Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
CISA Directs Agencies to Remove Outdated Edge Devices

CISA Directs Agencies to Remove Outdated Edge Devices

Posted on February 6, 2026 By CWS

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a directive for Federal Civilian Executive Branch (FCEB) agencies to enhance the management of edge network devices. This initiative requires the removal of devices no longer receiving security updates from their original manufacturers within the next 12 to 18 months. The directive aims to reduce technical vulnerabilities and mitigate risks associated with these devices, which are increasingly targeted by state-sponsored cyber threats.

Understanding the Role of Edge Devices

Edge devices, which include components such as load balancers, firewalls, routers, and Internet of Things (IoT) devices, play a critical role in network traffic management and security. Positioned at the perimeter of networks, they hold significant access privileges and are susceptible to exploitation if not adequately supported with updates and patches. CISA emphasizes the vulnerabilities these devices present when they are no longer maintained by vendors.

CISA’s Strategic Actions for Cybersecurity

To assist agencies in complying with this directive, CISA has compiled an end-of-support edge device list. This repository provides crucial information about devices that have reached or are nearing the end of their support life, detailing product names, version numbers, and end-of-support dates. The newly implemented Binding Operational Directive 26-02 lays out clear steps for agencies to follow in addressing these risks.

These actions include updating all vendor-supported edge devices to the latest software versions immediately, cataloging and reporting end-of-support devices to CISA within three months, and decommissioning unsupported devices within 12 months. The directive also calls for the establishment of a lifecycle management process to continuously monitor and manage edge devices expected to reach end-of-support status.

Implications and Future Outlook

CISA Acting Director Madhu Gottumukkala underscores the significant threat posed by unsupported devices to federal systems. By proactively managing the lifecycle of these assets and removing outdated technology, federal agencies can enhance their network resilience and contribute to safeguarding the global digital infrastructure. This directive is a step towards fortifying cybersecurity measures across federal networks.

As agencies work to comply with these new requirements, the directive emphasizes the importance of ongoing vigilance and strategic management of network assets. Looking forward, the focus will remain on maintaining robust security protocols to protect against evolving cyber threats.

The Hacker News Tags:asset management, CISA, Cybersecurity, edge devices, end-of-support, federal security, infrastructure security, network security, security updates, technical debt

Post navigation

Previous Post: Flickr Security Breach Exposes User Data
Next Post: AI Exploitation: Emerging Threats in Cybersecurity

Related Posts

Chinese Hackers Deploy MarsSnake Backdoor in Multi-Year Attack on Saudi Organization Chinese Hackers Deploy MarsSnake Backdoor in Multi-Year Attack on Saudi Organization The Hacker News
Gainsight Expands Impacted Customer List Following Salesforce Security Alert Gainsight Expands Impacted Customer List Following Salesforce Security Alert The Hacker News
CISA Adds Actively Exploited VMware vCenter Flaw CVE-2024-37079 to KEV Catalog CISA Adds Actively Exploited VMware vCenter Flaw CVE-2024-37079 to KEV Catalog The Hacker News
Why Built-In Protections Aren’t Enough for Modern Data Resilience Why Built-In Protections Aren’t Enough for Modern Data Resilience The Hacker News
SinoTrack GPS Devices Vulnerable to Remote Vehicle Control via Default Passwords SinoTrack GPS Devices Vulnerable to Remote Vehicle Control via Default Passwords The Hacker News
Iranian APT35 Hackers Targeting Israeli Tech Experts with AI-Powered Phishing Attacks Iranian APT35 Hackers Targeting Israeli Tech Experts with AI-Powered Phishing Attacks The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required
  • Iranian Hackers Compromise FBI Director’s Email, Attack Stryker
  • Stocks in Cybersecurity Dip as Anthropic Tests Cutting-Edge AI

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required
  • Iranian Hackers Compromise FBI Director’s Email, Attack Stryker
  • Stocks in Cybersecurity Dip as Anthropic Tests Cutting-Edge AI

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark