Industry insights
Page 2
DDoS in December
Simran Khalsa, David King, + 1 more
Discover the latest trends and actionable insights on application DDoS attacks in December 2024. Strengthen your security with our expert analysis and guidance.

Fastly’s Edge Cloud Industry Reports: A Year in Review
John Agger
Explore our industry reports on edge cloud strategies, addressing performance and security challenges. Unlock innovative solutions for common business challenges.

Navigating the Challenges of Online Live Streaming
Hossein Lotfi
Join us as we delve into the realities of live event streaming, highlighting the lessons learned from disruptions and our commitment to delivering reliable viewer experiences.
Battleground states: News media traffic during the 2024 election debates
Lloyd Tanaka
This blog describes the aggregated traffic in the seven states to news media outlets during the presidential and VP debates.
CISO Insights: 10 modern capabilities to revamp your security
David King
Explore essential strategies for updating your security measures. Understand the importance of addressing vulnerabilities and optimizing resources for better protection.

Fastly Instant Purge™: Under 150ms for Over a Decade
Laura Thomson
Since 2011, Fastly has been able to purge content globally in 150ms, we're excited to see other vendors catch up and help create a better internet.
Security and Bot Management is Crucial for eCommerce During Back-to-School Sales
John Agger
Strengthen your eCommerce site's security to protect customer information and maintain trust with back-to-school shoppers.
Bot Wars: How Bad Bots are Hurting Businesses
Daniel Corbett, James Nguyen
Discover insights from our survey of 500 IT and security leaders on how malicious bots impact businesses. Learn to safeguard your digital assets effectively.

Active exploitation of unauthenticated stored XSS vulnerabilities in WordPress Plugins
Fastly Security Research Team, Simran Khalsa, + 2 more
We have observed active exploitation attempts targeting three high-severity CVEs: CVE-2024-2194, CVE-2023-6961, and CVE-2023-40000.
Chaotic Good: Resilience Stress Tests at the Edge
Kelly Shortridge
Getting started with chaos experimentation? In this post, we’ll walk through a small starter example experiment – verifying basic security assumptions on a website.
WASI 0.2: Unlocking WebAssembly’s Promise Outside the Browser
Tyler McMullen, Luke Wagner
The WebAssembly System Interface (WASI) Subgroup recently reached a significant milestone by voting to launch WASI 0.2, also known as WASI Preview 2.
Let’s Encrypt Chain of Trust Impact
Shane Burgess, David King
Our commitment to widespread trust allows Certainly to support organizations affected by Let’s Encrypt’s looming changes and beyond.
What can you actually do to reduce the threat of hacks like xz?
Anil Dash
With the recent xz hack in the news, it's crucial to support maintainers of open source projects. Fastly has been doing just that with our open source program, Fast Forward.
Are APIs the Key to Digital Innovation or a Trojan Horse?
Jay Coley
In this new report, we surveyed 235 IT and cybersecurity professionals across Europe to shed light on the state of API security.
PCI DSS v 4.0 Everything to know before Mar 31, 2024
David King
The PCI Security Standards Council announced Version 4.0, the latest iteration forces nearly every organization to update policies, procedures, and more.
The future of device detection on the web
Andrew Betts
As the future of device detection evolves to protect user data, client hints and other solutions rise to meet the needs of developers looking to deliver a better user experience.
BoringSSL to make TLS more secure
Roberto Guimaraes, Wayne Thayer
Replacing OpenSSL with BoringSSL was to reduce the frequency of CVE response and improve the security of our TLS termination system for our customers.
Fastly can teach you about the Wasm future in just 6 talks
Hannah Aubry
The future of the web is Wasm — here's why.
Cyber 5 Threat Insights
Simran Khalsa, Charlie Bricknell, + 1 more
To gain a broader understanding of the threat landscape during "Cyber 5" weekend, we analyzed attack activities with a particular focus on commerce sites.

The evolution of blocking
David King, Sina Siar
Flexibility is required for confident blocking decisions that impact as little legitimate traffic as possible. Learn more about the evolution of blocking.