<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:media="http://search.yahoo.com/mrss/" >

<channel>
	<title>secure baselines &#8211; SteelCloud</title>
	<atom:link href="https://www.steelcloud.com/tag/secure-baselines/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.steelcloud.com</link>
	<description></description>
	<lastBuildDate>Mon, 30 Mar 2026 18:44:33 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.steelcloud.com/wp-content/uploads/favicon.png</url>
	<title>secure baselines &#8211; SteelCloud</title>
	<link>https://www.steelcloud.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>10 Reasons to Automate STIG Compliance (Datasheet)</title>
		<link>https://www.steelcloud.com/10-reasons-to-automate-stig-compliance-datasheet/</link>
		
		<dc:creator><![CDATA[Stephanie Plona]]></dc:creator>
		<pubDate>Sun, 30 Nov 2025 18:49:07 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Collaterals]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Automated STIG Compliance]]></category>
		<category><![CDATA[Automation]]></category>
		<category><![CDATA[datasheet]]></category>
		<category><![CDATA[scanning]]></category>
		<category><![CDATA[secure baselines]]></category>
		<category><![CDATA[STIG]]></category>
		<category><![CDATA[STIG automation]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=88825</guid>

					<description><![CDATA[10 Reasons to Automate STIG Compliance Say goodbye to the frustrations of traditional, manual STIG compliance and embrace a future of automation that improves quality, consistency, and delivers an immediate return on investment. Download the datasheet now!]]></description>
		
		
		
			</item>
		<item>
		<title>Data Sheet: ConfigOS MPO Forge Policy Workbench</title>
		<link>https://www.steelcloud.com/data-sheet-configos-mpo-forge-technology/</link>
		
		<dc:creator><![CDATA[Stephanie Plona]]></dc:creator>
		<pubDate>Sun, 16 Nov 2025 17:17:11 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Collaterals]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[ConfigOS MPO]]></category>
		<category><![CDATA[Forge]]></category>
		<category><![CDATA[policy workbench]]></category>
		<category><![CDATA[secure baselines]]></category>
		<category><![CDATA[system hardening]]></category>
		<category><![CDATA[technology]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=90167</guid>

					<description><![CDATA[ConfigOS MPO Forge Data Sheet Forge is a graphical policy workbench within the ConfigOS MPO software that enables creation of custom policies and the deployment of policy collections. Learn more about this powerful technology in our new data sheet! Click Here to Download]]></description>
		
		
		
			</item>
		<item>
		<title>Supply Chains are More Secure when Built on Zero Trust</title>
		<link>https://www.steelcloud.com/supply-chains-are-more-secure-when-built-on-zero-trust/</link>
		
		<dc:creator><![CDATA[Stephanie Plona]]></dc:creator>
		<pubDate>Mon, 19 Feb 2024 19:17:45 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[CIS]]></category>
		<category><![CDATA[CMMC]]></category>
		<category><![CDATA[compliance automation]]></category>
		<category><![CDATA[EO 14028]]></category>
		<category><![CDATA[secure baselines]]></category>
		<category><![CDATA[Secure Supply Chain]]></category>
		<category><![CDATA[software supply chain]]></category>
		<category><![CDATA[STIG]]></category>
		<category><![CDATA[Zero Trust]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=89042</guid>

					<description><![CDATA[Supply Chains are More Secure when Built on Zero Trust &#160; In 2022, a study on supply chain risks indicated that more than half of organizational cybersecurity breaches happen via third-party vendors. Statistics like this, in addition to recent high-profile breaches,  prompted the President of the United States to issue Executive Order (EO) 14028 to ...]]></description>
		
		
		
			</item>
		<item>
		<title>Hardening your IOT Infrastructure &#8211; EIS Webinar with SteelCloud</title>
		<link>https://www.steelcloud.com/hardening-your-iot-infrastructure-eis-webinar-with-steelcloud/</link>
		
		<dc:creator><![CDATA[Stephanie Plona]]></dc:creator>
		<pubDate>Sat, 25 Nov 2023 21:45:35 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Webinars]]></category>
		<category><![CDATA[Automation]]></category>
		<category><![CDATA[CIS Benchmarks]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[Energy]]></category>
		<category><![CDATA[highly regulated industries]]></category>
		<category><![CDATA[IT]]></category>
		<category><![CDATA[oil and gas]]></category>
		<category><![CDATA[operational technology]]></category>
		<category><![CDATA[OT]]></category>
		<category><![CDATA[remediation]]></category>
		<category><![CDATA[secure baselines]]></category>
		<category><![CDATA[STIG]]></category>
		<category><![CDATA[system hardening]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=88850</guid>

					<description><![CDATA[Hardening your IOT Infrastructure &#8211; EIS Webinar with SteelCloud Discover the benefits of system hardening for IOT infrastructure and cybersecurity. In 2022 alone, there were 5 billion malware attacks, 139 million cryptojacking attacks, 112 million IoT malware attacks and 6.3 trillion intrusion attempts globally. Join Enhanced Information Solutions (EIS) Cyber and SteelCloud LLC for a ...]]></description>
		
		
		
		<media:content url="https://www.youtube.com/embed/8J9DSlKseu8" medium="video" width="1280" height="720">
			<media:player url="https://www.youtube.com/embed/8J9DSlKseu8" />
			<media:title type="plain">Hardening your IOT Infrastructure - EIS Webinar with SteelCloud</media:title>
			<media:description type="html"><![CDATA[Discover the benefits of system hardening for #IOT infrastructure and #Cybersecurity.In 2022 alone, there were 5 billion malware attacks, 139 million cryptoj...]]></media:description>
			<media:thumbnail url="https://www.steelcloud.com/wp-content/uploads/hardening-your-iot-infrastructur.jpg" />
			<media:rating scheme="urn:simple">nonadult</media:rating>
		</media:content>
	</item>
		<item>
		<title>Automating Security Configuration Management: The Time to Hesitate is Over</title>
		<link>https://www.steelcloud.com/automating-security-configuration-management-the-time-to-hesitate-is-over/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Fri, 10 Dec 2021 17:45:07 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Automated STIG Compliance]]></category>
		<category><![CDATA[automating security configuration management]]></category>
		<category><![CDATA[CIS security benchmarks]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[cyber hardening]]></category>
		<category><![CDATA[DFARS]]></category>
		<category><![CDATA[endpoint security]]></category>
		<category><![CDATA[FedRAMP]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[secure baselines]]></category>
		<category><![CDATA[security podcast]]></category>
		<category><![CDATA[STIG CIS controls]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=82800</guid>

					<description><![CDATA[Security configuration management and resistance to change simplified by automating security configuration management with automation. From the Ford Mustang and Dodge Challenger to the Cadillac Coupe De Ville, American cars were admired back in the 1970s. They were manufactured as they had always been—cars would come off the manufacturing line and be full of defects ...]]></description>
		
		
		
			</item>
	</channel>
</rss>
