Security
Page 3
3 Essentials for a High-Impact Live Stream Event
Laura Thomson
Live streaming major events have become a significant part of how audiences experience concerts and sports. Find out the essentials to providing a world-class live stream.
Back to Basics of Automated Attacks: Account Takeover
Arun Kumar, Fastly Security Research Team
Explore account takeover attacks and mitigations including modern authentication with 2FA/passkeys, and anti-bot measures to enhance account security.
Detection as Code with Fastly's WAF Simulator
Simran Khalsa, Fastly Security Research Team
Being able to test and validate rule behavior is critical to a maintainable WAF. With our WAF Simulator, you can validate rules in a safe simulation environment.
It’s free, instant, and yours! Fastly’s free developer accounts are here
Simon Wistow
We’re excited to announce free developer accounts. You can instantly get started and take advantage of the most developer-friendly edge platform in the world.
Built with Fastly Spotlight: LeakSignal stops GenAI data leaks
Austin Spires, Wesley Hales
Learn about how LeakSignal leverages Fastly's industry-leading edge cloud platform to power its cutting-edge data flow governance solution.
Fastly and Google partner to enhance your privacy while protecting Chrome users from online threats in real-time
Monique Barbanson, Austin Spires
We're excited to announce that Google Chrome is leveraging Fastly Oblivious HTTP (OHTTP) Relay to support the Standard protection mode in Chrome.
Time’s up! How RPKI ROAs perpetually are about to expire
Job Snijders, Doug Madory
In this post, we'll dig deeper into the mechanics of RPKI to understand how the cryptographic chain contributes to the effective expiration date of a ROA.
Active exploitation of unauthenticated stored XSS vulnerabilities in WordPress Plugins
Fastly Security Research Team, Simran Khalsa, + 2 more
We have observed active exploitation attempts targeting three high-severity CVEs: CVE-2024-2194, CVE-2023-6961, and CVE-2023-40000.
Fastly drives improved internet routing security with global push to adopt RPKI
Rob Bushell, Job Snijders, + 2 more
Fastly actively supports and participates in IETF, driving network security standards. Learn how we're enhancing routing security and improving industry standards for a safer Internet.
Chaotic Good: Resilience Stress Tests at the Edge
Kelly Shortridge
Getting started with chaos experimentation? In this post, we’ll walk through a small starter example experiment – verifying basic security assumptions on a website.
Creating industry-leading managed security commitments
Liam Mayron, Cody Arnold
Get proactive commitments to your security with Fastly’s industry-first Time to Notify SLA for its Managed Security Service customers.
Six years in a row: Fastly once again named Customers’ Choice for Cloud WAAP
Kim Ogletree
Fastly has been recognized in the 2024 Gartner® Peer Insights™ Voice of the Customer for Cloud Web Application and API Protection.
Introducing effortless bot management for a better, safer web
Liz Hurder, Akil Muralidaharan
See how Fastly's Bot Management targets malicious bots to protect your apps and website for a better user experience. Learn more about our bot management capabilities.
Stay ahead of attackers by pushing your security perimeter to the edge
Blake Dournaee
An effective edge security strategy can provide significant benefits and protect organizations from the continually evolving threat landscape.
Are APIs the Key to Digital Innovation or a Trojan Horse?
Jay Coley
In this new report, we surveyed 235 IT and cybersecurity professionals across Europe to shed light on the state of API security.
TLS: More secure; always fast
Emmanuel Thompson
This post details the journey of improving the security of TLS private keys and improving the performance and efficiency of TLS handshakes along the way.
PCI DSS v 4.0 Everything to know before Mar 31, 2024
David King
The PCI Security Standards Council announced Version 4.0, the latest iteration forces nearly every organization to update policies, procedures, and more.
A new level of security called for by the White House and Office of the National Cyber Director
Anil Dash, Luke Wagner
The White House and Office of the National Cyber Director called for the adoption of memory safe languages, and we see a way for existing code be more memory safe as well.
How to Protect Against Credential Stuffing
Arun Kumar, Fastly Security Research Team
In this post, we will discuss a low latency approach to detect these attacks by co-locating the password hashes in a KV Store, along with Compute on Fastly’s edge.
Threshold blocking best practices
Sina Siar, David King
Learn threshold blocking best practices and how it increases your WAF confidence so you can get into blocking mode faster.