Security
Page 2
Enhancing Security Capabilities with VCL
Fastly VCL has the advantage of being easy to learn, and extremely fast and safe to execute at the edge.
How to choose the right WAF
Not all WAFs are created equal, but how can you navigate the complicated market? Find out how to choose the best WAF for your organization.
Bot Wars: How Bad Bots are Hurting Businesses
Discover insights from our survey of 500 IT and security leaders on how malicious bots impact businesses. Learn to safeguard your digital assets effectively.

3 Essentials for a High-Impact Live Stream Event
Live streaming major events have become a significant part of how audiences experience concerts and sports. Find out the essentials to providing a world-class live stream.
Back to Basics of Automated Attacks: Account Takeover
Explore account takeover attacks and mitigations including modern authentication with 2FA/passkeys, and anti-bot measures to enhance account security.
Detection as Code with Fastly's WAF Simulator
Being able to test and validate rule behavior is critical to a maintainable WAF. With our WAF Simulator, you can validate rules in a safe simulation environment.
It’s free, instant, and yours! Fastly’s free developer accounts are here
We’re excited to announce free developer accounts. You can instantly get started and take advantage of the most developer-friendly edge platform in the world.
Built with Fastly Spotlight: LeakSignal stops GenAI data leaks
Learn about how LeakSignal leverages Fastly's industry-leading edge cloud platform to power its cutting-edge data flow governance solution.
Fastly and Google partner to enhance your privacy while protecting Chrome users from online threats in real-time
We're excited to announce that Google Chrome is leveraging Fastly Oblivious HTTP (OHTTP) Relay to support the Standard protection mode in Chrome.
Time’s up! How RPKI ROAs perpetually are about to expire
In this post, we'll dig deeper into the mechanics of RPKI to understand how the cryptographic chain contributes to the effective expiration date of a ROA.
Active exploitation of unauthenticated stored XSS vulnerabilities in WordPress Plugins
We have observed active exploitation attempts targeting three high-severity CVEs: CVE-2024-2194, CVE-2023-6961, and CVE-2023-40000.
Fastly drives improved internet routing security with global push to adopt RPKI
Fastly actively supports and participates in IETF, driving network security standards. Learn how we're enhancing routing security and improving industry standards for a safer Internet.
Chaotic Good: Resilience Stress Tests at the Edge
Getting started with chaos experimentation? In this post, we’ll walk through a small starter example experiment – verifying basic security assumptions on a website.
Creating industry-leading managed security commitments
Get proactive commitments to your security with Fastly’s industry-first Time to Notify SLA for its Managed Security Service customers.
Six years in a row: Fastly once again named Customers’ Choice for Cloud WAAP
Fastly has been recognized in the 2024 Gartner® Peer Insights™ Voice of the Customer for Cloud Web Application and API Protection.
Introducing effortless bot management for a better, safer web
See how Fastly's Bot Management targets malicious bots to protect your apps and website for a better user experience. Learn more about our bot management capabilities.
Stay ahead of attackers by pushing your security perimeter to the edge
An effective edge security strategy can provide significant benefits and protect organizations from the continually evolving threat landscape.
Are APIs the Key to Digital Innovation or a Trojan Horse?
In this new report, we surveyed 235 IT and cybersecurity professionals across Europe to shed light on the state of API security.
TLS: More secure; always fast
This post details the journey of improving the security of TLS private keys and improving the performance and efficiency of TLS handshakes along the way.
PCI DSS v 4.0 Everything to know before Mar 31, 2024
The PCI Security Standards Council announced Version 4.0, the latest iteration forces nearly every organization to update policies, procedures, and more.