Close Menu

    Subscribe to Updates

    Get the latest creative news from infofortech

    What's Hot

    Today’s NYT Mini Crossword Answers for March 19

    March 19, 2026

    Apple Has Acquired MotionVFX – Ciente

    March 19, 2026

    Microsoft will no longer auto-install M365 Copilot app on Windows PCs

    March 19, 2026
    Facebook X (Twitter) Instagram
    InfoForTech
    • Home
    • Latest in Tech
    • Artificial Intelligence
    • Cybersecurity
    • Innovation
    Facebook X (Twitter) Instagram
    InfoForTech
    Home»Cybersecurity»CISA Orders Removal of Unsupported Edge Devices to Reduce Federal Network Risk
    Cybersecurity

    CISA Orders Removal of Unsupported Edge Devices to Reduce Federal Network Risk

    InfoForTechBy InfoForTechFebruary 8, 2026No Comments2 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    CISA Orders Removal of Unsupported Edge Devices to Reduce Federal Network Risk
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email


    Ravie LakshmananFeb 06, 2026Federal Security / Infrastructure Security

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has ordered Federal Civilian Executive Branch (FCEB) agencies to strengthen asset lifecycle management for edge network devices and remove those that no longer receive security updates from original equipment manufacturers (OEMs) over the next 12 to 18 months.

    The agency said the move is to drive down technical debt and minimize the risk of compromise, as state-sponsored threat actors turn such devices as a preferred access pathway for breaking into target networks.

    Edge devices is an umbrella term that encompasses load balancers, firewalls, routers, switches, wireless access points, network security appliances, Internet of Things (IoT) edge devices, software-defined networks, and other physical or virtual networking components that route network traffic and hold privileged access.

    “Persistent cyber threat actors are increasingly exploiting unsupported edge devices — hardware and software that no longer receive vendor updates to firmware or other security patches,” CISA said. “Positioned at the network perimeter, these devices are especially vulnerable to persistent cyber threat actors exploiting a new or known vulnerability.”

    To assist FCEB agencies in this regard, CISA said it has developed an end-of-support edge device list that acts as a preliminary repository with information about devices that have already reached end-of-support or are expected to lose support. This list will include the product name, version number, and end-of-support date.

    The newly issued Binding Operational Directive 26-02, Mitigating Risk From End-of-Support Edge Devices, requires FCEB agencies to undertake the following actions –

    • Update each vendor-supported-edge device running end-of-support software to a vendor-supported software version (With immediate effect)
    • Catalog all devices to identify those that are end-of-support and report to CISA (Within three months)
    • Decommission all edge devices that  are end-of-support and listed in the edge device list from agency networks and replace them with vendor-supported devices that can receive security updates (Within 12 months)
    • Decommission all other identified edge devices from agency networks and replace with vendor-supported devices that can receive security updates (Within 18 months)
    • Establish a lifecycle management process to enable continuous discovery of all edge devices and maintain an inventory of those that are/will reach  end-of-support (Within 24 months)

    “Unsupported devices pose a serious risk to federal systems and should never remain on enterprise networks,” said CISA Acting Director Madhu Gottumukkala. “By proactively managing asset lifecycles and removing end-of-support technology, we can collectively strengthen resilience and protect the global digital ecosystem.”

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    InfoForTech
    • Website

    Related Posts

    OFAC Sanctions DPRK IT Worker Network Funding WMD Programs Through Fake Remote Jobs

    March 18, 2026

    How Can Organizations Improve Threat Detection and Response in Hybrid Cloud Environments?

    March 18, 2026

    AI Flaws in Amazon Bedrock, LangSmith, and SGLang Enable Data Exfiltration and RCE

    March 18, 2026

    What’s New in Attack Surface Analysis (2026): Tactics & CTEM

    March 17, 2026

    Troy Hunt: Weekly Update 495

    March 17, 2026

    CISA Flags Actively Exploited Wing FTP Vulnerability Leaking Server Paths

    March 17, 2026
    Leave A Reply Cancel Reply

    Advertisement
    Top Posts

    We’re Tracking Streaming Price Hikes in 2026: Spotify, Paramount Plus, Crunchyroll and Others

    February 15, 202610 Views

    How a Chinese AI Firm Quietly Pulled Off a Hardware Power Move

    January 15, 20268 Views

    Microsoft is bringing an AI helper to Xbox consoles

    March 14, 20266 Views

    The World’s Heart Beats in Bytes — Why Europe Needs Better Tech Cardio

    January 15, 20266 Views
    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo
    Advertisement
    About Us
    About Us

    Our mission is to deliver clear, reliable, and up-to-date information about the technologies shaping the modern world. We focus on breaking down complex topics into easy-to-understand insights for professionals, enthusiasts, and everyday readers alike.

    We're accepting new partnerships right now.

    Facebook X (Twitter) YouTube
    Most Popular

    We’re Tracking Streaming Price Hikes in 2026: Spotify, Paramount Plus, Crunchyroll and Others

    February 15, 202610 Views

    How a Chinese AI Firm Quietly Pulled Off a Hardware Power Move

    January 15, 20268 Views

    Microsoft is bringing an AI helper to Xbox consoles

    March 14, 20266 Views
    Categories
    • Artificial Intelligence
    • Cybersecurity
    • Innovation
    • Latest in Tech
    © 2026 All Rights Reserved InfoForTech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.

    Ad Blocker Enabled!
    Ad Blocker Enabled!
    Our website is made possible by displaying online advertisements to our visitors. Please support us by disabling your Ad Blocker.