Back to blog

Follow and Subscribe

All blog posts

Page 18

Introducing right-sized web app and API protection packages

Brendon Macaraeg

Today, we launched Fastly Secure packages, a unified web app and API security solution that provides “right-sized” protection for any organization at a spend level that works for a variety of budgets.

Product
Security

4 Steps to Centralized Security Tooling

Sean Leach

Here are four repeatable steps that will help you pay down your security technical debt, make your apps and APIs more secure, and move you toward consolidated security tooling.

Industry insights
Security

Why don’t your security tools work anymore?

Sean Leach

As the internet landscape gets more complex, more API driven, and more distributed, many security and IT professionals are left wondering — why aren’t the security tools that were good enough a few years ago good enough now?

Industry insights
Security

Who Takes the Gold in the Fastly Games?

David Belson

The Fastly Games compare countries in four data-driven events based on aggregated network traffic: IPv6 adoption, HTTP versions, operating system (OS) versions, and browser versions.

Industry insights
Streaming

0-100 mph: Boosting App Security

The Fastly Collective

How to accelerate your WAF visibility from 0 to 100MPH

Security

New: Compute local testing

Brynne Hazzard

Compute local testing gives you the flexibility to run your work-in-progress applications locally on your laptops, servers, or CI systems, in an environment similar to production, but without the deployment time and process.

Product
Compute

New research shows security tooling is at a tipping point

Brendon Macaraeg

We released a new report today in partnership with ESG Research that reveals some fascinating insights into the state of web application security tooling.

Security

Talking traffic: internet disruptions we saw in Q2 2021

David Belson

During the second quarter of 2021, a number of internet disruptions were observed around the world for a variety of planned and unplanned reasons. Here’s what we saw.

Industry insights

How to configure your Fastly services with Terraform

Mark McDonnell

As you start to build more at the edge, it becomes ever more important to deploy edge logic in the same way you deploy changes to your own applications and infrastructure. Today, we’ll take a step back and look holistically at how to configure, manage, and deploy Fastly services using Terraform.

Engineering
+ 2 more

Learn More About Fastly's Origin Inspector

Dom Fee

Origin Inspector enables granular visibility of egress traffic received from your origins by our edge cloud, allowing you to effortlessly report — in real-time — every origin response, byte, status code, and more.

Product
Observability

Request enrichment helps identify user data | Fastly

Brooks Cunningham

Requests passing through Fastly can be transformed in many ways. In this example, we’ll show you how to use enriched requests and our next-gen WAF to help you make more informed security decisions.

Product
Security

Introducing Response Security Service

Kevin Rollinson

Our new Response Security Service provides direct, 24/7 access to our Customer Security Operations Center to help you prepare for and respond when you suspect an attack.

Security

How to recognize and repel four high-risk attack types

Brendon Macaraeg

After years of helping protect companies across a variety of industries, we’ve come to recognize four common risk attack types. Here’s how they work and how to counter them.

Security

Endless OS Foundation Bridges Digital Divide | Fastly

Hannah Aubry

The Endless OS Foundation saw a big spike in traffic at the onset of the COVID-19 pandemic. But thanks to modern CDN features like soft purge, TTL, and segmented caching, they’re able to continue bridging the digital divide.

Customers
Performance

How to test site speed optimizations with Compute

Leon Brocard

In this post, we show how to test site speed modifications before implementing them using Compute and WebPageTest, a web performance tool that uses real browsers, to compare web performance between the original and transformed page versions.

Engineering
Compute

4 Ways Legacy WAF Fails to Protect Your Apps

Liz Hurder

The legacy WAF isn’t ubiquitous because it’s the perfect technology. Its success comes down to being mandated, despite four ways it often fails.

Security

Suggestive signals: how to tell good bot traffic from bad

Brendon Macaraeg

While some bots are benign search engine crawlers or website health monitors, others are on the prowl with nefarious intent, looking to execute account takeovers and compromise APIs. In this post, we’ll look at how to tell them apart in order to allow the good bots and block the bad ones.

Security

Summary of June 8 outage

Nick Rockwell

We experienced a global outage due to an undiscovered software bug that surfaced on June 8 when it was triggered by a valid customer configuration change. Here's a rundown of what happened, why, and what we're doing about it.

Company news
+ 2 more

Cranelift vetted for secure sandboxing in Compute@Edge | Fastly

Pat Hickey, Chris Fallin, + 1 more

Alongside the Bytecode Alliance, Fastly’s WebAssembly team recently led a rigorous security assessment of Cranelift, an open-source, next-generation code generator for use in WebAssembly to provide sandbox security functionality.

Industry insights
+ 3 more

Minimizing ossification risk is everyone’s responsibility

Mark Nottingham

Building protocols in a way that anticipates future change in order to prevent ossification is critical. Because it’s impossible to upgrade everyone on the internet at the same time; it needs to be possible to introduce changes gradually, without harming communication where only one party understands the change — and this is everyone’s responsibility.

Engineering
Industry insights