<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:media="http://search.yahoo.com/mrss/" >

<channel>
	<title>Zero Trust &#8211; SteelCloud</title>
	<atom:link href="https://www.steelcloud.com/tag/zero-trust/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.steelcloud.com</link>
	<description></description>
	<lastBuildDate>Mon, 25 Aug 2025 19:26:49 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.steelcloud.com/wp-content/uploads/favicon.png</url>
	<title>Zero Trust &#8211; SteelCloud</title>
	<link>https://www.steelcloud.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Securing Your IoT Environment</title>
		<link>https://www.steelcloud.com/securing-your-iot-environment/</link>
		
		<dc:creator><![CDATA[Stephanie Plona]]></dc:creator>
		<pubDate>Tue, 21 Jan 2025 16:58:57 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[internet of things]]></category>
		<category><![CDATA[IoT]]></category>
		<category><![CDATA[Secure baseline]]></category>
		<category><![CDATA[Secure Configurations]]></category>
		<category><![CDATA[system hardening]]></category>
		<category><![CDATA[Windows OS]]></category>
		<category><![CDATA[Zero Trust]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=90101</guid>

					<description><![CDATA[How to secure your IoT environment. &#160; The IoT ecosystem is having a moment. This year it’s projected that over 85% of enterprises will have more smart edge and IoT devices on their networks than laptops, desktops, tablets or smartphones. Global projections for 2025 also indicate there will be over 75 billion connected smart devices. ...]]></description>
		
		
		
			</item>
		<item>
		<title>Top Cybersecurity Threats of 2025</title>
		<link>https://www.steelcloud.com/top-cybersecurity-threats-of-2025/</link>
		
		<dc:creator><![CDATA[Stephanie Plona]]></dc:creator>
		<pubDate>Tue, 14 Jan 2025 16:51:00 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[CIS Benchmarks]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[STIG]]></category>
		<category><![CDATA[supply chain]]></category>
		<category><![CDATA[threat mitigation]]></category>
		<category><![CDATA[threats]]></category>
		<category><![CDATA[Zero Trust]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=90050</guid>

					<description><![CDATA[4 Cybersecurity Threats to Have on Your Radar In 2025 If there’s one thing to know as we enter 2025, it’s that the bad guys are getting better and stronger. The statistics are daunting. In 2024, the costs of cybercrime were projected to be $9.5 trillion. From ransomware threats to phishing, the pace, number and ...]]></description>
		
		
		
			</item>
		<item>
		<title>Three Top 2025 Cybersecurity Resolutions</title>
		<link>https://www.steelcloud.com/resolutions-for-cybersecurity-success/</link>
		
		<dc:creator><![CDATA[Stephanie Plona]]></dc:creator>
		<pubDate>Tue, 07 Jan 2025 19:03:47 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[emergency plan]]></category>
		<category><![CDATA[incident response]]></category>
		<category><![CDATA[resolutions]]></category>
		<category><![CDATA[secured baselines]]></category>
		<category><![CDATA[software]]></category>
		<category><![CDATA[supply chain]]></category>
		<category><![CDATA[Zero Trust]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=90046</guid>

					<description><![CDATA[Three Resolutions for 2025 Cybersecurity Success A list of 2025 cybersecurity predictions is helpful for planning your year. But we think it’s more helpful to have a list of recommendations, priorities and resolutions. SteelCloud’s 2025 Resolutions for Cybersecurity Success list has only three items on it. There are plenty more initiatives to take on, but ...]]></description>
		
		
		
			</item>
		<item>
		<title>Resource Recap of 2024</title>
		<link>https://www.steelcloud.com/resource-recap-of-2024/</link>
		
		<dc:creator><![CDATA[Stephanie Plona]]></dc:creator>
		<pubDate>Mon, 09 Dec 2024 19:48:08 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Collaterals]]></category>
		<category><![CDATA[Automation]]></category>
		<category><![CDATA[CIS Benchmarks]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data sheet]]></category>
		<category><![CDATA[eBook]]></category>
		<category><![CDATA[education]]></category>
		<category><![CDATA[Higher Ed]]></category>
		<category><![CDATA[software]]></category>
		<category><![CDATA[STIG]]></category>
		<category><![CDATA[supply chain]]></category>
		<category><![CDATA[Zero Trust]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=89980</guid>

					<description><![CDATA[A Recap of 2024’s Best Cybersecurity Resources Each year, SteelCloud puts pen to paper with our thoughts about cybersecurity, IT modernization, automation and the kinds of challenges our clients face in securing everything from data to war systems. In case you missed anything, check out the links below for the best and most popular content ...]]></description>
		
		
		
			</item>
		<item>
		<title>PODCAST: Zero Trust Playbook: Practical Strategies for Public Sector Agencies</title>
		<link>https://www.steelcloud.com/podcast-zero-trust-playbook-practical-strategies-for-public-sector-agencies/</link>
		
		<dc:creator><![CDATA[Stephanie Plona]]></dc:creator>
		<pubDate>Thu, 21 Nov 2024 17:27:28 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Podcasts]]></category>
		<category><![CDATA[government]]></category>
		<category><![CDATA[Podcast]]></category>
		<category><![CDATA[public sector]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[Zero Trust]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=89909</guid>

					<description><![CDATA[PODCAST: Zero Trust Playbook: Practical Strategies for Public Sector Agencies Zero Trust is the topic on everyone’s minds as the initial September 2024 deadline for federal agencies to implement Zero Trust architecture and demonstrate a shift in cybersecurity approach has just passed. As the journey toward the Department of Defense 2027 goal of across-the-board baseline ...]]></description>
		
		
		
			</item>
		<item>
		<title>Top 10 Security Tips for National Cybersecurity Awareness Month</title>
		<link>https://www.steelcloud.com/top-10-security-tips-for-national-cybersecurity-awareness-month/</link>
		
		<dc:creator><![CDATA[Stephanie Plona]]></dc:creator>
		<pubDate>Tue, 01 Oct 2024 17:17:35 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Automation]]></category>
		<category><![CDATA[CIS Benchmarks]]></category>
		<category><![CDATA[cyber workforce]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[cybersecurity awareness month]]></category>
		<category><![CDATA[DevSecOps]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[Zero Trust]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=89821</guid>

					<description><![CDATA[Top 10 Security Tips for National Cybersecurity Awareness Month &#160; Each October, the industry hosts National Cybersecurity Awareness Month. But the truth is, there is never a month, week, day, hour or minute that we don’t need to be aware of cybersecurity. So SteelCloud has assembled ten cybersecurity tips that apply whether you’re a government ...]]></description>
		
		
		
			</item>
		<item>
		<title>How to Achieve Scalable Compliance and Zero Trust within a Remote and Hybrid Workforce</title>
		<link>https://www.steelcloud.com/how-to-achieve-scalable-compliance-and-zero-trust-within-a-remote-and-hybrid-workforce/</link>
		
		<dc:creator><![CDATA[Stephanie Plona]]></dc:creator>
		<pubDate>Tue, 24 Sep 2024 15:29:37 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[ConfigOS MPO]]></category>
		<category><![CDATA[hybrid workforce]]></category>
		<category><![CDATA[remote workforce]]></category>
		<category><![CDATA[Scalable Compliance]]></category>
		<category><![CDATA[STIG automation]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[Zero Trust]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=89730</guid>

					<description><![CDATA[How to Achieve Scalable Compliance and Zero Trust within a Remote and Hybrid Workforce &#160; The value of creating a STIG-secure baseline upon which to build Zero Trust is essential to protecting DoD and other government assets in the cyber arena. Once you achieve that, however, you’ll soon be wondering, “but how can we make ...]]></description>
		
		
		
			</item>
		<item>
		<title>Amplify Zero Trust with Automation</title>
		<link>https://www.steelcloud.com/amplify-zero-trust-with-automation/</link>
		
		<dc:creator><![CDATA[Stephanie Plona]]></dc:creator>
		<pubDate>Tue, 17 Sep 2024 17:09:03 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Automation]]></category>
		<category><![CDATA[baseline hardening]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[STIG automation]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[Zero Trust]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=89712</guid>

					<description><![CDATA[Amplify Zero Trust with Automation Skydivers use two parachutes. Homeowners have more than one lock on their doors. Stores have both security guards and cameras. You’ll often find the things we value the most are protected in multiple ways. The same is true with Zero Trust and STIGs. The two work together to ensure the ...]]></description>
		
		
		
			</item>
		<item>
		<title>Zero Trust and STIGs – The Powerful Pair Hackers Don’t Want You to Know About</title>
		<link>https://www.steelcloud.com/zero-trust-and-stigs-the-powerful-pair-hackers-dont-want-you-to-know-about/</link>
		
		<dc:creator><![CDATA[Stephanie Plona]]></dc:creator>
		<pubDate>Tue, 10 Sep 2024 14:51:33 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[STIG automation]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[STIGs]]></category>
		<category><![CDATA[Zero Trust]]></category>
		<category><![CDATA[Zero Trust and STIGs]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=89708</guid>

					<description><![CDATA[Zero Trust and STIGs – The Powerful Pair Hackers Don’t Want You to Know About You have to admit it. Hackers have a great work ethic. They will stop at nothing to penetrate government systems, especially in the DoD. They’re willing to work overtime to do it. And they just keep getting better and better ...]]></description>
		
		
		
			</item>
		<item>
		<title>White Paper: Synchronize Cyber Compliance &#038; IT Organizations</title>
		<link>https://www.steelcloud.com/white-paper-synchronize-cyber-compliance-it-organizations/</link>
		
		<dc:creator><![CDATA[Stephanie Plona]]></dc:creator>
		<pubDate>Tue, 03 Sep 2024 20:25:46 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[White Papers]]></category>
		<category><![CDATA[CIS Benchmarks]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[IT]]></category>
		<category><![CDATA[Zero Trust]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=89703</guid>

					<description><![CDATA[Synchronize Cyber Compliance &#38; IT Organizations Unifying CIS Benchmarks Implementation Automation &#38; Content If you’ve ever felt like establishing and maintaining CIS Benchmarks compliance is like running an obstacle course, that’s only because it is. When CIS Benchmark content and policies aren’t unified across all systems, you can’t achieve full and unified compliance. And while automation can ...]]></description>
		
		
		
			</item>
	</channel>
</rss>
