Security blog

August 27

Security has always been a part of Fastly’s DNA, not just within products, but in our vision of trust and safety as a modern platform. Today, we are pleased to announce that we have…

August 17

Fastly CISO Mike Johnson and Brave Software Senior DevOps Engineer Ben Kero share their practical advice for cementing more holistic security practices within your CI/CD pipeline.

August 10

When it comes to the size of the encryption keys used in server certificates, bigger isn’t necessarily better. In this post, we explore why this is the case by examining the function of the…

August 5

If you’re evaluating web application security tools exclusively for their security requirements, you may be missing one of the most essential opportunities to successfully grow your secure…

August 3

Fastly's heritage of security runs deep — far beyond our portfolio of web application and API security products. Our philosophy of developer empowerment, focus on community, and values…

June 29

Building our own compiler toolchain allows Compute@Edge to be both performant and secure. It also means we have to bring developers’ most-loved language into the fold in the right way.

June 29

TLS 1.3 is now available for Fastly customers. The newest version of the TLS protocol, TLS 1.3 is designed to improve the performance and security of traffic served over HTTPS.

March 19

Using integrations with BigQuery and Looker, we’ve created 15 chart templates that help you effectively monitor security events on your sites and applications, in real time.

February 12

The newest version of Transport Layer Security, TLS 1.3, is faster, more robust, and more responsive than ever before. Explore three ways it will help HTTPS protect origin names for improved…

January 21

Integrating security into your DevOps cycle isn’t something that happens overnight. Here are five tips for building a culture in which secure DevOps can thrive, enabling your team to build…

November 18

Fastly now offers two new TLS services for the trust, flexibility, and scalability customers need to bring the best of the internet to life.

June 11

With attackers using publicly available lists of compromised passwords in an attempt to steal accounts, proof of work is a good way to slow the attackers down.