Back to blog

Follow and Subscribe

Security

Page 2

Detection as Code with Fastly's WAF Simulator

Simran Khalsa, Fastly Security Research Team

Being able to test and validate rule behavior is critical to a maintainable WAF. With our WAF Simulator, you can validate rules in a safe simulation environment.

DevOps
+ 3 more

It’s free, instant, and yours! Fastly’s free developer accounts are here

Simon Wistow

We’re excited to announce free developer accounts. You can instantly get started and take advantage of the most developer-friendly edge platform in the world.

CDN & Delivery
+ 7 more

Built with Fastly Spotlight: LeakSignal stops GenAI data leaks

Austin Spires, Wesley Hales

Learn about how LeakSignal leverages Fastly's industry-leading edge cloud platform to power its cutting-edge data flow governance solution.

Edge network
+ 3 more

Fastly and Google partner to enhance your privacy while protecting Chrome users from online threats in real-time

Monique Barbanson, Austin Spires

We're excited to announce that Google Chrome is leveraging Fastly Oblivious HTTP (OHTTP) Relay to support the Standard protection mode in Chrome.

Security
+ 3 more

Time’s up! How RPKI ROAs perpetually are about to expire

Job Snijders, Doug Madory

In this post, we'll dig deeper into the mechanics of RPKI to understand how the cryptographic chain contributes to the effective expiration date of a ROA.

CDN & Delivery
Security

Active exploitation of unauthenticated stored XSS vulnerabilities in WordPress Plugins

Fastly Security Research Team, Simran Khalsa, + 2 more

We have observed active exploitation attempts targeting three high-severity CVEs: CVE-2024-2194, CVE-2023-6961, and CVE-2023-40000.

Security
Industry insights

Fastly drives improved internet routing security with global push to adopt RPKI

Rob Bushell, Job Snijders, + 2 more

Fastly actively supports and participates in IETF, driving network security standards. Learn how we're enhancing routing security and improving industry standards for a safer Internet.

CDN & Delivery
+ 2 more

Chaotic Good: Resilience Stress Tests at the Edge

Kelly Shortridge

Getting started with chaos experimentation? In this post, we’ll walk through a small starter example experiment – verifying basic security assumptions on a website.

Compute
+ 4 more

Creating industry-leading managed security commitments

Liam Mayron, Cody Arnold

Get proactive commitments to your security with Fastly’s industry-first Time to Notify SLA for its Managed Security Service customers.

Security

Six years in a row: Fastly once again named Customers’ Choice for Cloud WAAP

Kim Ogletree

Fastly has been recognized in the 2024 Gartner® Peer Insights™ Voice of the Customer for Cloud Web Application and API Protection.

Security
Company news

Introducing effortless bot management for a better, safer web

Liz Hurder, Akil Muralidaharan

See how Fastly's Bot Management targets malicious bots to protect your apps and website for a better user experience. Learn more about our bot management capabilities.

Security
+ 2 more

Stay ahead of attackers by pushing your security perimeter to the edge

Blake Dournaee

An effective edge security strategy can provide significant benefits and protect organizations from the continually evolving threat landscape.

Security
+ 2 more

Are APIs the Key to Digital Innovation or a Trojan Horse?

Jay Coley

In this new report, we surveyed 235 IT and cybersecurity professionals across Europe to shed light on the state of API security.

Security
Industry insights

TLS: More secure; always fast

Emmanuel Thompson

This post details the journey of improving the security of TLS private keys and improving the performance and efficiency of TLS handshakes along the way.

Privacy
+ 4 more

PCI DSS v 4.0 Everything to know before Mar 31, 2024

David King

The PCI Security Standards Council announced Version 4.0, the latest iteration forces nearly every organization to update policies, procedures, and more.

Security
+ 2 more

A new level of security called for by the White House and Office of the National Cyber Director

Anil Dash, Luke Wagner

The White House and Office of the National Cyber Director called for the adoption of memory safe languages, and we see a way for existing code be more memory safe as well.

Security
+ 4 more

How to Protect Against Credential Stuffing

Arun Kumar, Fastly Security Research Team

In this post, we will discuss a low latency approach to detect these attacks by co-locating the password hashes in a KV Store, along with Compute on Fastly’s edge.

Compute
+ 3 more

Threshold blocking best practices

Sina Siar, David King

Learn threshold blocking best practices and how it increases your WAF confidence so you can get into blocking mode faster.

Security

BoringSSL to make TLS more secure

Roberto Guimaraes, Wayne Thayer

Replacing OpenSSL with BoringSSL was to reduce the frequency of CVE response and improve the security of our TLS termination system for our customers.

Security
+ 4 more

The evolution of blocking

David King, Sina Siar

Flexibility is required for confident blocking decisions that impact as little legitimate traffic as possible. Learn more about the evolution of blocking.

Security
+ 2 more