Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
CISA Directs Agencies to Remove Outdated Edge Devices

CISA Directs Agencies to Remove Outdated Edge Devices

Posted on February 6, 2026 By CWS

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a directive for Federal Civilian Executive Branch (FCEB) agencies to enhance the management of edge network devices. This initiative requires the removal of devices no longer receiving security updates from their original manufacturers within the next 12 to 18 months. The directive aims to reduce technical vulnerabilities and mitigate risks associated with these devices, which are increasingly targeted by state-sponsored cyber threats.

Understanding the Role of Edge Devices

Edge devices, which include components such as load balancers, firewalls, routers, and Internet of Things (IoT) devices, play a critical role in network traffic management and security. Positioned at the perimeter of networks, they hold significant access privileges and are susceptible to exploitation if not adequately supported with updates and patches. CISA emphasizes the vulnerabilities these devices present when they are no longer maintained by vendors.

CISA’s Strategic Actions for Cybersecurity

To assist agencies in complying with this directive, CISA has compiled an end-of-support edge device list. This repository provides crucial information about devices that have reached or are nearing the end of their support life, detailing product names, version numbers, and end-of-support dates. The newly implemented Binding Operational Directive 26-02 lays out clear steps for agencies to follow in addressing these risks.

These actions include updating all vendor-supported edge devices to the latest software versions immediately, cataloging and reporting end-of-support devices to CISA within three months, and decommissioning unsupported devices within 12 months. The directive also calls for the establishment of a lifecycle management process to continuously monitor and manage edge devices expected to reach end-of-support status.

Implications and Future Outlook

CISA Acting Director Madhu Gottumukkala underscores the significant threat posed by unsupported devices to federal systems. By proactively managing the lifecycle of these assets and removing outdated technology, federal agencies can enhance their network resilience and contribute to safeguarding the global digital infrastructure. This directive is a step towards fortifying cybersecurity measures across federal networks.

As agencies work to comply with these new requirements, the directive emphasizes the importance of ongoing vigilance and strategic management of network assets. Looking forward, the focus will remain on maintaining robust security protocols to protect against evolving cyber threats.

The Hacker News Tags:asset management, CISA, Cybersecurity, edge devices, end-of-support, federal security, infrastructure security, network security, security updates, technical debt

Post navigation

Previous Post: Flickr Security Breach Exposes User Data
Next Post: AI Exploitation: Emerging Threats in Cybersecurity

Related Posts

Claude Opus 4.6 Uncovers 500+ Severe Flaws in Open-Source Software Claude Opus 4.6 Uncovers 500+ Severe Flaws in Open-Source Software The Hacker News
iPhone Spyware, Microsoft 0-Day, TokenBreak Hack, AI Data Leaks and More iPhone Spyware, Microsoft 0-Day, TokenBreak Hack, AI Data Leaks and More The Hacker News
TAG-140 Deploys DRAT V2 RAT, Targeting Indian Government, Defense, and Rail Sectors TAG-140 Deploys DRAT V2 RAT, Targeting Indian Government, Defense, and Rail Sectors The Hacker News
BianLian and RansomExx Exploit SAP NetWeaver Flaw to Deploy PipeMagic Trojan BianLian and RansomExx Exploit SAP NetWeaver Flaw to Deploy PipeMagic Trojan The Hacker News
How the Browser Became the Main Cyber Battleground How the Browser Became the Main Cyber Battleground The Hacker News
Malicious npm Package Uses Hidden Prompt and Script to Evade AI Security Tools Malicious npm Package Uses Hidden Prompt and Script to Evade AI Security Tools The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News