Follow and Subscribe

Security

September 6, 2022
Fastly Recognized in the Gartner® Magic Quadrant™ for Web Application and API Protection
September 1, 2022
Fastly announced a reseller partnership with HUMAN Security, Inc. to better safeguard enterprises and internet platforms from sophisticated bot attacks and fraud. We sat down with HUMAN CEO…
August 29, 2022
If your application is on the internet, chances are it has been subjected to nefarious automation. These events can include many different attacks – including content scraping, credential…
August 22, 2022
Learn how you can use your next-gen WAF effectively, along with best practices.
August 11, 2022
The world changed when the pandemic hit in 2020, leaving organizations unsure of how it would affect the future. Security leaders may have found themselves wondering if their long-standing…
July 20, 2022
TLS fingerprinting has become a prevalent tool to help security defenders identify what clients are talking to their server infrastructure.
June 30, 2022
Traditional web application firewalls (WAFs) were created to stop malicious traffic from reaching your origin servers, which served its purpose well during an internet age of HTML and PNGs.
June 7, 2022
The RSA Conference (#RSAC) is here again, and we at Fastly couldn’t be more excited. It’s the first time the world-leading conference has been in-person since 2020, and we are thrilled to be…
May 31, 2022
From bureaucratic red tape to chained dependencies patching servers has been a pain in the industry for years. This is why WAF-based virtual patching was introduced.
May 26, 2022
Every Thursday in March, we hosted industry thought leaders on “The Dept. of Know Live!” Web Series to chat about trends in web app and API security. Read on to learn more about our…
May 3, 2022
Threat hunting is the practice of looking for active attackers who have possibly penetrated security boundaries within an organization. WAF data can be a valuable resource in threat hunting…
April 19, 2022
This post will illuminate how deadlock bugs emerge, some facets of their fascinating and frustrating strangeness, and guidance on how to handle them in your own systems.

Ready to get started?

Get in touch or create an account.