Revenir au blog

Follow and Subscribe

Sécurité

Page 5

  • Request enrichment helps identify user data | Fastly

    Brooks Cunningham

    Requests passing through Fastly can be transformed in many ways. In this example, we’ll show you how to use enriched requests and our next-gen WAF to help you make more informed security decisions.

    Produit
    Sécurité
  • Introducing Response Security Service

    Kevin Rollinson

    Our new Response Security Service provides direct, 24/7 access to our Customer Security Operations Center to help you prepare for and respond when you suspect an attack.

    Sécurité
  • How to recognize and repel four high-risk attack types

    Brendon Macaraeg

    After years of helping protect companies across a variety of industries, we’ve come to recognize four common risk attack types. Here’s how they work and how to counter them.

    Sécurité
  • 4 Ways Legacy WAF Fails to Protect Your Apps

    Liz Hurder

    The legacy WAF isn’t ubiquitous because it’s the perfect technology. Its success comes down to being mandated, despite four ways it often fails.

    Sécurité
  • Suggestive signals: how to tell good bot traffic from bad

    Brendon Macaraeg

    While some bots are benign search engine crawlers or website health monitors, others are on the prowl with nefarious intent, looking to execute account takeovers and compromise APIs. In this post, we’ll look at how to tell them apart in order to allow the good bots and block the bad ones.

    Sécurité
  • Cranelift vetted for secure sandboxing in Compute@Edge | Fastly

    Pat Hickey, Chris Fallin, 1 de plus

    Alongside the Bytecode Alliance, Fastly’s WebAssembly team recently led a rigorous security assessment of Cranelift, an open-source, next-generation code generator for use in WebAssembly to provide sandbox security functionality.

    Informations sur le secteur
    3 de plus