Blog

Follow and Subscribe

More stories

June 29, 2021
Our new Response Security Service provides direct, 24/7 access to our Customer Security Operations Center to help you prepare for and respond when you suspect an attack.
June 25, 2021
After years of helping protect companies across a variety of industries, we’ve come to recognize four common risk attack types. Here’s how they work and how to counter them.
June 23, 2021
The Endless OS Foundation saw a big spike in traffic at the onset of the COVID-19 pandemic. But thanks to modern CDN features like soft purge, TTL, and segmented caching, they’re able to…
June 21, 2021
In this post, we show how to test site speed modifications before implementing them using Compute and WebPageTest, a web performance tool that uses real browsers, to compare web performance…
June 17, 2021
The legacy WAF isn’t ubiquitous because it’s the perfect technology. Its success comes down to being mandated, despite four ways it often fails.
June 16, 2021
While some bots are benign search engine crawlers or website health monitors, others are on the prowl with nefarious intent, looking to execute account takeovers and compromise APIs. In this…
June 8, 2021
We experienced a global outage due to an undiscovered software bug that surfaced on June 8 when it was triggered by a valid customer configuration change. Here's a rundown of what happened…
June 7, 2021
Alongside the Bytecode Alliance, Fastly’s WebAssembly team recently led a rigorous security assessment of Cranelift, an open-source, next-generation code generator for use in WebAssembly to…
June 1, 2021
Building protocols in a way that anticipates future change in order to prevent ossification is critical. Because it’s impossible to upgrade everyone on the internet at the same time; it…
May 27, 2021
QUIC version 1 is officially formalized, and QUIC deployments will now move away from using temporary draft versions to the newly minted version 1.
May 26, 2021
As part of May’s Asian American and Pacific Islander (AAPI) Heritage Month, we hosted a panel of Asian leaders from tech organizations that reflected on ways their cultural backgrounds…
May 25, 2021
Authentication is one of the most obvious uses for edge computing. Understanding who your users are as early and as close as possible to their location yields powerful customizations and…

Ready to get started?

Get in touch or create an account.