All blog posts
Page 19
How to test site speed optimizations with Compute
In this post, we show how to test site speed modifications before implementing them using Compute and WebPageTest, a web performance tool that uses real browsers, to compare web performance between the original and transformed page versions.
4 Ways Legacy WAF Fails to Protect Your Apps
The legacy WAF isn’t ubiquitous because it’s the perfect technology. Its success comes down to being mandated, despite four ways it often fails.
Suggestive signals: how to tell good bot traffic from bad
While some bots are benign search engine crawlers or website health monitors, others are on the prowl with nefarious intent, looking to execute account takeovers and compromise APIs. In this post, we’ll look at how to tell them apart in order to allow the good bots and block the bad ones.
Summary of June 8 outage
We experienced a global outage due to an undiscovered software bug that surfaced on June 8 when it was triggered by a valid customer configuration change. Here's a rundown of what happened, why, and what we're doing about it.
Cranelift vetted for secure sandboxing in Compute@Edge | Fastly
Alongside the Bytecode Alliance, Fastly’s WebAssembly team recently led a rigorous security assessment of Cranelift, an open-source, next-generation code generator for use in WebAssembly to provide sandbox security functionality.
Minimizing ossification risk is everyone’s responsibility
Building protocols in a way that anticipates future change in order to prevent ossification is critical. Because it’s impossible to upgrade everyone on the internet at the same time; it needs to be possible to introduce changes gradually, without harming communication where only one party understands the change — and this is everyone’s responsibility.
QUIC is now RFC 9000
QUIC version 1 is officially formalized, and QUIC deployments will now move away from using temporary draft versions to the newly minted version 1.
AAPI Heritage Month: Asian Tech Experiences | Fastly
As part of May’s Asian American and Pacific Islander (AAPI) Heritage Month, we hosted a panel of Asian leaders from tech organizations that reflected on ways their cultural backgrounds impacted their career journeys and ascent into leadership roles.
Building on top of OAuth at the edge
Authentication is one of the most obvious uses for edge computing. Understanding who your users are as early and as close as possible to their location yields powerful customizations and speedy responses. But there's more than one way to think about how to apply an authentication scheme at the edge.
Answers to your top Kubernetes security questions
As Kubernetes has become widespread for container orchestration needs, it’s natural for security questions to arise. Here are answers to the Kubernetes questions we hear most often.
Prevent Wasm Compiler Bugs Early | Fastly
We recently discovered a compiler bug in part of the WebAssembly compiler that we use for Compute@Edge, that could have allowed a WebAssembly module to access memory outside of its sandboxed heap. But because of the people, processes, and tools we have in place, the bug was caught and patched on our infrastructure before it was exploited.
PayPal: secure payments at the edge | Fastly
Online payments giant PayPal uses Fastly’s edge platform to deliver a more secure, faster, and more reliable user experience at a time when digital payments are surging.
Saving time and reducing rework with DRY code
Following the DRY principle isn’t just for engineers. It also cuts the time it takes to make updates in multiple places and reduces errors for our documentation team.
Why Fastly Changed its Control Panel Design
Over the past few months, we’ve rolled out a series of design improvements focused on text readability, easing eye-strain, and providing a seamless brand experience.
Creating an Efficient Language with Zig | Fastly
Zig is a general purpose programming language, meaning that if you have in front of you something that looks like a Von Neumann-ish, Turing-complete machine, you should be able to comfortably program it with Zig. Lately there has been a lot of interest in two such (virtual) machines: BPF and WebAssembly.
Introducing GitHub Actions for Compute
GitHub Actions for Compute allow you to transition from a manually deployed application to a fully automated deployment workflow with ease and wrap the Fastly CLI to provide an easy way to keep your application up to date.
New ways to compose content at the edge with Compute
It's always been possible to create content programmatically, and with the advent of our serverless compute environment, we've made it possible to create and transform content more efficiently and powerfully than ever before.
More is less: stop adding to your security tool technical debt
Throwing new security tools at new threats results in scattershot protection and builds technical debt. Organizations need uniform protection for applications and APIs, regardless of where they live.
API and ATO Security Challenge Addressed | Fastly
New Fastly next-gen WAF dashboards surface security telemetry from more than 20 new signals for advanced attack scenarios, such as account takeover, credit card validation, and password reset.
Using Kinesis Data Streams
Fastly now offers logging support for Amazon Kinesis Data Streams, as well as AWS Identity and Access Management (IAM) functionality for S3 and Kinesis logging endpoints.