Blog

Follow and Subscribe

More stories

June 1

Our customers at the Guardian recently participated in an internal hack day with Compute@Edge to find creative solutions to business problems with the hands-on support of our team. Oliver…

June 1

Learn how Edgemesh leveraged Compute@Edge to help their customers improve load times, reduce bounce rates, and generate more sales.

May 31

From bureaucratic red tape to chained dependencies patching servers has been a pain in the industry for years. This is why WAF-based virtual patching was introduced.

May 26

Every Thursday in March, we hosted industry thought leaders on “The Dept. of Know Live!” Web Series to chat about trends in web app and API security. Read on to learn more about our…

May 19

Fastly is thrilled to announce it has acquired Glitch, with plans to continue fostering one of the most beloved developer communities on the web today.

May 11

Almost all webpages today load resources from origins other than the one the page came from, which can play havoc with the way your site loads and make it harder to write a strict Content…

May 9

We’re thrilled to announce that Fastly has been named a “Customers’ Choice” in the 2022 Gartner Peer Insights™ “Voice of the Customer”: Global CDN.

May 3

Threat hunting is the practice of looking for active attackers who have possibly penetrated security boundaries within an organization. WAF data can be a valuable resource in threat hunting…

May 2

At Fastly, we design for a delightful enterprise experience by looking deeply at customer needs. In this post, our Director of Product Experience shares some of the similarities and…

April 29

QUIC version 1 is officially formalized, and QUIC deployments will now move away from using temporary draft versions to the newly minted version 1.

April 28

Fastly’s Observability Dashboard allows you to analyze all your edge delivery metrics and observability data in one interactive window. In this blog, learn more about the dashboard, now in…

April 19

This post will illuminate how deadlock bugs emerge, some facets of their fascinating and frustrating strangeness, and guidance on how to handle them in your own systems.