Follow and Subscribe

Featured

November 11

Compute@Edge, our serverless compute environment, can be used to solve headaches dealing with attackers looking to modify and manipulate resources. In this post, we tell you how.

November 8

Fastly customers have been using our Fiddle tool for years to try out ideas for edge logic in VCL. With the advent of Compute@Edge last year, we made our edge compute network accessible to…

November 1

Compute@Edge is now available for everyone to use, and we’re throwing in free credits so you can explore the platform with no strings attached. Read on for a crash course in how to stand up…

October 27

Known for having an execution speed 100 times faster than other solutions and unmatched isolation technology security, Compute@Edge was named a Leader in the Forrester New Wave: Edge…

October 18

Our Security Research Team provides guidance on how to address CVE-2021-40438, a vulnerability in Apache HTTP Server version 2.4.48 and earlier, by patching impacted version(s) and enabling…

October 13

It’s important for companies and end users to monitor and understand internet outages so they can spot patterns, understand trends, and help mitigate disruptions. At Fastly, we monitor these…

October 11

The Coalition for Content Provenance and Authenticity (C2PA) develops technology to combat disinformation. Recently, the group released a public draft specification designed to make it…

October 7

The recent Apache HTTP Server vulnerability (CVE-2021-41773) is reportedly being exploited in the wild. Fastly already detects this vulnerability, but our next-gen WAF customers can also…

October 4

Organizations implementing DevOps practices often sacrifice security for speed, exposing them to potential threats. In reality though, many DevOps practices are already primed for security…

September 30

Forrester’s 2021 Annual State of Application Security Report stresses the need for updated application security tools that can be easily integrated into development plans and architecture.

September 7

Many companies are still relying on legacy rules-based web application firewalls that can make scaling difficult and, in some cases, cause more problems than they solve with false positives…