Fastly and Signal Sciences have joined forces to build the next generation of web app and API security at the edge. Explore what makes our approach different, and how it will empower…
DDoS attacks have been growing larger over the past few years. But so has the industry’s response to them. In this post, we take a look at what industry bodies and a modern CDN can do to…
The TLS Support Engineering team provides support for customers managing one to thousands of certificates. After helping so many customers tailor their DNS and TLS configurations, they have…
Layer 7 attacks that target applications and issue requests that can swamp origin systems often seek to blend into other network traffic and require a more focused defense than Layer 3 and…
We believe Signal Sciences’ innovation earned them recognition in the 2019 Gartner Magic Quadrant for WAF, and it’s this kind of innovation that excites us as we merge forces — now that…
The largest category of difficult-to-anticipate security design weaknesses come from side-channel attacks. In this post, we take a tour of some of the more foundational and out-there side…
Today, Fastly completed the acquisition of Signal Sciences and took a giant step forward toward our vision of modern, unified web application and API security. We will call on our shared…
Web application firewalls are a key part of any DevOps software development cycle, allowing developers to make explicit assumptions about deployment, delivering intelligence on attacks, and…
Security has always been a part of Fastly’s DNA, not just within products, but in our vision of trust and safety as a modern platform. Today, we are pleased to announce that we have…
Fastly CISO Mike Johnson and Brave Software Senior DevOps Engineer Ben Kero share their practical advice for cementing more holistic security practices within your CI/CD pipeline.
When it comes to the size of the encryption keys used in server certificates, bigger isn’t necessarily better. In this post, we explore why this is the case by examining the function of the…
If you’re evaluating web application security tools exclusively for their security requirements, you may be missing one of the most essential opportunities to successfully grow your secure…