<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:media="http://search.yahoo.com/mrss/" >

<channel>
	<title>secure &#8211; SteelCloud</title>
	<atom:link href="https://www.steelcloud.com/tag/secure/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.steelcloud.com</link>
	<description></description>
	<lastBuildDate>Mon, 25 Aug 2025 19:29:49 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.steelcloud.com/wp-content/uploads/favicon.png</url>
	<title>secure &#8211; SteelCloud</title>
	<link>https://www.steelcloud.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Outpacing the Threat: Accelerate RMF and ATO Readiness Through Automation</title>
		<link>https://www.steelcloud.com/the-urgency-of-action-rmf-and-ato-readiness-through-automation/</link>
		
		<dc:creator><![CDATA[Stephanie Plona]]></dc:creator>
		<pubDate>Mon, 17 Jun 2024 12:28:31 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Action]]></category>
		<category><![CDATA[ATO]]></category>
		<category><![CDATA[Automation]]></category>
		<category><![CDATA[cATO]]></category>
		<category><![CDATA[Compliance]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[Continuous Compliance]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[cyberworkforce]]></category>
		<category><![CDATA[DoD]]></category>
		<category><![CDATA[eMASS]]></category>
		<category><![CDATA[Mission]]></category>
		<category><![CDATA[NIST RMF]]></category>
		<category><![CDATA[NIST SP 800-53]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[RMF]]></category>
		<category><![CDATA[secure]]></category>
		<category><![CDATA[SIEM]]></category>
		<category><![CDATA[STIG]]></category>
		<category><![CDATA[systems]]></category>
		<category><![CDATA[Urgency]]></category>
		<category><![CDATA[Xacta]]></category>
		<category><![CDATA[Zero Trust]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=88335</guid>

					<description><![CDATA[Outpacing the Threat: Accelerate RMF and ATO Readiness Through Automation There are two paths to gaining your RMF accreditation and achieving ATO—the traditional way where you throw money and manpower at it for weeks on end, and the ConfigOS automated compliance way where you dramatically reduce your risks, effort and costs. Technology and bad actors ...]]></description>
		
		
		
			</item>
		<item>
		<title>Outpacing the Threat: Staying Mission Aligned</title>
		<link>https://www.steelcloud.com/the-urgency-of-action-staying-mission-aligned/</link>
		
		<dc:creator><![CDATA[Stephanie Plona]]></dc:creator>
		<pubDate>Mon, 03 Jun 2024 14:17:34 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Action]]></category>
		<category><![CDATA[Automation]]></category>
		<category><![CDATA[Compliance]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[Continuous Compliance]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[cyberworkforce]]></category>
		<category><![CDATA[Dashview]]></category>
		<category><![CDATA[disa]]></category>
		<category><![CDATA[DoD]]></category>
		<category><![CDATA[drift]]></category>
		<category><![CDATA[Executive Order]]></category>
		<category><![CDATA[Mission]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[secure]]></category>
		<category><![CDATA[SIEM]]></category>
		<category><![CDATA[STIG]]></category>
		<category><![CDATA[systems]]></category>
		<category><![CDATA[Urgency]]></category>
		<category><![CDATA[Zero Trust]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=88213</guid>

					<description><![CDATA[Outpacing the Threat: Staying Mission Aligned Continuous STIG Compliance Keeps Systems Mission Aligned One of today’s most sure-fire—and challenging—ways to protect our nation’s sensitive data is STIG compliance. Security Technical Implementation Guides (STIGs) identify areas of critical technology that are vulnerable to attack so they can be hardened. In a time of increasingly sophisticated ransomware ...]]></description>
		
		
		
			</item>
		<item>
		<title>VIDEO: Confronting the Realities of a Remote/Hybrid Workforce in Cybersecurity</title>
		<link>https://www.steelcloud.com/video-confronting-the-realities-of-a-remote-hybrid-workforce-in-cybersecurity/</link>
		
		<dc:creator><![CDATA[Stephanie Plona]]></dc:creator>
		<pubDate>Wed, 05 Jul 2023 18:32:21 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Videos]]></category>
		<category><![CDATA[Automation]]></category>
		<category><![CDATA[Compliance]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[ConfigOS MPO]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[disa]]></category>
		<category><![CDATA[federal government]]></category>
		<category><![CDATA[hybrid workforce]]></category>
		<category><![CDATA[remote workforce]]></category>
		<category><![CDATA[secure]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=88540</guid>

					<description><![CDATA[Watch Now: Confronting the Realities of a Remote/Hybrid Workforce in Cybersecurity The recent rise of a remote and hybrid cybersecurity workforce presents a significant challenge to compliance operations. As more employees work remotely, their workstations may not always be connected to the organization’s network or users are connected to a slow network which makes it ...]]></description>
		
		
		
		<media:content url="https://www.youtube.com/embed/E2k6SCq3cII" medium="video" width="1280" height="720">
			<media:player url="https://www.youtube.com/embed/E2k6SCq3cII" />
			<media:title type="plain">CCRI Inspections: What You Should Know</media:title>
			<media:description type="html"><![CDATA[The goal of the DISA CCRI program is to protect sensitive Department of Defense data and networks from cyberattack. Inspections are often scheduled with just...]]></media:description>
			<media:thumbnail url="https://www.steelcloud.com/wp-content/uploads/ccri-inspections-what-you-should.jpg" />
			<media:rating scheme="urn:simple">nonadult</media:rating>
		</media:content>
	</item>
		<item>
		<title>VIDEO: CORA Inspections: What You Should Know</title>
		<link>https://www.steelcloud.com/video-ccri-inspections/</link>
		
		<dc:creator><![CDATA[Stephanie Plona]]></dc:creator>
		<pubDate>Fri, 30 Jun 2023 18:10:40 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Videos]]></category>
		<category><![CDATA[Automation]]></category>
		<category><![CDATA[CCRI]]></category>
		<category><![CDATA[Command Cyber Readiness Inspection]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[CORA]]></category>
		<category><![CDATA[CUI]]></category>
		<category><![CDATA[disa]]></category>
		<category><![CDATA[federal government]]></category>
		<category><![CDATA[secure]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=88532</guid>

					<description><![CDATA[Watch Now: CORA Inspections: What You Should Know The goal of the DISA CORA (formerly known as CCRI) program is to protect sensitive Department of Defense data and networks from cyberattack. Inspections are often scheduled with just a month or two notice—not nearly enough time to scramble and shore up neglected cyber and physical assets, ...]]></description>
		
		
		
		<media:content url="https://www.youtube.com/embed/GrE_pPMLuRY" medium="video" width="1280" height="720">
			<media:player url="https://www.youtube.com/embed/GrE_pPMLuRY" />
			<media:title type="plain">Securing the Software Supply Chain</media:title>
			<media:description type="html"><![CDATA[Gartner predicts that, by 2025, 45% of organizations worldwide will have experienced attacks on their software supply chains. That is a three-fold increase s...]]></media:description>
			<media:thumbnail url="https://www.steelcloud.com/wp-content/uploads/securing-the-software-supply-cha.jpg" />
			<media:rating scheme="urn:simple">nonadult</media:rating>
		</media:content>
	</item>
		<item>
		<title>Securing the Software Supply Chain 101</title>
		<link>https://www.steelcloud.com/securing-the-software-supply-chain-101/</link>
		
		<dc:creator><![CDATA[Stephanie Plona]]></dc:creator>
		<pubDate>Tue, 27 Jun 2023 15:24:05 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Automation]]></category>
		<category><![CDATA[CMMC 2.0]]></category>
		<category><![CDATA[CUI]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[EO]]></category>
		<category><![CDATA[mission-critical software]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[SBOM]]></category>
		<category><![CDATA[secure]]></category>
		<category><![CDATA[software supply chain]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=88520</guid>

					<description><![CDATA[Securing the Software Supply Chain 101 Class is now in session. CUI. SBOM. NIST. Executive orders. Critical software. Mix them all together and you’ve got a more secure supply chain. But it’s all just a mishmash of words until you know what they mean. A supply chain attack happens when someone infiltrates your system through ...]]></description>
		
		
		
			</item>
		<item>
		<title>VIDEO: Securing the Software Supply Chain</title>
		<link>https://www.steelcloud.com/video-securing-the-software-supply-chain/</link>
		
		<dc:creator><![CDATA[Stephanie Plona]]></dc:creator>
		<pubDate>Mon, 19 Jun 2023 15:51:00 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Videos]]></category>
		<category><![CDATA[CMMC 2.0]]></category>
		<category><![CDATA[CUI]]></category>
		<category><![CDATA[federal government]]></category>
		<category><![CDATA[secure]]></category>
		<category><![CDATA[software supply chain]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=88500</guid>

					<description><![CDATA[Watch Now: Securing the Software Supply Chain Gartner predicts that, by 2025, 45% of organizations worldwide will have experienced attacks on their software supply chains. That is a three-fold increase since 2021. Meanwhile, the government is issuing mandates attached to CMMC certification within their own supply chain to protect controlled unclassified information (CUI). Things are ...]]></description>
		
		
		
		<media:content url="https://www.youtube.com/embed/GrE_pPMLuRY" medium="video" width="1280" height="720">
			<media:player url="https://www.youtube.com/embed/GrE_pPMLuRY" />
			<media:title type="plain">Securing the Software Supply Chain</media:title>
			<media:description type="html"><![CDATA[Gartner predicts that, by 2025, 45% of organizations worldwide will have experienced attacks on their software supply chains. That is a three-fold increase s...]]></media:description>
			<media:thumbnail url="https://www.steelcloud.com/wp-content/uploads/securing-the-software-supply-cha.jpg" />
			<media:rating scheme="urn:simple">nonadult</media:rating>
		</media:content>
	</item>
		<item>
		<title>Mental Health in Cybersecurity: Emotional Intelligence</title>
		<link>https://www.steelcloud.com/mental-health-in-cybersecurity-emotional-intelligence/</link>
		
		<dc:creator><![CDATA[Stephanie Plona]]></dc:creator>
		<pubDate>Tue, 23 May 2023 15:12:29 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Artificial Intelligence]]></category>
		<category><![CDATA[Automated STIG Compliance]]></category>
		<category><![CDATA[Automation]]></category>
		<category><![CDATA[compliance automation]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[Continuous Compliance]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[cyberworkforce]]></category>
		<category><![CDATA[Emotional Intelligence]]></category>
		<category><![CDATA[Mental Health]]></category>
		<category><![CDATA[Mental Health Awareness Month]]></category>
		<category><![CDATA[Partnership]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[secure]]></category>
		<category><![CDATA[Service Dogs]]></category>
		<category><![CDATA[stress]]></category>
		<category><![CDATA[Veterans Moving Forward]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=88452</guid>

					<description><![CDATA[Mental Health in Cybersecurity: Emotional Intelligence There is no dispute about the relevance of intelligence in the workplace. A person with a high intelligence quotient (IQ) is thought to process information more efficiently and draw better conclusions. But in the 1990s, a new measurement came into vogue and it is widely considered as important—if not ...]]></description>
		
		
		
			</item>
		<item>
		<title>Mental Health in Cybersecurity: How to Find Help</title>
		<link>https://www.steelcloud.com/mental-health-in-cybersecurity-how-to-find-help/</link>
		
		<dc:creator><![CDATA[Stephanie Plona]]></dc:creator>
		<pubDate>Tue, 16 May 2023 18:00:47 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Anxiety]]></category>
		<category><![CDATA[Automated STIG Compliance]]></category>
		<category><![CDATA[Automation]]></category>
		<category><![CDATA[burnout]]></category>
		<category><![CDATA[CIS Compliance]]></category>
		<category><![CDATA[Compliance]]></category>
		<category><![CDATA[compliance automation]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[Continuous Compliance]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[cyberworkforce]]></category>
		<category><![CDATA[Mental Health]]></category>
		<category><![CDATA[Mental Health Awareness Month]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[secure]]></category>
		<category><![CDATA[STIG]]></category>
		<category><![CDATA[STIG and CIS Compliance]]></category>
		<category><![CDATA[STIG and CIS compliance automation]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[stress]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=88443</guid>

					<description><![CDATA[Mental Health in Cybersecurity: How to Find Help It’s time to get real about cybersecurity and mental health. If you’ve ever been hacked on a personal device, you know how anxiety-provoking it can be. The hackers have access to your data. They are probably trying to phish people on your contact list. And you are ...]]></description>
		
		
		
			</item>
		<item>
		<title>Mental Health in Cybersecurity: Combating Burnout</title>
		<link>https://www.steelcloud.com/mental-health-in-cybersecurity-combating-burnout/</link>
		
		<dc:creator><![CDATA[Stephanie Plona]]></dc:creator>
		<pubDate>Tue, 09 May 2023 16:25:50 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Anxiety]]></category>
		<category><![CDATA[Automated STIG Compliance]]></category>
		<category><![CDATA[Automation]]></category>
		<category><![CDATA[burnout]]></category>
		<category><![CDATA[CIS Compliance]]></category>
		<category><![CDATA[Compliance]]></category>
		<category><![CDATA[compliance automation]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[Continuous Compliance]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[cyberworkforce]]></category>
		<category><![CDATA[Mental Health]]></category>
		<category><![CDATA[Mental Health Awareness Month]]></category>
		<category><![CDATA[NIST RMF]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[RMF]]></category>
		<category><![CDATA[secure]]></category>
		<category><![CDATA[STIG]]></category>
		<category><![CDATA[STIG and CIS Compliance]]></category>
		<category><![CDATA[STIG and CIS compliance automation]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[stress]]></category>
		<category><![CDATA[Zero Trust]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=88427</guid>

					<description><![CDATA[Mental Health in Cybersecurity: Combating Burnout From Increased Stress to Burnout: Understanding the Impact of Cybersecurity Workforce Mental Health and How Automation Can Help If you thought about the major threat to your cybersecurity team, you might think it’s the daily toll of battling ransomware. Or the cyber workforce shortage. Or maybe it’s inefficient work ...]]></description>
		
		
		
			</item>
		<item>
		<title>Mental Health and the Cybersecurity Profession</title>
		<link>https://www.steelcloud.com/mental-health-and-the-cybersecurity-profession/</link>
		
		<dc:creator><![CDATA[Stephanie Plona]]></dc:creator>
		<pubDate>Tue, 02 May 2023 16:13:59 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Action]]></category>
		<category><![CDATA[Anxiety]]></category>
		<category><![CDATA[Automated STIG Compliance]]></category>
		<category><![CDATA[Automation]]></category>
		<category><![CDATA[CIS]]></category>
		<category><![CDATA[CIS Compliance]]></category>
		<category><![CDATA[Compliance]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[Continuous Compliance]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[cyberworkforce]]></category>
		<category><![CDATA[DoD]]></category>
		<category><![CDATA[Mental Health]]></category>
		<category><![CDATA[Mental Health Awareness Month]]></category>
		<category><![CDATA[NIST RMF]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[RMF]]></category>
		<category><![CDATA[secure]]></category>
		<category><![CDATA[STIG]]></category>
		<category><![CDATA[STIG and CIS Compliance]]></category>
		<category><![CDATA[STIG and CIS compliance automation]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[systems]]></category>
		<category><![CDATA[Zero Trust]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=88421</guid>

					<description><![CDATA[Mental Health and the Cybersecurity Profession Mental health may be cybersecurity’s biggest challenge. Globally, anxiety and depression account for 12 million missed workdays and $1 trillion in lost productivity. Dial down specifically into the tech sector and, according to a 2017 report, 46% of employees have a mental health disorder and 99% have been diagnosed ...]]></description>
		
		
		
			</item>
	</channel>
</rss>
