Security
Page 10
Cranelift vetted for secure sandboxing in Compute@Edge | Fastly
Pat Hickey, Chris Fallin, + 1 more
Alongside the Bytecode Alliance, Fastly’s WebAssembly team recently led a rigorous security assessment of Cranelift, an open-source, next-generation code generator for use in WebAssembly to provide sandbox security functionality.
Answers to your top Kubernetes security questions
Brendon Macaraeg
As Kubernetes has become widespread for container orchestration needs, it’s natural for security questions to arise. Here are answers to the Kubernetes questions we hear most often.
Prevent Wasm Compiler Bugs Early | Fastly
iximeow, Chris Fallin
We recently discovered a compiler bug in part of the WebAssembly compiler that we use for Compute@Edge, that could have allowed a WebAssembly module to access memory outside of its sandboxed heap. But because of the people, processes, and tools we have in place, the bug was caught and patched on our infrastructure before it was exploited.
Memory flaw in Cranelift module
Fastly Security Research Team
The bug identified in the Cranelift x64 backend performs a sign-extend instead of a zero-extend on a value loaded from the stack, when the register allocator reloads a spilled integer value narrower than 64 bits. This interacts poorly with another optimization: the instruction selector elides a 32-to-64-bit zero-extend operator when we know that an instruction producing a 32-bit value actually zeros the upper 32 bits of its destination register. Hence, the x64 compiler relies on these zeroed bits, but the type of the value is still i32, and the spill/reload reconstitutes those bits as the sign extension of the i32’s MSB.
More is less: stop adding to your security tool technical debt
Brendon Macaraeg
Throwing new security tools at new threats results in scattershot protection and builds technical debt. Organizations need uniform protection for applications and APIs, regardless of where they live.
API and ATO Security Challenge Addressed | Fastly
Brendon Macaraeg
New Fastly next-gen WAF dashboards surface security telemetry from more than 20 new signals for advanced attack scenarios, such as account takeover, credit card validation, and password reset.
Fastly and Okta partner to lock down layer 7
Sean Leach
Layer 7 is a primary battleground for web application and API security. Fastly and Okta have partnered together to share threat intelligence, so security and development teams can better protect their systems.
Building Security Mindset in Engineering
Kevin Rollinson
Explore how leaders from both sides of the aisle have built thriving secure DevOps cultures by putting trust in people first.
You asked, we delivered: Terraform support for TLS is here
Joe Hoffend, Sudhir Patamsetti
Teams can now automate their Fastly TLS workflows through Terraform — including issuing certificates, retrieving TLS details, and performing other updates.
Fastly (Signal Sciences) repeated Customers’ Choice | Fastly
Andrew Peterson
Fastly (Signal Sciences) has been recognized as a Customers’ Choice for Web Application Firewalls in the 2021 Gartner Peer Insights “Voice of the Customer” report.
Next-Gen WAF for Microsoft Exchange | Fastly
Fastly Security Research Team, Xavier Stevens, + 1 more
Fastly’s security research team has built and deployed a rule to protect Signal Sciences Next-Gen WAF customers against the recently announced Microsoft Exchange Server vulnerabilities.
Engineering leaders: security is your job, too
Sean Leach
The rise of secure DevOps has left many security professionals vying for the attention and support of their engineering counterparts. What can engineering leaders do to bridge the gap? We have four ideas to help you build security into your DevOps culture, workflows, and goals.
3 Benefits CDN's Bring to Startups
Simon Wistow
A modern CDN can help improve SEO rankings, make it easier to deliver personalized content, and secure your sites and apps — three keys to a startup’s success.
The new rules for web app and API security
Sean Leach
Nearly everything we know about building web applications and APIs has changed in the last few decades. So why hasn't security? We argue it's time for a new approach to web app and API security, one that follows suit with how applications are really built and teams really work.
A unified platform is the future of secure DevOps
Cassandra Dixon
Fastly and Signal Sciences have joined forces to build the next generation of web app and API security at the edge. Explore what makes our approach different, and how it will empower developers to build more securely than ever before.
DDoS attacks grow bigger, but so do responses
Michael Sabbota
DDoS attacks have been growing larger over the past few years. But so has the industry’s response to them. In this post, we take a look at what industry bodies and a modern CDN can do to protect your traffic.
5 best practices for your TLS configuration
Maria Espada
The TLS Support Engineering team provides support for customers managing one to thousands of certificates. After helping so many customers tailor their DNS and TLS configurations, they have five best practices to recommend.
Prepare for DDoS attacks: 5 steps to take | Fastly
Gino Lang
Layer 7 attacks that target applications and issue requests that can swamp origin systems often seek to blend into other network traffic and require a more focused defense than Layer 3 and 4 attacks. Here are five best practices you can implement to help prepare for such attacks.
Signal Sciences named Visionary in 2020 Magic Quadrant for Web Application Firewalls for second year | Fastly
Kevin Rollinson
We believe Signal Sciences’ innovation earned them recognition in the 2019 Gartner Magic Quadrant for WAF, and it’s this kind of innovation that excites us as we merge forces — now that Signal Sciences is part of Fastly.
Lessons Learned from Side-Channel Attacks
Patrick McManus
The largest category of difficult-to-anticipate security design weaknesses come from side-channel attacks. In this post, we take a tour of some of the more foundational and out-there side channel-related exploits that have afflicted the security conscious over the years.