Back to blog

Follow and Subscribe

Security

Page 9

Suggestive signals: how to tell good bot traffic from bad

Brendon Macaraeg

While some bots are benign search engine crawlers or website health monitors, others are on the prowl with nefarious intent, looking to execute account takeovers and compromise APIs. In this post, we’ll look at how to tell them apart in order to allow the good bots and block the bad ones.

Security

Cranelift vetted for secure sandboxing in Compute@Edge | Fastly

Pat Hickey, Chris Fallin, + 1 more

Alongside the Bytecode Alliance, Fastly’s WebAssembly team recently led a rigorous security assessment of Cranelift, an open-source, next-generation code generator for use in WebAssembly to provide sandbox security functionality.

Industry insights
+ 3 more

Answers to your top Kubernetes security questions

Brendon Macaraeg

As Kubernetes has become widespread for container orchestration needs, it’s natural for security questions to arise. Here are answers to the Kubernetes questions we hear most often.

Security

Prevent Wasm Compiler Bugs Early | Fastly

iximeow, Chris Fallin

We recently discovered a compiler bug in part of the WebAssembly compiler that we use for Compute@Edge, that could have allowed a WebAssembly module to access memory outside of its sandboxed heap. But because of the people, processes, and tools we have in place, the bug was caught and patched on our infrastructure before it was exploited.

Security
WebAssembly

More is less: stop adding to your security tool technical debt

Brendon Macaraeg

Throwing new security tools at new threats results in scattershot protection and builds technical debt. Organizations need uniform protection for applications and APIs, regardless of where they live.

Security

API and ATO Security Challenge Addressed | Fastly

Brendon Macaraeg

New Fastly next-gen WAF dashboards surface security telemetry from more than 20 new signals for advanced attack scenarios, such as account takeover, credit card validation, and password reset.

Security
Observability

Fastly and Okta partner to lock down layer 7

Sean Leach

Layer 7 is a primary battleground for web application and API security. Fastly and Okta have partnered together to share threat intelligence, so security and development teams can better protect their systems.

Security
Company news

Building Security Mindset in Engineering

Kevin Rollinson

Explore how leaders from both sides of the aisle have built thriving secure DevOps cultures by putting trust in people first.

Security
DevOps

You asked, we delivered: Terraform support for TLS is here

Joe Hoffend, Sudhir Patamsetti

Teams can now automate their Fastly TLS workflows through Terraform — including issuing certificates, retrieving TLS details, and performing other updates.

Security
Product

Fastly (Signal Sciences) repeated Customers’ Choice | Fastly

Andrew Peterson

Fastly (Signal Sciences) has been recognized as a Customers’ Choice for Web Application Firewalls in the 2021 Gartner Peer Insights “Voice of the Customer” report.

Company news
+ 2 more

Next-Gen WAF for Microsoft Exchange | Fastly

Fastly Security Research Team, Xavier Stevens, + 1 more

Fastly’s security research team has built and deployed a rule to protect Signal Sciences Next-Gen WAF customers against the recently announced Microsoft Exchange Server vulnerabilities.

Product
Security

Engineering leaders: security is your job, too

Sean Leach

The rise of secure DevOps has left many security professionals vying for the attention and support of their engineering counterparts. What can engineering leaders do to bridge the gap? We have four ideas to help you build security into your DevOps culture, workflows, and goals.

Culture
+ 3 more

3 Benefits CDN's Bring to Startups

Simon Wistow

A modern CDN can help improve SEO rankings, make it easier to deliver personalized content, and secure your sites and apps — three keys to a startup’s success.

Performance
+ 2 more

The new rules for web app and API security

Sean Leach

Nearly everything we know about building web applications and APIs has changed in the last few decades. So why hasn't security? We argue it's time for a new approach to web app and API security, one that follows suit with how applications are really built and teams really work.

DevOps
Security

A unified platform is the future of secure DevOps

Cassandra Dixon

Fastly and Signal Sciences have joined forces to build the next generation of web app and API security at the edge. Explore what makes our approach different, and how it will empower developers to build more securely than ever before.

Security
Events

DDoS attacks grow bigger, but so do responses

Michael Sabbota

DDoS attacks have been growing larger over the past few years. But so has the industry’s response to them. In this post, we take a look at what industry bodies and a modern CDN can do to protect your traffic.

Industry insights
Security

5 best practices for your TLS configuration

Maria Espada

The TLS Support Engineering team provides support for customers managing one to thousands of certificates. After helping so many customers tailor their DNS and TLS configurations, they have five best practices to recommend.

Security

Prepare for DDoS attacks: 5 steps to take | Fastly

Gino Lang

Layer 7 attacks that target applications and issue requests that can swamp origin systems often seek to blend into other network traffic and require a more focused defense than Layer 3 and 4 attacks. Here are five best practices you can implement to help prepare for such attacks.

Industry insights
Security

Signal Sciences named Visionary in 2020 Magic Quadrant for Web Application Firewalls for second year | Fastly

Kevin Rollinson

We believe Signal Sciences’ innovation earned them recognition in the 2019 Gartner Magic Quadrant for WAF, and it’s this kind of innovation that excites us as we merge forces — now that Signal Sciences is part of Fastly.

Product
Security

Lessons Learned from Side-Channel Attacks

Patrick McManus

The largest category of difficult-to-anticipate security design weaknesses come from side-channel attacks. In this post, we take a tour of some of the more foundational and out-there side channel-related exploits that have afflicted the security conscious over the years.

Industry insights
Security