Last week, CISA along with various national cyber security agencies released a comprehensive report detailing “Recommendations and Tactics to Safeguard Network Edge Devices.” [1] The report is informative yet carries a very corporate and “stoic” tone. It encapsulates solid, well-meaning guidance that can assist in protecting edge devices. However, upon reviewing it, I couldn’t help but ponder, “Is that all there is?” Not that I was anticipating groundbreaking strategies that could eradicate the risks associated with the abundance of obsolete equipment still marketed at often excessively high prices. However, perhaps a more pragmatic approach would be beneficial.
