Blog

Follow and Subscribe

More stories

March 15, 2023
We’re excited to announce the latest product in our privacy enablement portfolio — the Fastly OHTTP Relay, now in beta with availability for select partners.
March 9, 2023
This is the sequel (aka 2 Fastly 2 Fediverse) of a recent blog post where we wrote about the Fediverse and how we think we can help.
March 2, 2023
Here’s everything you need to know to secure your organization against DDoS attacks like those hitting the US healthcare system by the KillNet hacking group.
March 2, 2023
With our new remix-compute-js libraries, you can now host your Remix application on our Compute platform, allowing you to serve at our world-wide edge network — you don't even need an origin…
February 28, 2023
NagiosXI versions 5.5.6 to 5.7.5 are vulnerable to three different instances of command injection.
February 27, 2023
Flexible options for deploying Fastly’s Next-Gen WAF are critical for getting your security running effectively, quickly, and with the right structure for your organization.
February 21, 2023
Certainly is Fastly’s new publicly-trusted Transport Layer Security (TLS) Certification Authority (CA).
February 16, 2023
When you’re under attack, every second counts. The Fastly Managed Security Service keeps your web applications and APIs protected while allowing your in-house teams to focus on core…
February 14, 2023
Config Store is a low-latency, key-value data store. It simplifies storing configuration data at the edge allowing you to deliver faster app experiences.
February 13, 2023
2023 marks the 11th year of Fastly’s involvement in the Super Bowl. Back in 2013, we secured dedicated bandwidth to online businesses advertising throughout the game. However, since 201…
February 9, 2023
We care deeply about all things open source and standards, and we’re excited to see how the Fediverse grows in the coming months. Today, we're explaining how it works and how we support it.
February 8, 2023
On January 20th, Chrome shipped an update that changed the profile of one of the most popular TLS client fingerprinting algorithms, JA3. In this short blog post we’ll describe the change and…

Ready to get started?

Get in touch or create an account.