As policymakers confront new cybersecurity challenges from rising applied sciences like AI and quantum computing, an pressing menace hides in plain sight—end-of-Life (EoL) expertise past its supported lifespan. Headlines give attention to novel threats and futuristic defenses, whereas outdated community tools and software program in essential infrastructure already pose a transparent and current hazard. That is demonstrated by high-profile nation-state sponsored campaigns focusing on unpatchable expertise—equivalent to Volt Hurricane. Addressing this menace requires pressing and targeted consideration, starting with a standard understanding of the scale and scope of the issue.
When expertise reaches the scheduled EoL, distributors cease offering safety patches or help. Continued reliance on unsupported expertise creates a big and rising threat of exploitation.
Out there estimates counsel that globally, practically half of enterprise community infrastructure property have been getting older or already out of date initially of this decade. To this point, there was insufficient knowledge to successfully assess how this publicity varies throughout essential sectors and nationwide markets, or to match the dangers of failing to handle “technical debt” towards the prices of substitute investments.
New Analysis Fills a Crucial Hole
WPI Technique’s report, “Replace Crucial: Counting the Price of Cybersecurity Dangers from Finish-of-Life Technology on Crucial Nationwide Infrastructure,” highlights this rising world problem and presents suggestions for policymakers and personal sector leaders. Commissioned by Cisco, this analysis offers a novel method to comparative evaluation of EoL threat throughout key markets (US, UK, France, Germany and Japan) and significant sectors together with healthcare, vitality, water, manufacturing, and finance.
The findings are staggering. In the U.S., 80% of federal IT spending goes to working and sustaining present—typically legacy—techniques, growing threat to essential infrastructure. Some 60% of EU cyber breaches in 2022-2023 exploited recognized vulnerabilities for which patches existed however weren’t utilized, underscoring that fundamental cyber hygiene stays a elementary problem. The report examined international locations and sectors, with healthcare constantly rising as notably susceptible. It discovered that proactively tackling EoL expertise presents a transparent, strategic path to considerably elevate cyber resilience throughout essential sectors—and that by addressing vulnerabilities earlier than they’re exploited, we are able to higher shield important providers and residents.
Sensible Coverage Suggestions
As governments and the non-public sector contemplate how to greatest allocate sources and securely deploy AI, the report presents a number of actionable suggestions:
- Asset Administration as Basis: All essential infrastructure operators ought to preserve reside expertise asset registers that establish tools approaching or at end-of-life standing. You can’t handle what you can’t see.
- Clear Lifecycle Administration Assessments: Operators ought to regularly assess whether or not getting older expertise must be changed or, if substitute isn’t instantly possible, require documented threat mitigation plans with particular timelines.
- Enhanced Incident Reporting: The place incident reporting mechanisms exist, guarantee they seize knowledge on EoL expertise’s position in breaches. This transparency creates accountability and helps establish systemic patterns.
- Reform IT Funding Fashions: In the general public sector, expertise funding is usually divided into two separate budgets: one for purchasing new techniques (capital expenditure) and one other for sustaining present ones (operational prices). This method can result in most of the finances getting used simply to maintain present techniques working, leaving little room to put money into new applied sciences. To deal with this, governments ought to contemplate whether or not subscription or consumption-based fashions supply value effectivity and safety advantages.
The Path Ahead
This analysis is especially related not solely throughout Crucial Infrastructure Safety and Resilience Consciousness Month but in addition as nations put money into quantum-resistant encryption and AI infrastructure—and work to extra effectively ship providers to residents. These initiatives will falter if constructed on foundations riddled with out of date, unpatched expertise and the place budgets are consumed sustaining getting older techniques relatively than remediating them. Gear quietly working in server rooms might not present up on steadiness sheets, however from a safety standpoint, they’re shadow liabilities.
This analysis offers policymakers and the non-public sector with each the proof base and sensible frameworks to deal with this problem systematically. By bettering visibility into expertise lifecycles, reforming funding fashions, and establishing clear administration necessities, we are able to shift from reactive incident response to proactive threat discount—tackling vulnerabilities earlier than they are often exploited.
To that finish, Cisco is concentrated on guaranteeing governments and organizations have the safe, resilient, and data-ready infrastructure wanted to harness AI and defend towards evolving cyber threats. Cisco is driving resilient infrastructure via a new effort that Cisco SVP and Chief Safety & Belief Officer Anthony Grieco introduced at present to extend the default safety of our personal merchandise by eradicating capabilities that develop into acknowledged as insecure and introducing new security measures that strengthen the safety posture of community infrastructure in addition to present higher visibility into the actions of menace actors. Cisco can also be calling on prospects, companions, and different organizations to guage their high-risk behaviors and replace outdated applied sciences to deal with technical debt and enhance infrastructure resilience as we unlock this AI period.

