<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:media="http://search.yahoo.com/mrss/" >

<channel>
	<title>Vulnerabilty &#8211; SteelCloud</title>
	<atom:link href="https://www.steelcloud.com/tag/vulnerabilty/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.steelcloud.com</link>
	<description></description>
	<lastBuildDate>Mon, 25 Aug 2025 19:41:34 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.steelcloud.com/wp-content/uploads/favicon.png</url>
	<title>Vulnerabilty &#8211; SteelCloud</title>
	<link>https://www.steelcloud.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Prepare now for a more agile and secure government environment</title>
		<link>https://www.steelcloud.com/prepare-now-for-a-more-agile-and-secure-government-environment/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Mon, 01 Feb 2021 20:27:10 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[agile]]></category>
		<category><![CDATA[ATO]]></category>
		<category><![CDATA[CMMC]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[Cybersecurity risk]]></category>
		<category><![CDATA[Digital transformation]]></category>
		<category><![CDATA[Network security]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[RMF process]]></category>
		<category><![CDATA[Secure baseline]]></category>
		<category><![CDATA[STIG automation]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[stig policy]]></category>
		<category><![CDATA[Vulnerabilty]]></category>
		<category><![CDATA[workforce transformation]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=81010</guid>

					<description><![CDATA[How to be agile while embracing new technologies begins with being prepared. The use of on-premise technologies and the cloud continue to increase in the Federal space as agencies pursue modernization through digital and workforce transformation. But with those agile technologies evolving daily, threats and vulnerabilities have also increased. Even when the government uses the ...]]></description>
		
		
		
			</item>
		<item>
		<title>Gain control of CUI and secure our government engine</title>
		<link>https://www.steelcloud.com/gain-control-of-cui-and-secure-our-government-engine/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Mon, 25 Jan 2021 16:52:30 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Classified unclassified information]]></category>
		<category><![CDATA[CMMC]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[CUI]]></category>
		<category><![CDATA[Cybersecurity risk]]></category>
		<category><![CDATA[DFARS]]></category>
		<category><![CDATA[DIBCAC]]></category>
		<category><![CDATA[Network security]]></category>
		<category><![CDATA[Risk Assessment]]></category>
		<category><![CDATA[RMF process]]></category>
		<category><![CDATA[Secure baseline]]></category>
		<category><![CDATA[STIG automation]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[stig policy]]></category>
		<category><![CDATA[Vulnerabilty]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=80997</guid>

					<description><![CDATA[ “We take the engine and we control the world.” Curtis ~ Snowpiercer Formerly known as “For Official Use Only” (FOUO) information, Controlled Unclassified Information (CUI) is gaining increased emphasis in the government contracting world. CUI is not classified information, rather it is government created or owned information that nonetheless requires safeguarding or dissemination controls. Because ...]]></description>
		
		
		
			</item>
		<item>
		<title>Access a “net-neutral” approach to cybersecurity</title>
		<link>https://www.steelcloud.com/access-a-net-neutral-approach-to-cybersecurity/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Sat, 16 Jan 2021 02:23:33 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[Cybersecurity risk]]></category>
		<category><![CDATA[Mechanized]]></category>
		<category><![CDATA[net-neutral]]></category>
		<category><![CDATA[Risk Assessment]]></category>
		<category><![CDATA[RMF process]]></category>
		<category><![CDATA[RPA]]></category>
		<category><![CDATA[Secure baseline]]></category>
		<category><![CDATA[STIG automation]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[stig policy]]></category>
		<category><![CDATA[Vulnerabilty]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=80984</guid>

					<description><![CDATA[Is a &#8220;net-neutral&#8221; concept truly open all? While there have always been divides in society, the digital divide is a relatively new chasm that has only grown deeper as technology expands. It used to be that the only way to access information was through your public library, which is equally free and open to all. ...]]></description>
		
		
		
			</item>
		<item>
		<title>Simplifying your adoption of the new NIST Cybersecurity Framework</title>
		<link>https://www.steelcloud.com/simplifying-your-adoption-of-the-new-nist-cybersecurity-framework/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Mon, 11 Jan 2021 15:26:23 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[Cybersecurity risk]]></category>
		<category><![CDATA[Mechanized]]></category>
		<category><![CDATA[Risk Assessment]]></category>
		<category><![CDATA[RMF process]]></category>
		<category><![CDATA[RPA]]></category>
		<category><![CDATA[Secure baseline]]></category>
		<category><![CDATA[STIG automation]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[stig policy]]></category>
		<category><![CDATA[Vulnerabilty]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=80972</guid>

					<description><![CDATA[How easy is it to adopt the new NIST Cybersecurity Framework? New and changing regulations and guidelines are a mainstay in the cybersecurity field. Keeping up with the changes and more importantly, understanding and applying them is not for the faint of heart. So, here’s a breakdown of the new IoT Cybersecurity Law signed by ...]]></description>
		
		
		
			</item>
		<item>
		<title>What is the difference between a ConfigOS License Key and an Encryption Key?</title>
		<link>https://www.steelcloud.com/what-is-the-difference-between-a-configos-license-key-and-an-encryption-key/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Thu, 03 Dec 2020 21:15:17 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[cmmc audit]]></category>
		<category><![CDATA[ConfigOS Command Center]]></category>
		<category><![CDATA[ConfigOS Foundry]]></category>
		<category><![CDATA[DevOps]]></category>
		<category><![CDATA[encryption software]]></category>
		<category><![CDATA[License key]]></category>
		<category><![CDATA[Risk Assessment]]></category>
		<category><![CDATA[Secure baseline]]></category>
		<category><![CDATA[STIG automation]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[stig policy]]></category>
		<category><![CDATA[Vulnerabilty]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=80884</guid>

					<description><![CDATA[This is our number one support question from our ConfigOS customers. Software License Keys – SteelCloud provides every customer with two unique software license keys (Foundry and Command Center) necessary to activate your ConfigOS software. Both License Keys have a “.lic” file extension. • The Foundry License key is used to activate the ConfigOS Foundry ...]]></description>
		
		
		
			</item>
		<item>
		<title>Complete Your Playbook with Ansible Integration</title>
		<link>https://www.steelcloud.com/complete-your-playbook-with-ansible-integration/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Tue, 01 Dec 2020 13:54:34 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Ansible Integration]]></category>
		<category><![CDATA[Ansible Inventory]]></category>
		<category><![CDATA[Ansible Vault]]></category>
		<category><![CDATA[CIS]]></category>
		<category><![CDATA[DevOps]]></category>
		<category><![CDATA[Mechanized]]></category>
		<category><![CDATA[Red Hat Ansible]]></category>
		<category><![CDATA[Risk Assessment]]></category>
		<category><![CDATA[Secure baseline]]></category>
		<category><![CDATA[STIG automation]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[stig policy]]></category>
		<category><![CDATA[Vulnerabilty]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=80789</guid>

					<description><![CDATA[How Ansible Integration automates your STIG/CIS Compliance If you have Ansible currently deployed in your environment, you know your IT environment management process is simplified. Ansible Inventory and Ansible Vault allows scaling out and configuring new systems automatically. This article will go over a few tips for Ansible integration with STIG/CIS automation compliance software such ...]]></description>
		
		
		
			</item>
		<item>
		<title>Get more done with Splunk Integration using STIG Compliance Software</title>
		<link>https://www.steelcloud.com/get-more-done-with-splunk-integration-using-stig-compliance-software/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Wed, 18 Nov 2020 16:40:58 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Bots]]></category>
		<category><![CDATA[CDM]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[Cybersecurity risk]]></category>
		<category><![CDATA[DevOps]]></category>
		<category><![CDATA[Mechanized]]></category>
		<category><![CDATA[Risk Assessment]]></category>
		<category><![CDATA[RMF process]]></category>
		<category><![CDATA[Secure baseline]]></category>
		<category><![CDATA[splunk integration]]></category>
		<category><![CDATA[STIG automation]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[stig policy]]></category>
		<category><![CDATA[Vulnerabilty]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=80641</guid>

					<description><![CDATA[Tips for Splunk integration with STIG automation compliance software By Joe Montgomery If you have Splunk currently deployed in your environment, you should already be aware of the platform&#8217;s expansive capabilities, but if you have not integrated your reports with Splunk, there are some key benefits of integrating the two that could make your life ...]]></description>
		
		
		
			</item>
		<item>
		<title>The More Red Hat Changes, the More Red Hat STIG stays the same</title>
		<link>https://www.steelcloud.com/the-more-red-hat-changes-the-more-red-hat-stig-stays-the-same/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Thu, 12 Nov 2020 17:19:45 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[Cybersecurity risk]]></category>
		<category><![CDATA[linux]]></category>
		<category><![CDATA[nist 800-171]]></category>
		<category><![CDATA[nist 800-53]]></category>
		<category><![CDATA[red hat]]></category>
		<category><![CDATA[Risk Assessment]]></category>
		<category><![CDATA[RMF process]]></category>
		<category><![CDATA[Secure baseline]]></category>
		<category><![CDATA[STIG automation]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[stig policy]]></category>
		<category><![CDATA[Vulnerabilty]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=80611</guid>

					<description><![CDATA[By Brian Walker  Does Red Hat STIG really stay the same? RHEL 7 laid a solid foundation for Red Hat Enterprise Linux (RHEL) 8 and is the first major update of Red Hat since June 2014. RHEL 8 brings a revised web console, application streams, some improvements in security and configurations capabilities. The difference between ...]]></description>
		
		
		
			</item>
		<item>
		<title>Security knows no season—10 tips for year-round cybersecurity</title>
		<link>https://www.steelcloud.com/security-knows-no-season-10-tips-for-year-round-cybersecurity/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Tue, 27 Oct 2020 23:44:44 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Bots]]></category>
		<category><![CDATA[CDM]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[Cybersecurity risk]]></category>
		<category><![CDATA[DevOps]]></category>
		<category><![CDATA[Mechanized]]></category>
		<category><![CDATA[Risk Assessment]]></category>
		<category><![CDATA[RMF process]]></category>
		<category><![CDATA[Secure baseline]]></category>
		<category><![CDATA[STIG automation]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[stig policy]]></category>
		<category><![CDATA[Vulnerabilty]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=80592</guid>

					<description><![CDATA[Listed below is a summary of our top 10 security tips for National Cybersecurity Awareness Month Each October, the industry hosts National Cybersecurity Awareness Month and this year SteelCloud compiled a list compliance tips to help our readers. But the truth is, there is never a month, week, day, hour or minute that we don’t ...]]></description>
		
		
		
			</item>
		<item>
		<title>How to know when bots are better than humans</title>
		<link>https://www.steelcloud.com/how-to-know-when-bots-are-better-than-humans/</link>
		
		<dc:creator><![CDATA[Jamie Coffey]]></dc:creator>
		<pubDate>Tue, 06 Oct 2020 19:11:50 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[Cybersecurity risk]]></category>
		<category><![CDATA[Mechanized]]></category>
		<category><![CDATA[Risk Assessment]]></category>
		<category><![CDATA[RMF process]]></category>
		<category><![CDATA[RPA]]></category>
		<category><![CDATA[Secure baseline]]></category>
		<category><![CDATA[STIG automation]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[stig policy]]></category>
		<category><![CDATA[Vulnerabilty]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=80449</guid>

					<description><![CDATA[By Brian Hajost Can Bots really be better than humans? In a “do more with less” business environment, robotic process automation (aka RPA, aka “automation”, aka “bots”) is gaining traction. With human performance optimization and digital transformations well established in the public and private sectors, some of today’s biggest advancements in time-, money- and effort-saving ...]]></description>
		
		
		
			</item>
	</channel>
</rss>
