Security blog

May 3

Threat hunting is the practice of looking for active attackers who have possibly penetrated security boundaries within an organization. WAF data can be a valuable resource in threat hunting…

April 19

This post will illuminate how deadlock bugs emerge, some facets of their fascinating and frustrating strangeness, and guidance on how to handle them in your own systems.

April 7

Today, we’re happy to announce the launch of Fastly Security Labs, a new program that empowers customers to continuously innovate by being the first to test new detection and security…

April 5

Founder of Unsupervised Learning Daniel Miessler joined hosts Kelly Shortridge and Bea Hughes on The Dept. of Know Live! to chat about why we can’t ignore asset management’s role in security…

March 31

In this post, we review details for two RCE vulnerabilities impacting Spring Cloud and Spring Framework, including how Fastly customers can protect themselves from this vulnerability.

March 31

GraphQL is fast gaining popularity, and we’re excited to announce that we now support GraphQL Inspection in our Fastly Next-Gen WAF (powered by Signal Sciences).

March 29

Ellen Körbes, Senior Product Line Manager at VMware Tanzu Kubernetes, joined hosts Kelly Shortridge and Bea Hughes on The Dept. of Know Live! to chat about how security falls short of…

March 28

The Fastly Next-Gen WAF is now the only WAF on the market to be Arm compatible at scale in any environment, allowing you to deploy our security solution in environments using Arm-based…

March 23

With this year’s achievement, we are the only vendor to be named a Customers’ Choice in the Gartner Peer Insights™ “Voice of the Customer” Web Application and API Protection report for four…

March 22

Betterment Staff Security Engineer Omar joined hosts Kelly Shortridge and Bea Hughes on The Dept. of Know Live! to chat about why building more modern applications means building secure ones…

March 15

JupiterOne CISO and Head of Research Sounil Yu joined hosts Kelly Shortridge and Bea Hughes on The Dept. of Know Live! to chat about how to make security an enabler of innovation. In this…

March 8

While there’s no magic answer to stop all cyberattacks, there are a number of principles used in a defense-in-depth strategy that can be put in place ahead of a possible attack to limit its…