{"id":16269,"date":"2025-11-20T11:55:21","date_gmt":"2025-11-20T11:55:21","guid":{"rendered":"https:\/\/dmsretail.com\/RetailNews\/securing-critical-infrastructure-by-tackling-technical-debt\/"},"modified":"2025-11-20T11:55:21","modified_gmt":"2025-11-20T11:55:21","slug":"securing-critical-infrastructure-by-tackling-technical-debt","status":"publish","type":"post","link":"https:\/\/dmsretail.com\/RetailNews\/securing-critical-infrastructure-by-tackling-technical-debt\/","title":{"rendered":"Securing Critical Infrastructure by Tackling Technical Debt"},"content":{"rendered":"<p> <p><a href=\"https:\/\/dmsretail.com\/online-workshops-list\/\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-496\" src=\"https:\/\/dmsretail.com\/RetailNews\/wp-content\/uploads\/2022\/05\/RETAIL-ONLINE-TRAINING-728-X-90.png\" alt=\"Retail Online Training\" width=\"729\" height=\"91\" srcset=\"https:\/\/dmsretail.com\/RetailNews\/wp-content\/uploads\/2022\/05\/RETAIL-ONLINE-TRAINING-728-X-90.png 729w, https:\/\/dmsretail.com\/RetailNews\/wp-content\/uploads\/2022\/05\/RETAIL-ONLINE-TRAINING-728-X-90-300x37.png 300w\" sizes=\"auto, (max-width: 729px) 100vw, 729px\" \/><\/a><\/p><br \/>\n<\/p>\n<div>\n<p><span data-contrast=\"auto\">As policymakers confront new cybersecurity challenges from emerging technologies like AI and quantum computing, an urgent threat hides in plain sight\u2014end-of-Life (EoL) technology beyond its supported lifespan. Headlines focus on novel threats and futuristic defenses, while outdated network equipment and software in critical infrastructure already pose a clear and present danger. This is demonstrated by high-profile nation-state sponsored campaigns targeting unpatchable technology\u2014such as Volt Typhoon. Addressing this threat requires urgent and focused attention, beginning with a common understanding of the size and scope of the problem. <\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">When technology reaches the scheduled\u00a0EoL, vendors stop providing security patches or support. Continued reliance on unsupported technology creates a significant and growing risk of exploitation.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Available estimates suggest that globally, nearly half of business network infrastructure assets were aging or already obsolete at the beginning of this decade. To date, there has been inadequate data to effectively assess how this exposure varies across critical sectors and national markets, or to compare the risks of failing to manage \u201ctechnical debt\u201d against the costs of replacement investments.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"lazy lazy-hidden  wp-image-481964 alignright\" data-lazy-type=\"image\" src=\"https:\/\/blogs.cisco.com\/gcs\/ciscoblogs\/1\/2025\/11\/pqnkE8KK-Untitled-10-213x300.png\" alt=\"Update Critical report\" width=\"315\" height=\"443\" srcset=\"\" sizes=\"auto, (max-width: 315px) 100vw, 315px\"\/><noscript><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-481964 alignright\" src=\"https:\/\/blogs.cisco.com\/gcs\/ciscoblogs\/1\/2025\/11\/pqnkE8KK-Untitled-10-213x300.png\" alt=\"Update Critical report\" width=\"315\" height=\"443\" srcset=\"https:\/\/blogs.cisco.com\/gcs\/ciscoblogs\/1\/2025\/11\/pqnkE8KK-Untitled-10-213x300.png 213w, https:\/\/blogs.cisco.com\/gcs\/ciscoblogs\/1\/2025\/11\/pqnkE8KK-Untitled-10.png 529w\" sizes=\"auto, (max-width: 315px) 100vw, 315px\"\/><\/noscript><\/p>\n<h2><b><span data-contrast=\"auto\">New Research Fills a Critical Gap<\/span><\/b><\/h2>\n<p><span data-contrast=\"auto\">WPI Strategy\u2019s <span data-contrast=\"none\">report, \u201cUpdate Critical: Counting the Cost of Cybersecurity Risks from End-<\/span><\/span><span data-contrast=\"none\">of-Life Techno<\/span><span data-contrast=\"none\">logy on Critical National Infrastructure,\u201d<\/span><span data-contrast=\"auto\"> highlights this growing global challenge and offers recommendations for policymakers and private sector l<\/span><span data-contrast=\"auto\">eaders. Commissioned by Cisco, this research provides a novel approach to comparative analysis of EoL risk across\u00a0<\/span><span data-contrast=\"auto\">key markets (US, UK,\u00a0France,\u00a0Germany\u00a0and Japan) and critical sectors including healthcare, energy, water, manufacturing, and finance.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The findings are\u00a0staggering.\u00a0I<\/span><span data-contrast=\"none\">n the U.S., 80% of federal IT spending goes to operating and maintaining existing\u2014often legacy\u2014systems, increasing risk to critical infrastructure. Some <\/span>60% of EU cyber breaches in 2022-2023 exploited known vulnerabilities for which patches existed but were not applied, underscoring that basic cyber hygiene remains a fundamental challenge. The report examined countries and sectors, with healthcare consistently emerging as particularly vulnerable. It found that proactively tackling EoL technology offers a clear, strategic route to significantly raise cyber resilience across critical sectors\u2014and that by addressing vulnerabilities before they are exploited, we can better protect essential services and citizens.<\/p>\n<h2><strong>Practical Policy Recommendations<\/strong><\/h2>\n<p><span data-contrast=\"auto\">As governments and the private sector\u00a0consider how\u00a0to\u00a0best\u00a0allocate\u00a0resources\u00a0and securely\u00a0deploy\u00a0AI, the report offers several actionable recommendations:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<ul>\n<li><b><span data-contrast=\"auto\">Asset Management as Foundation<\/span><\/b><span data-contrast=\"auto\">:\u00a0All\u00a0critical infrastructure operators\u00a0should\u00a0maintain\u00a0live technology asset registers that\u00a0identify\u00a0equipment approaching or at end-of-life status. You\u00a0can\u2019t\u00a0manage what you\u00a0can\u2019t\u00a0see.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/li>\n<li><b><span data-contrast=\"auto\">Clear Lifecycle Management<\/span><\/b><span data-contrast=\"auto\">\u00a0<\/span><b><span data-contrast=\"auto\">Assessments<\/span><\/b><span data-contrast=\"auto\">:\u00a0Operators\u00a0should\u00a0continually\u00a0assess whether aging technology should be replaced or, if replacement\u00a0isn\u2019t\u00a0immediately\u00a0feasible, require documented risk mitigation plans with specific timelines.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/li>\n<li><b><span data-contrast=\"auto\">Enhanced Incident Reporting<\/span><\/b><span data-contrast=\"auto\">: Where incident reporting mechanisms exist, ensure they capture data on\u00a0EoL\u00a0technology\u2019s role in breaches. This transparency creates accountability and helps\u00a0identify\u00a0systemic patterns.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/li>\n<li><b><span data-contrast=\"auto\">Reform IT Investment Models<\/span><\/b><span data-contrast=\"auto\">:\u00a0I<\/span><span data-contrast=\"none\">n the public sector, technology funding is typically divided into two separate budgets: one for buying new systems (capital expenditure) and another for\u00a0maintaining\u00a0existing ones (operational costs). This approach\u00a0can\u00a0lead to\u00a0most\u00a0of the budget being used just to keep current systems running, leaving little room to invest in\u00a0new technologies. To address this, governments should consider whether subscription or consumption-based models offer cost efficiency and security benefits.<\/span><\/li>\n<\/ul>\n<h2><b><span data-contrast=\"auto\">The Path Forward<\/span><\/b><\/h2>\n<p><span data-contrast=\"auto\">This research is particularly relevant not only during Critical Infrastructure Security and Resilience Awareness Month but also as nations invest in quantum-resistant encryption and AI infrastructure\u2014and work to more efficiently deliver services to citizens. These initiatives will falter if built on foundations riddled with obsolete, unpatched technology and where budgets are consumed maintaining aging systems rather than remediating them. Equipment quietly running in server rooms may not show up on balance sheets, but from a security standpoint, they are shadow liabilities.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">This research provides policymakers\u00a0and the private sector\u00a0with both the evidence base and practical frameworks to address this challenge systematically. By\u00a0improving\u00a0visibility into technology lifecycles, reforming funding models, and\u00a0establishing\u00a0clear management requirements, we can shift from reactive incident response to proactive risk reduction\u2014tackling vulnerabilities before they can be exploited.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">To that end, Cisco is focused on ensuring governments and organizations have the secure, resilient, and data-ready infrastructure needed to harness AI and defend against evolving cyber threats. Cisco is driving resilient infrastructure through a new effort that Cisco SVP and Chief Security &amp; Trust Officer Anthony Grieco announced today to increase the default security of our own products by removing capabilities that become recognized as insecure and introducing new security features that strengthen the security posture of network infrastructure as well as provide better visibility into the activities of threat actors. Cisco is also calling on customers, partners, and other organizations to evaluate their high-risk behaviors and update outdated technologies to tackle technical debt and improve infrastructure resilience as we unlock this AI era.\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"auto\">Read the report:\u00a0<\/span><\/b><b><span data-contrast=\"none\">here.<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/h2>\n<\/p><\/div>\n<p><p><a href=\"https:\/\/dmsretail.com\/online-workshops-list\/\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-496\" src=\"https:\/\/dmsretail.com\/RetailNews\/wp-content\/uploads\/2022\/05\/RETAIL-ONLINE-TRAINING-728-X-90.png\" alt=\"Retail Online Training\" width=\"729\" height=\"91\" srcset=\"https:\/\/dmsretail.com\/RetailNews\/wp-content\/uploads\/2022\/05\/RETAIL-ONLINE-TRAINING-728-X-90.png 729w, https:\/\/dmsretail.com\/RetailNews\/wp-content\/uploads\/2022\/05\/RETAIL-ONLINE-TRAINING-728-X-90-300x37.png 300w\" sizes=\"auto, (max-width: 729px) 100vw, 729px\" \/><\/a><\/p><br \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As policymakers confront new cybersecurity challenges from emerging technologies like AI and quantum computing, an urgent threat hides in plain sight\u2014end-of-Life (EoL) technology beyond its [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":16270,"comment_status":"","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"tags":[],"class_list":["post-16269","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technology"],"_links":{"self":[{"href":"https:\/\/dmsretail.com\/RetailNews\/wp-json\/wp\/v2\/posts\/16269","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dmsretail.com\/RetailNews\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dmsretail.com\/RetailNews\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dmsretail.com\/RetailNews\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/dmsretail.com\/RetailNews\/wp-json\/wp\/v2\/comments?post=16269"}],"version-history":[{"count":0,"href":"https:\/\/dmsretail.com\/RetailNews\/wp-json\/wp\/v2\/posts\/16269\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dmsretail.com\/RetailNews\/wp-json\/wp\/v2\/media\/16270"}],"wp:attachment":[{"href":"https:\/\/dmsretail.com\/RetailNews\/wp-json\/wp\/v2\/media?parent=16269"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dmsretail.com\/RetailNews\/wp-json\/wp\/v2\/categories?post=16269"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dmsretail.com\/RetailNews\/wp-json\/wp\/v2\/tags?post=16269"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}