Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»CISA Orders Removal of Unsupported Edge Devices to Reduce Federal Network Risk
    Cybersecurity

    CISA Orders Removal of Unsupported Edge Devices to Reduce Federal Network Risk

    adminBy adminFebruary 6, 2026No Comments2 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    CISA Orders Removal of Unsupported Edge Devices to Reduce Federal Network Risk
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Ravie LakshmananFeb 06, 2026Federal Security / Infrastructure Security

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has ordered Federal Civilian Executive Branch (FCEB) agencies to strengthen asset lifecycle management for edge network devices and remove those that no longer receive security updates from original equipment manufacturers (OEMs) over the next 12 to 18 months.

    The agency said the move is to drive down technical debt and minimize the risk of compromise, as state-sponsored threat actors turn such devices as a preferred access pathway for breaking into target networks.

    Edge devices is an umbrella term that encompasses load balancers, firewalls, routers, switches, wireless access points, network security appliances, Internet of Things (IoT) edge devices, software-defined networks, and other physical or virtual networking components that route network traffic and hold privileged access.

    “Persistent cyber threat actors are increasingly exploiting unsupported edge devices — hardware and software that no longer receive vendor updates to firmware or other security patches,” CISA said. “Positioned at the network perimeter, these devices are especially vulnerable to persistent cyber threat actors exploiting a new or known vulnerability.”

    To assist FCEB agencies in this regard, CISA said it has developed an end-of-support edge device list that acts as a preliminary repository with information about devices that have already reached end-of-support or are expected to lose support. This list will include the product name, version number, and end-of-support date.

    The newly issued Binding Operational Directive 26-02, Mitigating Risk From End-of-Support Edge Devices, requires FCEB agencies to undertake the following actions –

    • Update each vendor-supported-edge device running end-of-support software to a vendor-supported software version (With immediate effect)
    • Catalog all devices to identify those that are end-of-support and report to CISA (Within three months)
    • Decommission all edge devices that  are end-of-support and listed in the edge device list from agency networks and replace them with vendor-supported devices that can receive security updates (Within 12 months)
    • Decommission all other identified edge devices from agency networks and replace with vendor-supported devices that can receive security updates (Within 18 months)
    • Establish a lifecycle management process to enable continuous discovery of all edge devices and maintain an inventory of those that are/will reach  end-of-support (Within 24 months)

    “Unsupported devices pose a serious risk to federal systems and should never remain on enterprise networks,” said CISA Acting Director Madhu Gottumukkala. “By proactively managing asset lifecycles and removing end-of-support technology, we can collectively strengthen resilience and protect the global digital ecosystem.”

    CISA Devices Edge federal Network Orders Reduce Removal risk Unsupported
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleFuture of Content Marketing: A 2025 Guide
    Next Article Musk’s million data centers in space won’t fly, say experts
    admin
    • Website

    Related Posts

    Social media bans might steer kids into riskier corners of the internet

    April 19, 2026

    Vercel confirms breach as hackers claim to be selling stolen data

    April 19, 2026

    Apple AirTag tracking can be misled by replayed Bluetooth signals

    April 19, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Here’s How Netflix Plans to Add TikTok-Style Videos to Its Mobile App

    April 19, 2026

    Social media bans might steer kids into riskier corners of the internet

    April 19, 2026

    eSIM was supposed to replace SIM cards, but carriers turned it into a trap

    April 19, 2026

    Vercel confirms breach as hackers claim to be selling stolen data

    April 19, 2026
    Categories
    • Blogging (65)
    • Cybersecurity (1,402)
    • Privacy & Online Earning (172)
    • SEO & Digital Marketing (850)
    • Tech Tools & Mobile / Apps (1,679)
    • WiFi / Internet & Networking (232)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Here’s How Netflix Plans to Add TikTok-Style Videos to Its Mobile App

    April 19, 2026

    Social media bans might steer kids into riskier corners of the internet

    April 19, 2026

    eSIM was supposed to replace SIM cards, but carriers turned it into a trap

    April 19, 2026
    Most Popular
    • Here’s How Netflix Plans to Add TikTok-Style Videos to Its Mobile App
    • Social media bans might steer kids into riskier corners of the internet
    • eSIM was supposed to replace SIM cards, but carriers turned it into a trap
    • Vercel confirms breach as hackers claim to be selling stolen data
    • I used a simple Linux command to watch what apps do to my files in real time
    • Google TV Home (Android TV) 1.0.900391771 APK Download by Google LLC
    • The “most stylish” Galaxy Watch 8 Classic is 31% off at Amazon right now
    • Apple AirTag tracking can be misled by replayed Bluetooth signals
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.