As policymakers confront new cybersecurity challenges from rising applied sciences like AI and quantum computing, an pressing risk hides in plain sight—end-of-Life (EoL) know-how past its supported lifespan. Headlines concentrate on novel threats and futuristic defenses, whereas outdated community gear and software program in crucial infrastructure already pose a transparent and current hazard. That is demonstrated by high-profile nation-state sponsored campaigns focusing on unpatchable know-how—resembling Volt Storm. Addressing this risk requires pressing and targeted consideration, starting with a standard understanding of the scale and scope of the issue.
When know-how reaches the scheduled EoL, distributors cease offering safety patches or help. Continued reliance on unsupported know-how creates a major and rising danger of exploitation.
Accessible estimates counsel that globally, almost half of enterprise community infrastructure property had been growing old or already out of date in the beginning of this decade. Thus far, there was insufficient information to successfully assess how this publicity varies throughout crucial sectors and nationwide markets, or to match the dangers of failing to handle “technical debt” in opposition to the prices of substitute investments.
New Analysis Fills a Essential Hole
WPI Technique’s report, “Replace Essential: Counting the Price of Cybersecurity Dangers from Finish-of-Life Technology on Essential Nationwide Infrastructure,” highlights this rising world problem and affords suggestions for policymakers and personal sector leaders. Commissioned by Cisco, this analysis gives a novel strategy to comparative evaluation of EoL danger throughout key markets (US, UK, France, Germany and Japan) and significant sectors together with healthcare, vitality, water, manufacturing, and finance.
The findings are staggering. In the U.S., 80% of federal IT spending goes to working and sustaining present—typically legacy—methods, rising danger to crucial infrastructure. Some 60% of EU cyber breaches in 2022-2023 exploited recognized vulnerabilities for which patches existed however weren’t utilized, underscoring that primary cyber hygiene stays a basic problem. The report examined nations and sectors, with healthcare constantly rising as significantly weak. It discovered that proactively tackling EoL know-how affords a transparent, strategic path to considerably elevate cyber resilience throughout crucial sectors—and that by addressing vulnerabilities earlier than they’re exploited, we are able to higher shield important providers and residents.
Sensible Coverage Suggestions
As governments and the personal sector contemplate how to finest allocate sources and securely deploy AI, the report affords a number of actionable suggestions:
- Asset Administration as Basis: All crucial infrastructure operators ought to keep reside know-how asset registers that determine gear approaching or at end-of-life standing. You can’t handle what you can’t see.
- Clear Lifecycle Administration Assessments: Operators ought to regularly assess whether or not growing old know-how must be changed or, if substitute isn’t instantly possible, require documented danger mitigation plans with particular timelines.
- Enhanced Incident Reporting: The place incident reporting mechanisms exist, guarantee they seize information on EoL know-how’s function in breaches. This transparency creates accountability and helps determine systemic patterns.
- Reform IT Funding Fashions: In the general public sector, know-how funding is usually divided into two separate budgets: one for purchasing new methods (capital expenditure) and one other for sustaining present ones (operational prices). This strategy can result in most of the funds getting used simply to maintain present methods operating, leaving little room to spend money on new applied sciences. To deal with this, governments ought to contemplate whether or not subscription or consumption-based fashions provide price effectivity and safety advantages.
The Path Ahead
This analysis is especially related not solely throughout Essential Infrastructure Safety and Resilience Consciousness Month but additionally as nations spend money on quantum-resistant encryption and AI infrastructure—and work to extra effectively ship providers to residents. These initiatives will falter if constructed on foundations riddled with out of date, unpatched know-how and the place budgets are consumed sustaining growing old methods relatively than remediating them. Out of date gear quietly operating in server rooms might not present up on stability sheets, however from a safety standpoint, they’re shadow liabilities.
This analysis gives policymakers and the personal sector with each the proof base and sensible frameworks to handle this problem systematically. By bettering visibility into know-how lifecycles, reforming funding fashions, and establishing clear administration necessities, we are able to shift from reactive incident response to proactive danger discount—tackling vulnerabilities earlier than they are often exploited.
To that finish, Cisco is concentrated on making certain governments and organizations have the safe, resilient, and data-ready infrastructure wanted to harness AI and defend in opposition to evolving cyber threats. Cisco is driving resilient infrastructure by means of a new effort that Cisco SVP and Chief Safety & Belief Officer Anthony Grieco introduced at the moment to extend the default safety of our personal merchandise by eradicating capabilities that turn into acknowledged as insecure and introducing new security measures that strengthen the safety posture of community infrastructure in addition to present higher visibility into the actions of risk actors. Cisco can be calling on prospects, companions, and different organizations to guage their high-risk behaviors and replace outdated applied sciences to deal with technical debt and enhance infrastructure resilience as we unlock this AI period.

