Blog

Follow and Subscribe

More stories

May 9, 2016
We’re pleased to announce the Alpha release of our Drupal 8 module, which allows for an even tighter integration with core Fastly features. We look forward to feedback from the Drupal…
April 27, 2016
We’re continuing to build on our unique ability to push your logic and decisions to the edge, and are happy to announce some exciting enhancements to our Edge Dictionaries. Our latest…
April 20, 2016
As a company, we’re centered around support and service. We were founded by operations engineers, for operations engineers, who set out to create the support experience they always wanted…
April 19, 2016
Heroku customers now have greater control and visibility of their Fastly service, with full access to the Fastly configuration panel, a command-line plugin for the Heroku toolbelt, and a…
April 13, 2016
We’re pleased to announce that we now send additional metrics from our On-the-fly Packaging (OTFP) service to provide more granular visibility into the packaging and delivery process. You…
April 7, 2016
In part 1, I discussed the general workflow the Threat Intelligence team at Fastly uses to plan for projects. After performing research and seeing what others have done in this space, we can…
March 28, 2016
We’ve recently restructured some of our internal engineering teams in an effort to improve shipping velocity, and dedicated resources are working on an HTTP/2 strategy that meets Fastly…
March 16, 2016
Building a great team is one of the most difficult challenges security managers encounter. Luckily, there are a few initiatives that make things easier on us, including the Information…
March 15, 2016
Event Logs help you keep track of key changes to your Fastly service, increasing visibility and improving troubleshooting.
March 3, 2016
On February 25, we hosted 50+ security researchers and engineers from the Bay Area and beyond in our San Francisco office for the first event in the Fastly Security Speaker Series. This…
February 23, 2016
Fastly Security Researcher Zack Allen discusses how you can draw from open source resources to build a lean and powerful Threat Intelligence plan for your organization.

Ready to get started?

Get in touch or create an account.