All blog posts
Page 5 of 50
-
Why Paying Copyright Holders for AI Training is Essential
AI and creator rights don’t need to clash. A fair, consent-based model can drive innovation without exploiting creative work.

-
AI Bots in Q2 2025: Trends from Fastly's Threat Insights Report
Fastly's Q2 2025 Threat Insights Report uncovers how Meta, OpenAI, and others are shaping web traffic and what organizations need to do to stay in control.

-
The Truth About Blocking AI, And How Publishers Can Still Win
Many AI crawlers aren’t following the rules, and robots.txt can’t stop them. Blocking Google’s AI means killing your SEO, but publishers aren’t completely out of options. Edge control is becoming their last real defense.

-
DDoS in July
July 2025 DDoS attack trends: Fastly's report reveals infrequent but massive enterprise attacks & insights on attack volume, industries targeted, and company size.

-
Best WAF Solutions - 2025/2026
Discover the best WAF solutions for 2026. Compare Fastly, Cloudflare, Akamai, Imperva, F5, Fortinet and more for web app, API and microservice protection.

-
Best Bot Management Solutions 2025 - 2026
Discover the top bot management solutions for stopping scraping, credential stuffing, API abuse and AI-driven bot attacks.

-
Bot Protection: Guide to bots, bot attack types and how to stop them
Learn how bot protection works, the difference between good and bad bots, common bot attack types and the best methods to stop malicious bots.

-
Request Collapsing Demystified
Boost website performance with request collapsing! Learn how it improves efficiency, reduces origin load, and optimizes caching for a snappy user experience.

-
Maximizing Compute Performance with Log Explorer & Insights
Monitor and troubleshoot Fastly Compute services with Log Explorer & Insights. Gain granular insights, optimize performance, and debug faster for efficient applications.

-
Demystifying Fastly’s Defense Against HTTP Desynchronization Attacks
Learn how Fastly's robust architecture and strict protocol parsing defend against HTTP desynchronization attacks, ensuring your web applications are secure.

-
Trust at Scale with Fastly Image Optimizer and C2PA
Fastly Image Optimizer now supports C2PA, enabling verifiable content authenticity. Combat misinformation and build trust with secure image provenance at scale.

-
Fastest Sites Run on Fastly
Make your site 25%+ faster with Fastly’s programmable edge. See why the fastest media sites — from Vox.com to Business Insider — run on Fastly.

-
Fastly's Resilience to HTTP/1.1 Desynchronization Attacks
Discover why Fastly's architecture protects against HTTP/1.1 desynchronization attacks, unlike other CDNs. Protect your applications with Fastly's secure platform.

-
Fastly is easier than ever to use with our Model Context Protocol (MCP) Server
Manage Fastly with ease using the new open-source Model Context Protocol (MCP) Server. Integrate with AI assistants for conversational control of your services.
-
Make Attackers Cry: Outsmart Them With Deception
Fight cyber attackers with deception! Fastly's Next-Gen WAF introduces a new "Deception" action to outsmart and frustrate attackers, turning the tables on them.

-
Navigating the Privacy-Performance Paradox
Empower publishers to thrive in a privacy-first world with Trusted Server, built on Fastly Compute. Reclaim control of ad strategy and data.

-
ETags: What they are, and how to use them
How to optimize your ETags to speed up your site and reduce calls to your origin without requiring significant code refactoring or content overhaul.
-
ToolShell Remote Code Execution in Microsoft SharePoint: CVE-2025-53770 & CVE-2025-53771
Microsoft revealed two critical vulnerabilities, CVE-2025-53771 and CVE-2025-53770, actively exploited to compromise SharePoint servers.

-
DDoS in June
June’s DDoS report reveals a 250B+ request attack on a High Tech provider and the rise of the Byline Banshee. Get key insights & actionable guidance.

-
How Apps Can Respect Privacy While Still Getting Personal
Learn how apps can offer personalized experiences without compromising user privacy. Solutions like Private Access Tokens, OHTTP, and MASQUE Relay protect data without harming user experience.
















