Blog

Follow and Subscribe

More stories

May 12, 2021
Zig is a general purpose programming language, meaning that if you have in front of you something that looks like a Von Neumann-ish, Turing-complete machine, you should be able to…
May 10, 2021
GitHub Actions for Compute@Edge allow you to transition from a manually deployed application to a fully automated deployment workflow with ease and wrap the Fastly CLI to provide an easy way…
May 7, 2021
It's always been possible to create content programmatically, and with the advent of our serverless compute environment, we've made it possible to create and transform content more…
May 5, 2021
Throwing new security tools at new threats results in scattershot protection and builds technical debt. Organizations need uniform protection for applications and APIs, regardless of where…
May 3, 2021
New Fastly next-gen WAF dashboards surface security telemetry from more than 20 new signals for advanced attack scenarios, such as account takeover, credit card validation, and password…
April 21, 2021
Fastly now offers logging support for Amazon Kinesis Data Streams, as well as AWS Identity and Access Management (IAM) functionality for S3 and Kinesis logging endpoints.
April 19, 2021
id Software’s DOOM has become one of the most-ported games in history. It felt like a perfect project to port to Compute@Edge, built on our serverless compute environment, to experiment with…
April 16, 2021
Layer 7 is a primary battleground for web application and API security. Fastly and Okta have partnered together to share threat intelligence, so security and development teams can better…
April 14, 2021
Vox Media, Mux, and PerimeterX share how Compute@Edge is unlocking performance, agility, and creativity across their organizations.
April 12, 2021
Explore how leaders from both sides of the aisle have built thriving secure DevOps cultures by putting trust in people first.
April 8, 2021
Teams can now automate their Fastly TLS workflows through Terraform — including issuing certificates, retrieving TLS details, and performing other updates.
April 6, 2021
The basic concept of performing authentication and then using identity data to make authorization decisions is something that applies to a large majority of web and native apps. Doing this…