Blog

Follow and Subscribe

More stories

September 27, 2022
Learn how the new authorization protocol, Private Access Tokens, is changing how DevOps teams and security professionals fight against fraudulent activity:
September 26, 2022
Easy friendship may be rare—especially when it comes to #privacy—but with Fastly + Glitch, we were there from day one. We have the same goal: a consistent, powerful and insightful #data…
September 23, 2022
The internet is an unprecedented venue for connecting with others, transacting business, learning and expressing ourselves. However, some of the fundamental mechanics of the web lend…
September 21, 2022
With our new next-compute-js library, you can now host your Next.js application on our Compute@Edge platform – giving you the benefits of both the Next.js developer experience and our…
September 20, 2022
Our Compute JavaScript platform provides Request and Response objects, but these are based on the Fetch standard, rather than the req and res objects traditionally seen in Node.js programs…
September 16, 2022
Many of the world's websites are static, and Fastly’s content delivery network gets those pages from origin to visitors quickly. But what if we took the origin out of the equation?
September 14, 2022
By using Compute to pre-warm the cache, you are not only using a powerful, globally distributed network to do the work, but you also solve the pitfalls associated with legacy prefetch.
September 14, 2022
WAF deployment flexibility is critical to keep up with the pace of business. That’s why we innovate on the widest range of WAF deployment methods in the market.
September 6, 2022
With streaming now the most common way for viewers to watch content, the modern broadcaster needs to focus on scalability, resiliency, and security.
September 6, 2022
Fastly Recognized in the Gartner® Magic Quadrant™ for Web Application and API Protection
September 1, 2022
Fastly announced a reseller partnership with HUMAN Security, Inc. to better safeguard enterprises and internet platforms from sophisticated bot attacks and fraud. We sat down with HUMAN CEO…
August 29, 2022
If your application is on the internet, chances are it has been subjected to nefarious automation. These events can include many different attacks – including content scraping, credential…

Ready to get started?

Get in touch or create an account.