	<atom:link href="https://www.steelcloud.com/tag/sbom/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.steelcloud.com</link>
	<description></description>
	<lastBuildDate>Mon, 25 Aug 2025 19:50:21 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.steelcloud.com/wp-content/uploads/favicon.png</url>
	<title>SBOM &#8211; SteelCloud</title>
	<link>https://www.steelcloud.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>WEBINAR: Confessions of a Software Supply Chain Participant</title>
		<link>https://www.steelcloud.com/webinar-confessions-of-a-software-supply-chain-participant/</link>
		
		<dc:creator><![CDATA[Stephanie Plona]]></dc:creator>
		<pubDate>Wed, 13 Mar 2024 17:06:40 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Webinars]]></category>
		<category><![CDATA[ATO]]></category>
		<category><![CDATA[CMMC]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[Pen Testing]]></category>
		<category><![CDATA[RMF]]></category>
		<category><![CDATA[SBOM]]></category>
		<category><![CDATA[software supply chain]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[supply chain security]]></category>
		<category><![CDATA[webinar]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=89096</guid>

					<description><![CDATA[WEBINAR: Confessions of a Software Supply Chain Participant Things are coming to a head within the federal supply chain as cyber-attacks become increasingly more common and sophisticated. Join Brian Hajost, SteelCloud’s COO and active contributor to AFCEA’s Secure Supply Chain subcommittee, as he helps you strategize your cyber response. Expectations: What should the government expect ...]]></description>
		
		
		
		<media:content url="https://www.youtube.com/embed/1PkeM8-YJh4" medium="video" width="1280" height="720">
			<media:player url="https://www.youtube.com/embed/1PkeM8-YJh4" />
			<media:title type="plain">Confessions of a Software Supply Chain Participant - Webinar Replay</media:title>
			<media:description type="html"><![CDATA[Things are coming to a head within the federal supply chain (and, frankly, every other supply chain) as cyber-attacks become increasingly more common and sop...]]></media:description>
			<media:thumbnail url="https://www.steelcloud.com/wp-content/uploads/confessions-of-a-software-supply.jpg" />
			<media:rating scheme="urn:simple">nonadult</media:rating>
		</media:content>
	</item>
		<item>
		<title>eBook: Securing the Software Supply Chain</title>
		<link>https://www.steelcloud.com/ebook-securing-the-software-supply-chain/</link>
		
		<dc:creator><![CDATA[Stephanie Plona]]></dc:creator>
		<pubDate>Tue, 27 Feb 2024 18:32:33 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[eBooks]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[critical software]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[eBook]]></category>
		<category><![CDATA[SBOM]]></category>
		<category><![CDATA[securing the software supply chain]]></category>
		<category><![CDATA[software bill of materials]]></category>
		<category><![CDATA[supply chain security]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=89055</guid>

					<description><![CDATA[eBook: Securing the Software Supply Chain &#160; If you want to be or stay part of the federal software supply chain, the rules of engagement have changed drastically over the past few years. Dive into this free eBook resource, &#8220;Securing the Software Supply Chain&#8221; and discover: Compliance Requirements in the Supply Chain Conducting A Risk ...]]></description>
		
		
		
			</item>
		<item>
		<title>Assessing Risk in the Government Software Supply Chain</title>
		<link>https://www.steelcloud.com/assessing-risk-in-the-government-software-supply-chain/</link>
		
		<dc:creator><![CDATA[Stephanie Plona]]></dc:creator>
		<pubDate>Tue, 06 Feb 2024 15:42:04 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[critical software]]></category>
		<category><![CDATA[EO 14028]]></category>
		<category><![CDATA[nist 800-53]]></category>
		<category><![CDATA[risk assesment]]></category>
		<category><![CDATA[SBOM]]></category>
		<category><![CDATA[secure configuration management]]></category>
		<category><![CDATA[securing the software supply chain]]></category>
		<category><![CDATA[software supply chain]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=89027</guid>

					<description><![CDATA[Assessing Risk in the Government&#8217;s Software Supply Chain &#160; Critical elements of a risk assessment. &#160; In 2020, hackers found their way into the back door of an IT performance monitoring solution called Orion, made by SolarWinds. And through this breach, the 30,000 organizations that used the Orion solution became vulnerable. More than 18,000 customers ...]]></description>
		
		
		
			</item>
		<item>
		<title>2023 Top Videos</title>
		<link>https://www.steelcloud.com/2023-top-videos/</link>
		
		<dc:creator><![CDATA[Stephanie Plona]]></dc:creator>
		<pubDate>Wed, 27 Dec 2023 16:09:28 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Videos]]></category>
		<category><![CDATA[CBOM]]></category>
		<category><![CDATA[CCRI]]></category>
		<category><![CDATA[CIS Benchmarks]]></category>
		<category><![CDATA[Continuous Compliance]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Executive Order]]></category>
		<category><![CDATA[remote/hybrid workforce]]></category>
		<category><![CDATA[SBOM]]></category>
		<category><![CDATA[STIG automation]]></category>
		<category><![CDATA[VMF]]></category>
		<category><![CDATA[Zero Trust]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=88924</guid>

					<description><![CDATA[2023 Top Videos &#160; Watch the videos by SteelCloud and Cyber Security TV that clarified some of the murkiest topics surrounding cybersecurity compliance in 2023 (and one bonus feel-good video!). &#160; 1.  CCRI Inspections: What You Should Know 2.  Confronting the Realities of a Remote/Hybrid Workforce in Cybersecurity 3.   Securing the Software Supply Chain 4.  ...]]></description>
		
		
		
			</item>
		<item>
		<title>Securing the Software Supply Chain 101</title>
		<link>https://www.steelcloud.com/securing-the-software-supply-chain-101/</link>
		
		<dc:creator><![CDATA[Stephanie Plona]]></dc:creator>
		<pubDate>Tue, 27 Jun 2023 15:24:05 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Automation]]></category>
		<category><![CDATA[CMMC 2.0]]></category>
		<category><![CDATA[CUI]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[EO]]></category>
		<category><![CDATA[mission-critical software]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[SBOM]]></category>
		<category><![CDATA[secure]]></category>
		<category><![CDATA[software supply chain]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=88520</guid>

					<description><![CDATA[Securing the Software Supply Chain 101 Class is now in session. CUI. SBOM. NIST. Executive orders. Critical software. Mix them all together and you’ve got a more secure supply chain. But it’s all just a mishmash of words until you know what they mean. A supply chain attack happens when someone infiltrates your system through ...]]></description>
		
		
		
			</item>
		<item>
		<title>VIDEO: What is a CBOM?</title>
		<link>https://www.steelcloud.com/video-what-is-a-cbom/</link>
		
		<dc:creator><![CDATA[Stephanie Plona]]></dc:creator>
		<pubDate>Wed, 14 Jun 2023 16:04:19 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Videos]]></category>
		<category><![CDATA[ATO]]></category>
		<category><![CDATA[CBOM]]></category>
		<category><![CDATA[Compliance Bill of Materials]]></category>
		<category><![CDATA[cybersecurity executive order]]></category>
		<category><![CDATA[RMF]]></category>
		<category><![CDATA[SBOM]]></category>
		<category><![CDATA[software bill of materials]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=88489</guid>

					<description><![CDATA[Video: What is a CBOM? In today’s complex digital technology landscape there is an ever-evolving threat that requires securing and protecting critical infrastructure, information, and assets. Several initiatives are under way throughout the Government to support the presidential Executive Order on Improving the Nation’s Cybersecurity which includes implementing a zero-trust framework and providing greater visibility ...]]></description>
		
		
		
		<media:content url="https://www.youtube.com/embed/a6-7qtgP-RQ" medium="video" width="1280" height="720">
			<media:player url="https://www.youtube.com/embed/a6-7qtgP-RQ" />
			<media:title type="plain">What is a CBOM?</media:title>
			<media:description type="html"><![CDATA[In today’s complex digital technology landscape there is an ever-evolving threat that requires securing and protecting critical infrastructure, information, ...]]></media:description>
			<media:thumbnail url="https://www.steelcloud.com/wp-content/uploads/what-is-a-cbom.jpg" />
			<media:rating scheme="urn:simple">nonadult</media:rating>
		</media:content>
	</item>
		<item>
		<title>CBOM: Bridging the Gap Between Authorization and Operations</title>
		<link>https://www.steelcloud.com/cbom-bridging-the-gap-between-authorization-and-operations/</link>
		
		<dc:creator><![CDATA[Stephanie Plona]]></dc:creator>
		<pubDate>Wed, 24 May 2023 15:22:47 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[ATO]]></category>
		<category><![CDATA[cATO]]></category>
		<category><![CDATA[CBOM]]></category>
		<category><![CDATA[CMMC]]></category>
		<category><![CDATA[Compliance]]></category>
		<category><![CDATA[Compliance Bill of Materials]]></category>
		<category><![CDATA[CUI]]></category>
		<category><![CDATA[EO]]></category>
		<category><![CDATA[Executive Order]]></category>
		<category><![CDATA[nist 800-53]]></category>
		<category><![CDATA[RMF]]></category>
		<category><![CDATA[SBOM]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[software bill of materials]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=88463</guid>

					<description><![CDATA[CBOM: Bridging the Gap Between Authorization and Operations Everyone in the cybersecurity field knows what a software bill of materials (SBOM) is. Mandated by the President’s Executive Order on Improving Our Nation’s Security the SBOM is intended to enhance supply chain security. Like the ingredients list on a bag of processed snacks, the SBOM is ...]]></description>
		
		
		
			</item>
		<item>
		<title>Securing the Federal Software Supply Chain Webinar</title>
		<link>https://www.steelcloud.com/securing-the-federal-software-supply-chain-webinar/</link>
		
		<dc:creator><![CDATA[Stephanie Plona]]></dc:creator>
		<pubDate>Thu, 11 May 2023 19:04:18 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Webinars]]></category>
		<category><![CDATA[Automation]]></category>
		<category><![CDATA[CMMC]]></category>
		<category><![CDATA[CMMC 2.0]]></category>
		<category><![CDATA[Controlled Unclassified Information]]></category>
		<category><![CDATA[CUI]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[DIB]]></category>
		<category><![CDATA[Executive Order]]></category>
		<category><![CDATA[SBOM]]></category>
		<category><![CDATA[software bill of materials]]></category>
		<category><![CDATA[software supply chain]]></category>
		<category><![CDATA[webinar]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=88432</guid>

					<description><![CDATA[Securing the Federal Software Supply Chain Webinar Gartner predicts that, by 2025, 45% of organizations worldwide will have experienced attacks on their software supply chains. That is a three-fold increase since 2021. Meanwhile, the government is issuing mandates attached to CMMC certification within their own supply chain to protect controlled unclassified information (CUI). Things are ...]]></description>
		
		
		
		<media:content url="https://www.youtube.com/embed/2q76bVW1WgM" medium="video" width="960" height="720">
			<media:player url="https://www.youtube.com/embed/2q76bVW1WgM" />
			<media:title type="plain">Securing the Federal Software Supply Chain</media:title>
			<media:description type="html"><![CDATA[Things are coming to a head within the federal supply chain as cyber-attacks become increasingly more common and sophisticated. Join SteelCloud’s COO Brian H...]]></media:description>
			<media:thumbnail url="https://www.steelcloud.com/wp-content/uploads/securing-the-federal-software-su.jpg" />
			<media:rating scheme="urn:simple">nonadult</media:rating>
		</media:content>
	</item>
		<item>
		<title>SBOM: Rebuild Security Compliance with Automation</title>
		<link>https://www.steelcloud.com/sbom-rebuild-security-compliance-with-automation/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Mon, 21 Nov 2022 15:25:53 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[CBOM]]></category>
		<category><![CDATA[compliance automation]]></category>
		<category><![CDATA[endpoint security software]]></category>
		<category><![CDATA[hardening environment]]></category>
		<category><![CDATA[SBOM]]></category>
		<category><![CDATA[Security Technical Implementation Guide STIG]]></category>
		<category><![CDATA[software bill of materials]]></category>
		<category><![CDATA[system level control]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=87696</guid>

					<description><![CDATA[Understanding SBOM “Software Bill of Materials” and lower-level controls. Throughout the government, several initiatives are underway to support the presidential Executive Order on Improving the Nation’s Cybersecurity issued in May 2021. This order includes implementing a zero-trust framework and providing greater visibility into application vulnerabilities through a Software Bill of Materials (SBOM) that identifies third-party and open-source components in the codebase.  ...]]></description>
		
		
		
			</item>
		<item>
		<title>CBOM: Automating Zero-Defect Compliance at Scale</title>
		<link>https://www.steelcloud.com/cbom-automating-zero-defect-compliance-at-scale/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Mon, 24 Oct 2022 20:23:13 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Webinars]]></category>
		<category><![CDATA[ATO]]></category>
		<category><![CDATA[automated compliance]]></category>
		<category><![CDATA[Automated STIG Compliance]]></category>
		<category><![CDATA[CBOM]]></category>
		<category><![CDATA[Compliance Bill of Materials]]></category>
		<category><![CDATA[cyber hardening]]></category>
		<category><![CDATA[Disa STIG]]></category>
		<category><![CDATA[DLT]]></category>
		<category><![CDATA[DoD]]></category>
		<category><![CDATA[drift]]></category>
		<category><![CDATA[enterprise infrastructure]]></category>
		<category><![CDATA[explicit compliance]]></category>
		<category><![CDATA[Implicit compliance]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[Risk Management Framework]]></category>
		<category><![CDATA[SBOM]]></category>
		<category><![CDATA[software bill of materials]]></category>
		<category><![CDATA[splunk dashboards]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=87588</guid>

					<description><![CDATA[In today’s complex digital technology landscape there is an ever-evolving threat that requires securing and protecting critical infrastructure, information, and assets.  Several initiatives are under way throughout the Government to support the presidential Executive Order on Improving the Nation’s Cybersecurity which includes implementing a zero-trust framework and providing greater visibility into application vulnerabilities through the ...]]></description>
		
		
		
			</item>
	</channel>
</rss>
