Palo Alto firewalls come with a default master key used to encrypt passwords, secrets, and certificates. If your firewall is compromised or someone gains unauthorized access, they can easily decrypt these secrets, posing a significant security risk. In this blog post, let's explore why you should change the master key, important considerations, and how to configure it. Let's get started.
Palo Alto firewalls come with a default master key. Anyone with unauthorized access to the firewall can easily decrypt your secrets or export the configuration to another firewall to retrieve those secrets. For this reason, Palo Alto strongly recommends changing the master key as soon as possible.
Configuring the master key isn’t something you can just set and forget; it requires careful consideration. Here are some important points to keep in mind.
No doubt you’ve seen the news that Intel has parted ways with Pat Gelsinger. There is a lot of info to unpack on that particular story but we did a good job of covering it on the Rundown this week. What I really wanted to talk about was a quote that I brought up in the episode that I heard from my friend Michael Bushong a couple of months ago:
No one cuts their way back into relevance.
It’s been rattling around in my head for a while and I wanted to talk about why he’s absolutely right.
Do you remember the coupon clipping craze of ten years ago? I think it started from some show on TLC about people that were ultra crazy couponers. They would do the math and they could buy like 100 lbs of rice for $2. They would stock up on a year’s worth of toothpaste at a time because you could pay next to nothing for it. However, the trend died out after a year or so. In part, that was because the show wasn’t very exciting after the shock of buying two years of hand soap wore off. The other Continue reading
Internet Exchange Points (IXPs) are one of the key centers of Internet infrastructure. How do IXPs work together to build this critical infrastructure? Through ICP associations, such as the African IXP Association. Ricardo Simba joins Tom Ammon and Russ White to talk about a recent meeting of the African IXP Association.
download
This probably happens more than we know, but sometimes OEMs and ODMs walk away from big deals because something is fishy. …
HPE Walks Away From Risky $700 Million AI Deal was written by Timothy Prickett Morgan at The Next Platform.
There is a fractal nature in modern computing that is only becoming more and more apparent as workloads have long since outstripped the capacity of a single server. …
The Datacenter Is The Accelerator was written by Timothy Prickett Morgan at The Next Platform.
COMMISSIONED: As an IT leader, you know that data management is one of the critical ingredients for cultivating successful AI initiatives. …
From RAG To Fine-Tuning, Data Management Enriches AI Results was written by Timothy Prickett Morgan at The Next Platform.
The Internet is built on the mutual understanding of network protocols and practices, and most of those protocols are defined using Request For Comments (RFC) or Best Common Practices (BCP) documents.
When I discovered GitHub Codespaces (thanks to a pointer by Roman Dodin), I did the absolute minimum of research to get netlab up and running in a container to enable Codespaces-based labs (BGP, IS-IS) and netlab examples.
However, if you want to know the behind-the-scenes details, you MUST read the Codespaces for Network Engineers and Educators deep dive by Julio Perez.
It is hard to bet against the GenAI boom, and thus far it is also hard for anyone other than Nvidia to profit from it. …
Marvell Pivots To AI Silicon, Looks Poised To Profit was written by Timothy Prickett Morgan at The Next Platform.
This blog post discusses an old arcane question that has been nagging me from the bottom of my Inbox for almost exactly four years. Please skip it if it sounds like Latin to you, but if you happen to be one of those readers who know what I’m talking about, I’d appreciate your comments.
Terminology first:
Here’s (in a nutshell) how PIC Edge is supposed to work:
When the hyperscalers and cloud builders were smaller and the Arm collective had failed to storm the datacenter and AMD was not yet on its path to resurgence, it was Intel that controlled the cadence of new compute engine introductions into the datacenter. …
AWS Reaps The Benefits Of The Custom Silicon It Has Sown was written by Timothy Prickett Morgan at The Next Platform.
In 2024, Thanksgiving (November 28), Black Friday (November 29), and Cyber Monday (December 2) significantly impacted Internet traffic, similar to trends seen in 2023 and previous years. This year, Thanksgiving in the US drove a 20% drop in daily traffic compared to the previous week, with a notable 33% dip at 15:45 ET. In contrast, Black Friday and Cyber Monday drove traffic spikes. But how global is this trend, and do attacks increase during Cyber Week?
At Cloudflare, we manage and protect a substantial amount of traffic for our customers, providing a unique vantage point to analyze traffic and attack patterns across the Internet. This perspective reveals insights like Cyber Monday being the busiest Internet traffic day of 2024 globally, followed by Black Friday, with patterns varying across countries. Notably, global HTTP request volume on Cyber Monday 2024 was 36% higher than 2023, with 5% of that traffic blocked as potential attacks.
For this analysis, we examined anonymized and aggregated HTTP requests and DNS queries across our network to uncover key patterns. Cyber Monday, December 2, was the day with peak traffic, and key findings for that day include:
Cloudflare processed a peak of 99.8 million HTTP requests per Continue reading