Threat hunting is the practice of looking for active attackers who have possibly penetrated security boundaries within an organization. WAF data can be a valuable resource in threat hunting…
At Fastly, we design for a delightful enterprise experience by looking deeply at customer needs. In this post, our Director of Product Experience shares some of the similarities and…
Fastly’s Observability Dashboard allows you to analyze all your edge delivery metrics and observability data in one interactive window. In this blog, learn more about the dashboard, now in…
This post will illuminate how deadlock bugs emerge, some facets of their fascinating and frustrating strangeness, and guidance on how to handle them in your own systems.
Our new KV Store offers global, durable storage for compute functions at the edge. With fast reads and writes from both the edge or via API, you can store, control, or cache your data to…
In this post, we’ll cover three questions — and recommendations for each — to ask yourself on the front end of application development to save time when it comes to scale.
We’re excited to announce our new point of presence (POP) in Christchurch, New Zealand, allowing us to offer Kiwi organizations, from budding startups, government agencies to global multi…
Climatiq’s mission is to drive climate action through data and insight. In this blog post, we share how choosing Fauna as their database and Fastly’s Compute@Edge for their compute layer…
iCloud Private Relay is a new internet privacy service from Apple. With iCloud Private Relay, users with an iPhone, iPad, or Mac and an iCloud+ subscription can connect to and browse the…
Today, we’re happy to announce the launch of Fastly Security Labs, a new program that empowers customers to continuously innovate by being the first to test new detection and security…