All blog posts
Page 11 of 50
-
The History of DDoS
Discover the impact of DDoS attacks on businesses. Learn how these disruptions can lead to financial losses, damaged reputations, and the importance of prevention.
-
AI Innovation and Sustainability: Key Takeaways from the AI Action Summit
Delve into the highlights of the AI Action Summit in Paris, where experts addressed pressing issues in AI, including ethics, regulation, and the sustainability of technology.

-
Super Bowl 2025: How Social Media Reacted in Real Time
Celebrate the success of Super Bowl LIX, the most-watched in history with 128 million viewers. Uncover the intriguing social media dynamics from this iconic event.

-
Built with Fastly: Northflank’s Developer Platform
Discover how Fastly empowers engineering teams to build and scale web applications, like startup Northflank, and how Fastly's products assist in reaching their goals.

-
The Open Web is Vibrant, and Vital to 2025
Explore Fastly's commitment to the open web and education, where ideas flourish into impactful online experiences. Check out what members of Fast Forward accomplished in 2024.

-
Profiling Fastly Compute Applications
Unlock superior web performance with Fastly Compute. Utilize our edge network and WebAssembly to build fast, secure applications tailored for your users.

-
Thanks to the internet’s on-call teams
Thank you for the essential role that on-call teams play in ensuring internet reliability and security, particularly during the holiday season. We appreciate your dedication.

-
The headers we don't want
HTTP headers are an important way of controlling how caches and browsers process your web content. But many are used incorrectly or pointlessly, which adds overhead at a critical time in the loading of your page, and may not work as you intended.
-
Lean Threat Intelligence, Part 4: Batch alerting
In Part 3, we showcased a technology that allows you to route messages to and from topics via Kafka. Now that data is flowing, how can you start monitoring and reacting to security events? In this post, we’ll show you a batch alerting strategy that you can use with Graylog and Kafka.
-
Battling log absurdity with Kafka
In “Lean Threat Intelligence Part 2: The foundation,” we explained how we built our log management system, Graylog, using Chef. Next, we’ll cover how we created a message pipeline that allows us to route messages to different endpoints for analysis or enrichment.
-
Lean Threat Intelligence Part 2: The foundation
In part 1, I discussed the general workflow the Threat Intelligence team at Fastly uses to plan for projects. After performing research and seeing what others have done in this space, we can now move forward with technology selection.
-
Diff at the edge with serverless cloud functions
Requesting the difference between two previously cached files — using just a CDN configuration and a serverless cloud compute function — is a great example of exploiting edge and serverless compute services to make your website more efficient and performant, and lower your bandwidth costs. Read on to learn more.
-
Cache hit ratios at the edge: a performance study
In an earlier post, we discussed the meaning of cache hit ratio (CHR) and analyzed what the metric is and isn’t telling us, showing why we really need two different CHR metrics (CHR-edge and CHR-global) to fully understand how a CDN is serving your clients. In this post, we’ll analyze CHR-edge by way of a discussion about performance measurement via testing.
-
Understanding the Vary header in the browser
Browsers need to understand and respond to Vary rules, and the way they do this is different from the way Vary is treated by CDNs. In this post, Principal Developer Advocate Andrew Betts explores the murky world of cache variation in the browser.
-
Fastly’s Edge Cloud Industry Reports: A Year in Review
Explore our industry reports on edge cloud strategies, addressing performance and security challenges. Unlock innovative solutions for common business challenges.

-
Hijacking the control flow of a WebAssembly program
While WebAssembly has already proven a fertile attack surface for the browser, as more web application code moves to WebAssembly from Javascript there will be a need to research and secure WebAssembly programs themselves. The WebAssembly design obviates common classes of attacks that might be inherited from development languages like C and C++, but there is still some room for exploitation. This tutorial will cover control flow protection guarantees provided by WebAssembly, known weaknesses, and how to use clang control flow integrity (CFI) in WebAssembly programs to mitigate some risks around control flow hijacks.
-
The truth about cache hit ratios
Cache hit ratio is a common metric that evaluates a CDN's performance. Learn more about how to improve your cache hit ratio.
-
A modular Edge Side Includes component for JavaScript Compute
Fastly’s ESI library for JavaScript, now available on npm, allows you to add powerful ESI processing to your application.
-
Fastly Named to Newsweek Excellence Index 2025
Fastly's inclusion in the 2025 Newsweek Excellence Index reflects our dedication to social responsibility and employee well-being, showcasing our commitment to excellence.

-
2024: End of Year Product Release Rewind
We’re always improving the Fastly platform to enable developers, security experts, and more! See an overview of the product releases that we unveiled in 2024.








