Blog

Follow and Subscribe

More stories

January 5, 2022
We’re introducing Cloud Deploy, a wizard that helps you start building on Compute@Edge by deploying and customizing templates, and sets you up with an automated deployment workflow and best…
December 22, 2021
In this post, we’ll take a look back at the past year through the eyes of our edge cloud network to explore what we saw across new protocol adoption, security initiatives, network growth…
December 20, 2021
By bringing your content closer to the reader, you bypass the conventional cost and rules associated with server space and infrastructure maintenance, and you gain some additional benefits…
December 15, 2021
Origin Inspector provides you with a dataset and visualizations that offer real-time and historical visibility into responses delivered from your origin servers to our edge cloud. And we’re…
December 14, 2021
Our new WAF efficacy framework provides a standardized way to measure the effectiveness of a WAF’s detection capabilities through continuous verification and validation. Here’s how it works.
December 14, 2021
We’re sharing our latest data and new insights into the Log4j/Log4Shell vulnerability (CVE-2021-44228 + CVE-2021-45046) in this post in order to help the engineering community cope with the…
December 10, 2021
CVE-2021-44228 is a Remote Code Execution vulnerability in the Apache Log4j library being actively exploited. We provide our observations into the exploit and a summary of its impact.
December 9, 2021
The web’s infrastructure — and the applications we build on it — must constantly evolve to meet the ever-transforming expectations of modern and future end users. We’ve gathered five lessons…
December 7, 2021
In this post, we’ll show how you can use information from an origin response to add an abuse IP address to our penalty box. We've been touting the promise of security at the edge, and this…
December 6, 2021
A couple of weeks ago Cloudflare, one of our competitors, claimed that their edge compute platform is roughly three times as fast as Compute@Edge. The false claim is a great example of how…
December 3, 2021
We analyzed traffic from Thanksgiving Thursday to Cyber Monday in order to understand the traffic, buying, and security trends of ecommerce's big week.
December 1, 2021
To create more secure and resilient web experiences, we must design, build, and execute applications with security top of mind, and consider how the lessons of the past 30 years inform how…