Zig is a general purpose programming language, meaning that if you have in front of you something that looks like a Von Neumann-ish, Turing-complete machine, you should be able to…
GitHub Actions for Compute allow you to transition from a manually deployed application to a fully automated deployment workflow with ease and wrap the Fastly CLI to provide an easy way to…
It's always been possible to create content programmatically, and with the advent of our serverless compute environment, we've made it possible to create and transform content more…
Throwing new security tools at new threats results in scattershot protection and builds technical debt. Organizations need uniform protection for applications and APIs, regardless of where…
New Fastly next-gen WAF dashboards surface security telemetry from more than 20 new signals for advanced attack scenarios, such as account takeover, credit card validation, and password…
Fastly now offers logging support for Amazon Kinesis Data Streams, as well as AWS Identity and Access Management (IAM) functionality for S3 and Kinesis logging endpoints.
id Software’s DOOM has become one of the most-ported games in history. It felt like a perfect project to port to Compute, built on our serverless compute environment, to experiment with…
Layer 7 is a primary battleground for web application and API security. Fastly and Okta have partnered together to share threat intelligence, so security and development teams can better…
Teams can now automate their Fastly TLS workflows through Terraform — including issuing certificates, retrieving TLS details, and performing other updates.
The basic concept of performing authentication and then using identity data to make authorization decisions is something that applies to a large majority of web and native apps. Doing this…