Today, we launched Fastly Secure packages, a unified web app and API security solution that provides “right-sized” protection for any organization at a spend level that works for a variety…
Here are four repeatable steps that will help you pay down your security technical debt, make your apps and APIs more secure, and move you toward consolidated security tooling.
As the internet landscape gets more complex, more API driven, and more distributed, many security and IT professionals are left wondering — why aren’t the security tools that were good…
The Fastly Games compare countries in four data-driven events based on aggregated network traffic: IPv6 adoption, HTTP versions, operating system (OS) versions, and browser versions.
Compute@Edge local testing gives you the flexibility to run your work-in-progress applications locally on your laptops, servers, or CI systems, in an environment similar to production, but…
We released a new report today in partnership with ESG Research that reveals some fascinating insights into the state of web application security tooling.
During the second quarter of 2021, a number of internet disruptions were observed around the world for a variety of planned and unplanned reasons. Here’s what we saw.
As you start to build more at the edge, it becomes ever more important to deploy edge logic in the same way you deploy changes to your own applications and infrastructure. Today, we’ll take…
Origin Inspector enables granular visibility of egress traffic received from your origins by our edge cloud, allowing you to effortlessly report — in real-time — every origin response, byte…
Requests passing through Fastly can be transformed in many ways. In this example, we’ll show you how to use enriched requests and our next-gen WAF to help you make more informed security…
Our new Response Security Service provides direct, 24/7 access to our Customer Security Operations Center to help you prepare for and respond when you suspect an attack.
After years of helping protect companies across a variety of industries, we’ve come to recognize four common risk attack types. Here’s how they work and how to counter them.