Authentication is one of the most obvious uses for edge computing. Understanding who your users are as early and as close as possible to their location yields powerful customizations and…
As Kubernetes has become widespread for container orchestration needs, it’s natural for security questions to arise. Here are answers to the Kubernetes questions we hear most often.
We recently discovered a compiler bug in part of the WebAssembly compiler that we use for Compute@Edge, that could have allowed a WebAssembly module to access memory outside of its sandboxed…
Online payments giant PayPal uses Fastly’s edge platform to deliver a more secure, faster, and more reliable user experience at a time when digital payments are surging.
Following the DRY principle isn’t just for engineers. It also cuts the time it takes to make updates in multiple places and reduces errors for our documentation team.
Over the past few months, we’ve rolled out a series of design improvements focused on text readability, easing eye-strain, and providing a seamless brand experience.
Zig is a general purpose programming language, meaning that if you have in front of you something that looks like a Von Neumann-ish, Turing-complete machine, you should be able to…
GitHub Actions for Compute@Edge allow you to transition from a manually deployed application to a fully automated deployment workflow with ease and wrap the Fastly CLI to provide an easy way…
It's always been possible to create content programmatically, and with the advent of our serverless compute environment, we've made it possible to create and transform content more…
Throwing new security tools at new threats results in scattershot protection and builds technical debt. Organizations need uniform protection for applications and APIs, regardless of where…
New Fastly next-gen WAF dashboards surface security telemetry from more than 20 new signals for advanced attack scenarios, such as account takeover, credit card validation, and password…
Fastly now offers logging support for Amazon Kinesis Data Streams, as well as AWS Identity and Access Management (IAM) functionality for S3 and Kinesis logging endpoints.