<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:media="http://search.yahoo.com/mrss/" >

<channel>
	<title>supply chain &#8211; SteelCloud</title>
	<atom:link href="https://www.steelcloud.com/tag/supply-chain/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.steelcloud.com</link>
	<description></description>
	<lastBuildDate>Mon, 25 Aug 2025 19:27:48 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.steelcloud.com/wp-content/uploads/favicon.png</url>
	<title>supply chain &#8211; SteelCloud</title>
	<link>https://www.steelcloud.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Top Cybersecurity Threats of 2025</title>
		<link>https://www.steelcloud.com/top-cybersecurity-threats-of-2025/</link>
		
		<dc:creator><![CDATA[Stephanie Plona]]></dc:creator>
		<pubDate>Tue, 14 Jan 2025 16:51:00 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[CIS Benchmarks]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[STIG]]></category>
		<category><![CDATA[supply chain]]></category>
		<category><![CDATA[threat mitigation]]></category>
		<category><![CDATA[threats]]></category>
		<category><![CDATA[Zero Trust]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=90050</guid>

					<description><![CDATA[4 Cybersecurity Threats to Have on Your Radar In 2025 If there’s one thing to know as we enter 2025, it’s that the bad guys are getting better and stronger. The statistics are daunting. In 2024, the costs of cybercrime were projected to be $9.5 trillion. From ransomware threats to phishing, the pace, number and ...]]></description>
		
		
		
			</item>
		<item>
		<title>Three Top 2025 Cybersecurity Resolutions</title>
		<link>https://www.steelcloud.com/resolutions-for-cybersecurity-success/</link>
		
		<dc:creator><![CDATA[Stephanie Plona]]></dc:creator>
		<pubDate>Tue, 07 Jan 2025 19:03:47 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[emergency plan]]></category>
		<category><![CDATA[incident response]]></category>
		<category><![CDATA[resolutions]]></category>
		<category><![CDATA[secured baselines]]></category>
		<category><![CDATA[software]]></category>
		<category><![CDATA[supply chain]]></category>
		<category><![CDATA[Zero Trust]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=90046</guid>

					<description><![CDATA[Three Resolutions for 2025 Cybersecurity Success A list of 2025 cybersecurity predictions is helpful for planning your year. But we think it’s more helpful to have a list of recommendations, priorities and resolutions. SteelCloud’s 2025 Resolutions for Cybersecurity Success list has only three items on it. There are plenty more initiatives to take on, but ...]]></description>
		
		
		
			</item>
		<item>
		<title>Resource Recap of 2024</title>
		<link>https://www.steelcloud.com/resource-recap-of-2024/</link>
		
		<dc:creator><![CDATA[Stephanie Plona]]></dc:creator>
		<pubDate>Mon, 09 Dec 2024 19:48:08 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Collaterals]]></category>
		<category><![CDATA[Automation]]></category>
		<category><![CDATA[CIS Benchmarks]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data sheet]]></category>
		<category><![CDATA[eBook]]></category>
		<category><![CDATA[education]]></category>
		<category><![CDATA[Higher Ed]]></category>
		<category><![CDATA[software]]></category>
		<category><![CDATA[STIG]]></category>
		<category><![CDATA[supply chain]]></category>
		<category><![CDATA[Zero Trust]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=89980</guid>

					<description><![CDATA[A Recap of 2024’s Best Cybersecurity Resources Each year, SteelCloud puts pen to paper with our thoughts about cybersecurity, IT modernization, automation and the kinds of challenges our clients face in securing everything from data to war systems. In case you missed anything, check out the links below for the best and most popular content ...]]></description>
		
		
		
			</item>
		<item>
		<title>There’s a Breach in the Supply Chain. What Do You Do?</title>
		<link>https://www.steelcloud.com/theres-a-breach-in-the-supply-chain-what-do-you-do/</link>
		
		<dc:creator><![CDATA[Stephanie Plona]]></dc:creator>
		<pubDate>Mon, 26 Feb 2024 19:45:04 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[breach]]></category>
		<category><![CDATA[critical software]]></category>
		<category><![CDATA[CUI]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[DoD]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[securing the software supply chain]]></category>
		<category><![CDATA[software]]></category>
		<category><![CDATA[supply chain]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=89050</guid>

					<description><![CDATA[There’s a breach in the supply chain. What do you do? What to do in case of a breach. Let’s say you’ve established government-level cybersecurity in your organization. You’ve assessed your risks. You’ve aligned with stringent compliance standards such as STIG, CIS or CMMC. Your systems are continually updated with security measures. And, you have ...]]></description>
		
		
		
			</item>
	</channel>
</rss>
