Blog

Follow and Subscribe

More stories

July 16, 2021
Compute local testing gives you the flexibility to run your work-in-progress applications locally on your laptops, servers, or CI systems, in an environment similar to production, but…
July 12, 2021
We released a new report today in partnership with ESG Research that reveals some fascinating insights into the state of web application security tooling.
July 8, 2021
During the second quarter of 2021, a number of internet disruptions were observed around the world for a variety of planned and unplanned reasons. Here’s what we saw.
July 6, 2021
As you start to build more at the edge, it becomes ever more important to deploy edge logic in the same way you deploy changes to your own applications and infrastructure. Today, we’ll take…
July 1, 2021
Origin Inspector enables granular visibility of egress traffic received from your origins by our edge cloud, allowing you to effortlessly report — in real-time — every origin response, byte…
June 30, 2021
Requests passing through Fastly can be transformed in many ways. In this example, we’ll show you how to use enriched requests and our next-gen WAF to help you make more informed security…
June 29, 2021
Our new Response Security Service provides direct, 24/7 access to our Customer Security Operations Center to help you prepare for and respond when you suspect an attack.
June 25, 2021
After years of helping protect companies across a variety of industries, we’ve come to recognize four common risk attack types. Here’s how they work and how to counter them.
June 23, 2021
The Endless OS Foundation saw a big spike in traffic at the onset of the COVID-19 pandemic. But thanks to modern CDN features like soft purge, TTL, and segmented caching, they’re able to…
June 21, 2021
In this post, we show how to test site speed modifications before implementing them using Compute and WebPageTest, a web performance tool that uses real browsers, to compare web performance…
June 17, 2021
The legacy WAF isn’t ubiquitous because it’s the perfect technology. Its success comes down to being mandated, despite four ways it often fails.
June 16, 2021
While some bots are benign search engine crawlers or website health monitors, others are on the prowl with nefarious intent, looking to execute account takeovers and compromise APIs. In this…

Ready to get started?

Get in touch or create an account.