<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:media="http://search.yahoo.com/mrss/" >

<channel>
	<title>software bill of materials &#8211; SteelCloud</title>
	<atom:link href="https://www.steelcloud.com/tag/software-bill-of-materials/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.steelcloud.com</link>
	<description></description>
	<lastBuildDate>Mon, 25 Aug 2025 19:50:21 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=7.0</generator>

<image>
	<url>https://www.steelcloud.com/wp-content/uploads/favicon.png</url>
	<title>software bill of materials &#8211; SteelCloud</title>
	<link>https://www.steelcloud.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>eBook: Securing the Software Supply Chain</title>
		<link>https://www.steelcloud.com/ebook-securing-the-software-supply-chain/</link>
		
		<dc:creator><![CDATA[Stephanie Plona]]></dc:creator>
		<pubDate>Tue, 27 Feb 2024 18:32:33 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[eBooks]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[critical software]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[eBook]]></category>
		<category><![CDATA[SBOM]]></category>
		<category><![CDATA[securing the software supply chain]]></category>
		<category><![CDATA[software bill of materials]]></category>
		<category><![CDATA[supply chain security]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=89055</guid>

					<description><![CDATA[eBook: Securing the Software Supply Chain &#160; If you want to be or stay part of the federal software supply chain, the rules of engagement have changed drastically over the past few years. Dive into this free eBook resource, &#8220;Securing the Software Supply Chain&#8221; and discover: Compliance Requirements in the Supply Chain Conducting A Risk ...]]></description>
		
		
		
			</item>
		<item>
		<title>eBook: Making Your Move to the Commercial Cloud</title>
		<link>https://www.steelcloud.com/ebook-making-your-move-to-the-commercial-cloud/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Tue, 24 Oct 2023 11:05:43 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[eBooks]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[ATO]]></category>
		<category><![CDATA[Automated STIG Compliance]]></category>
		<category><![CDATA[CIS Benchmarks]]></category>
		<category><![CDATA[cloud migration]]></category>
		<category><![CDATA[CMMC]]></category>
		<category><![CDATA[commercial cloud]]></category>
		<category><![CDATA[FedRAMP]]></category>
		<category><![CDATA[modernization]]></category>
		<category><![CDATA[nist 800-171]]></category>
		<category><![CDATA[nist 800-53]]></category>
		<category><![CDATA[RMF]]></category>
		<category><![CDATA[Security Technical Implementation Guide STIG]]></category>
		<category><![CDATA[software bill of materials]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=86858</guid>

					<description><![CDATA[Increase your preparedness with continuous security monitoring and remediation. There are five reasons people are moving to the Cloud. SteelCloud focuses on “Preparedness”, helping customers move securely to the Cloud, implementing continuous STIG and CIS security monitoring, and increasing baseline security and consistency while significantly reducing time and effort. Our patented ConfigOS automation software makes ...]]></description>
		
		
		
			</item>
		<item>
		<title>VIDEO: What is a CBOM?</title>
		<link>https://www.steelcloud.com/video-what-is-a-cbom/</link>
		
		<dc:creator><![CDATA[Stephanie Plona]]></dc:creator>
		<pubDate>Wed, 14 Jun 2023 16:04:19 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Videos]]></category>
		<category><![CDATA[ATO]]></category>
		<category><![CDATA[CBOM]]></category>
		<category><![CDATA[Compliance Bill of Materials]]></category>
		<category><![CDATA[cybersecurity executive order]]></category>
		<category><![CDATA[RMF]]></category>
		<category><![CDATA[SBOM]]></category>
		<category><![CDATA[software bill of materials]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=88489</guid>

					<description><![CDATA[Video: What is a CBOM? In today’s complex digital technology landscape there is an ever-evolving threat that requires securing and protecting critical infrastructure, information, and assets. Several initiatives are under way throughout the Government to support the presidential Executive Order on Improving the Nation’s Cybersecurity which includes implementing a zero-trust framework and providing greater visibility ...]]></description>
		
		
		
		<media:content url="https://www.youtube.com/embed/a6-7qtgP-RQ" medium="video" width="1280" height="720">
			<media:player url="https://www.youtube.com/embed/a6-7qtgP-RQ" />
			<media:title type="plain">What is a CBOM?</media:title>
			<media:description type="html"><![CDATA[In today’s complex digital technology landscape there is an ever-evolving threat that requires securing and protecting critical infrastructure, information, ...]]></media:description>
			<media:thumbnail url="https://www.steelcloud.com/wp-content/uploads/what-is-a-cbom.jpg" />
			<media:rating scheme="urn:simple">nonadult</media:rating>
		</media:content>
	</item>
		<item>
		<title>CBOM: Bridging the Gap Between Authorization and Operations</title>
		<link>https://www.steelcloud.com/cbom-bridging-the-gap-between-authorization-and-operations/</link>
		
		<dc:creator><![CDATA[Stephanie Plona]]></dc:creator>
		<pubDate>Wed, 24 May 2023 15:22:47 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[ATO]]></category>
		<category><![CDATA[cATO]]></category>
		<category><![CDATA[CBOM]]></category>
		<category><![CDATA[CMMC]]></category>
		<category><![CDATA[Compliance]]></category>
		<category><![CDATA[Compliance Bill of Materials]]></category>
		<category><![CDATA[CUI]]></category>
		<category><![CDATA[EO]]></category>
		<category><![CDATA[Executive Order]]></category>
		<category><![CDATA[nist 800-53]]></category>
		<category><![CDATA[RMF]]></category>
		<category><![CDATA[SBOM]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[software bill of materials]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=88463</guid>

					<description><![CDATA[CBOM: Bridging the Gap Between Authorization and Operations Everyone in the cybersecurity field knows what a software bill of materials (SBOM) is. Mandated by the President’s Executive Order on Improving Our Nation’s Security the SBOM is intended to enhance supply chain security. Like the ingredients list on a bag of processed snacks, the SBOM is ...]]></description>
		
		
		
			</item>
		<item>
		<title>Securing the Federal Software Supply Chain Webinar</title>
		<link>https://www.steelcloud.com/securing-the-federal-software-supply-chain-webinar/</link>
		
		<dc:creator><![CDATA[Stephanie Plona]]></dc:creator>
		<pubDate>Thu, 11 May 2023 19:04:18 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Webinars]]></category>
		<category><![CDATA[Automation]]></category>
		<category><![CDATA[CMMC]]></category>
		<category><![CDATA[CMMC 2.0]]></category>
		<category><![CDATA[Controlled Unclassified Information]]></category>
		<category><![CDATA[CUI]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[DIB]]></category>
		<category><![CDATA[Executive Order]]></category>
		<category><![CDATA[SBOM]]></category>
		<category><![CDATA[software bill of materials]]></category>
		<category><![CDATA[software supply chain]]></category>
		<category><![CDATA[webinar]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=88432</guid>

					<description><![CDATA[Securing the Federal Software Supply Chain Webinar Gartner predicts that, by 2025, 45% of organizations worldwide will have experienced attacks on their software supply chains. That is a three-fold increase since 2021. Meanwhile, the government is issuing mandates attached to CMMC certification within their own supply chain to protect controlled unclassified information (CUI). Things are ...]]></description>
		
		
		
		<media:content url="https://www.youtube.com/embed/2q76bVW1WgM" medium="video" width="960" height="720">
			<media:player url="https://www.youtube.com/embed/2q76bVW1WgM" />
			<media:title type="plain">Securing the Federal Software Supply Chain</media:title>
			<media:description type="html"><![CDATA[Things are coming to a head within the federal supply chain as cyber-attacks become increasingly more common and sophisticated. Join SteelCloud’s COO Brian H...]]></media:description>
			<media:thumbnail url="https://www.steelcloud.com/wp-content/uploads/securing-the-federal-software-su.jpg" />
			<media:rating scheme="urn:simple">nonadult</media:rating>
		</media:content>
	</item>
		<item>
		<title>SBOM: Rebuild Security Compliance with Automation</title>
		<link>https://www.steelcloud.com/sbom-rebuild-security-compliance-with-automation/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Mon, 21 Nov 2022 15:25:53 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[CBOM]]></category>
		<category><![CDATA[compliance automation]]></category>
		<category><![CDATA[endpoint security software]]></category>
		<category><![CDATA[hardening environment]]></category>
		<category><![CDATA[SBOM]]></category>
		<category><![CDATA[Security Technical Implementation Guide STIG]]></category>
		<category><![CDATA[software bill of materials]]></category>
		<category><![CDATA[system level control]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=87696</guid>

					<description><![CDATA[Understanding SBOM “Software Bill of Materials” and lower-level controls. Throughout the government, several initiatives are underway to support the presidential Executive Order on Improving the Nation’s Cybersecurity issued in May 2021. This order includes implementing a zero-trust framework and providing greater visibility into application vulnerabilities through a Software Bill of Materials (SBOM) that identifies third-party and open-source components in the codebase.  ...]]></description>
		
		
		
			</item>
		<item>
		<title>CBOM: Automating Zero-Defect Compliance at Scale</title>
		<link>https://www.steelcloud.com/cbom-automating-zero-defect-compliance-at-scale/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Mon, 24 Oct 2022 20:23:13 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Webinars]]></category>
		<category><![CDATA[ATO]]></category>
		<category><![CDATA[automated compliance]]></category>
		<category><![CDATA[Automated STIG Compliance]]></category>
		<category><![CDATA[CBOM]]></category>
		<category><![CDATA[Compliance Bill of Materials]]></category>
		<category><![CDATA[cyber hardening]]></category>
		<category><![CDATA[Disa STIG]]></category>
		<category><![CDATA[DLT]]></category>
		<category><![CDATA[DoD]]></category>
		<category><![CDATA[drift]]></category>
		<category><![CDATA[enterprise infrastructure]]></category>
		<category><![CDATA[explicit compliance]]></category>
		<category><![CDATA[Implicit compliance]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[Risk Management Framework]]></category>
		<category><![CDATA[SBOM]]></category>
		<category><![CDATA[software bill of materials]]></category>
		<category><![CDATA[splunk dashboards]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=87588</guid>

					<description><![CDATA[In today’s complex digital technology landscape there is an ever-evolving threat that requires securing and protecting critical infrastructure, information, and assets.  Several initiatives are under way throughout the Government to support the presidential Executive Order on Improving the Nation’s Cybersecurity which includes implementing a zero-trust framework and providing greater visibility into application vulnerabilities through the ...]]></description>
		
		
		
			</item>
	</channel>
</rss>
