Security blog

August 3, 2023
Black Hat 2023 is just around the corner! Come visit the Fastly booth and join us for exciting presentations and giveaways.
August 3, 2023
Announcing the Network Effect Threat Report, Fastly’s threat intelligence report with insights based on unique data from April to June of 2023
August 2, 2023
The Cache Hit Ratio has usually been understood as a performance metric, but there are also serious security benefits that come with improving your CHR!
July 19, 2023
Forrester Consulting conducted a Total Economic Impact™ (TEI) study, commissioned by Fastly in July 2023, to understand the potential return on investment (ROI) that organizations may…
July 11, 2023
What is an OS Command Injection? In this blog, we'll explore the web application vulnerability, OS Command Injection, and how to prevent it.
July 6, 2023
We are pleased to announce that Origin Inspector, Fastly’s turnkey origin visibility product, is now available to Compute customers.
June 27, 2023
This designation recognizes that Fastly has demonstrated proven technology and deep expertise that helps customers achieve their cloud security goals.
June 9, 2023
What you need to know about CVE-2023-34362: Progress MOVEit Transfer SQL Injection Vulnerability
June 7, 2023
Edge computing is rapidly transforming how businesses operate, including mitigating security threats. Learn how to get ahead of attackers with Fastly.
May 31, 2023
If we want to outmaneuver attackers, then we must progress beyond regex into a more modern era of detection.
May 10, 2023
We are excited to announce the general availability of Mutual TLS (mTLS) support from Fastly, providing two-way authentication and encryption of network communication.
May 1, 2023
Use Advanced Rate Limiting with edge deployments of Fastly’s Next-Gen WAF for easier, stronger protection against fraud and abuse.

Ready to get started?

Get in touch or create an account.