Follow and Subscribe

Security

September 7, 2023
Managing certificates can be a timely process but thanks to Fastly's CA, Certainly, it just got a lot simpler. Take a deep dive into how it came to be.
August 29, 2023
Fastly is committed to ensuring safe and secure data transfers, which is why we are active participants in the new EU-US Data Privacy Framework (DPF).
August 22, 2023
In this post, we'll explore the application vulnerability directory traversal. What is it and how can you protect your apps from it?
August 3, 2023
Announcing the Network Effect Threat Report, Fastly’s threat intelligence report with insights based on unique data from April to June of 2023
August 3, 2023
Black Hat 2023 is just around the corner! Come visit the Fastly booth and join us for exciting presentations and giveaways.
August 2, 2023
The Cache Hit Ratio has usually been understood as a performance metric, but there are also serious security benefits that come with improving your CHR!
July 19, 2023
Forrester Consulting conducted a Total Economic Impact™ (TEI) study, commissioned by Fastly in July 2023, to understand the potential return on investment (ROI) that organizations may…
July 11, 2023
What is an OS Command Injection? In this blog, we'll explore the web application vulnerability, OS Command Injection, and how to prevent it.
July 6, 2023
We are pleased to announce that Origin Inspector, Fastly’s turnkey origin visibility product, is now available to Compute customers.
June 27, 2023
This designation recognizes that Fastly has demonstrated proven technology and deep expertise that helps customers achieve their cloud security goals.
June 9, 2023
What you need to know about CVE-2023-34362: Progress MOVEit Transfer SQL Injection Vulnerability
June 7, 2023
Edge computing is rapidly transforming how businesses operate, including mitigating security threats. Learn how to get ahead of attackers with Fastly.

Ready to get started?

Get in touch or create an account.