View All

+Featured

Gray glass dome with dark clouds above it

DoD Thunderdome: Legacy Security Enter, Zero Trust Leave

April 18, 2022

Thunderdome is a DoD zero-trust prototype that “aims to reconcile zero trust ideals, identity management technology, and the secure access service edge (SASE) concept with endpoint security goals.”

Learn More
Pedestrian traffic light with don’t walk hand and zero seconds remaining

Zero Trust and CMMC: Resolving Friction to Accelerate Compliance

July 16, 2021

Leveraging a zero-trust strategy in the cloud can help defense contractors scope out technical debt, modernize IT infrastructure, and accelerate compliance timelines.

Learn More
Female software engineer works at a desk with desk with computers

Rethinking Remote Monitoring and Management (RMM)

July 6, 2021

The RMM platforms used by MSPs today are not up to the task of meeting modern cybersecurity challenges. MSP tooling and practices must evolve to keep pace with the threats...

Learn More
View All

Insights

Close up of modern building with stepped architectural levels

The CEO’s Cybersecurity Playbook

October 13, 2021

Managing information technology is about managing potential risk against business efficiency. The CIA Triad can be used to articulate cybersecurity risk in the language of the business.

Learn More
Photo of a tall ship with old fashioned sails and rigging sailing on the ocean

The Golden Age of Modern Piracy

September 17, 2021

In celebration of International Talk Like a Pirate Day, Kyle Milaschewski draws a parallel between the Golden Age of Piracy and the current state of cybersecurity. Weaving in historical accounts...

Learn More
Woman in black shirt using a laptop computer leans against a glass wall with racks of servers behind her.

21 Questions to Vet your MSP’s Cybersecurity Posture

December 10, 2020

How secure is your cybersecurity vendor? Because most MSPs hold privileged access to their customers' environments, these questions are a good place to start to gain assurance in your MSP's...

Learn More
Photo of a man wearing a headset in front of multiple computer screens with a digital overlay of circles, lines, and silhouettes in the foreground meant to convey cybersecurity or cyber threats

CMMC Compliance Means DoD Business

December 2, 2020

Steel Root co-founder Ryan Heidorn was interviewed by Security Systems News on the CMMC rollout and what it means for DoD contractors

Learn More
Airmen from the 189th Communications Flight practice cybersecurity skills in the new virtual lab Aug. 5, 2020, at Little Rock Air Force Base, Arkansas

Should DHS Contractors Worry About CMMC?

November 7, 2020

As CMMC continues to show up outside of DoD contracts, many have theorized that it could become a standard across the federal government. We sat down with Bob Kolasky, Assistant...

Learn More
Photo of Steel Root co-founder Ryan Heidorn sitting at a desk and wearing a mask

Working from Home Poses Cybersecurity Challenges for Businesses

July 21, 2020

Steel Root co-founder Ryan Heidorn discusses the need for increased vigilance about cybersecurity when it comes to a remote workforce.

Learn More
Black and white photo of a ceramic robot

Explore Our Service Offerings

Want to learn more about the services Steel Root offers? Visit our Solutions page to familiarize yourself with the cybersecurity and compliance services we provide, organized by industry and use case.

Start with Solutions