Security
Page 9
Suggestive signals: how to tell good bot traffic from bad
While some bots are benign search engine crawlers or website health monitors, others are on the prowl with nefarious intent, looking to execute account takeovers and compromise APIs. In this post, we’ll look at how to tell them apart in order to allow the good bots and block the bad ones.
Cranelift vetted for secure sandboxing in Compute@Edge | Fastly
Alongside the Bytecode Alliance, Fastly’s WebAssembly team recently led a rigorous security assessment of Cranelift, an open-source, next-generation code generator for use in WebAssembly to provide sandbox security functionality.
Answers to your top Kubernetes security questions
As Kubernetes has become widespread for container orchestration needs, it’s natural for security questions to arise. Here are answers to the Kubernetes questions we hear most often.
Prevent Wasm Compiler Bugs Early | Fastly
We recently discovered a compiler bug in part of the WebAssembly compiler that we use for Compute@Edge, that could have allowed a WebAssembly module to access memory outside of its sandboxed heap. But because of the people, processes, and tools we have in place, the bug was caught and patched on our infrastructure before it was exploited.
More is less: stop adding to your security tool technical debt
Throwing new security tools at new threats results in scattershot protection and builds technical debt. Organizations need uniform protection for applications and APIs, regardless of where they live.
API and ATO Security Challenge Addressed | Fastly
New Fastly next-gen WAF dashboards surface security telemetry from more than 20 new signals for advanced attack scenarios, such as account takeover, credit card validation, and password reset.
Fastly and Okta partner to lock down layer 7
Layer 7 is a primary battleground for web application and API security. Fastly and Okta have partnered together to share threat intelligence, so security and development teams can better protect their systems.
Building Security Mindset in Engineering
Explore how leaders from both sides of the aisle have built thriving secure DevOps cultures by putting trust in people first.
You asked, we delivered: Terraform support for TLS is here
Teams can now automate their Fastly TLS workflows through Terraform — including issuing certificates, retrieving TLS details, and performing other updates.
Fastly (Signal Sciences) repeated Customers’ Choice | Fastly
Fastly (Signal Sciences) has been recognized as a Customers’ Choice for Web Application Firewalls in the 2021 Gartner Peer Insights “Voice of the Customer” report.
Next-Gen WAF for Microsoft Exchange | Fastly
Fastly’s security research team has built and deployed a rule to protect Signal Sciences Next-Gen WAF customers against the recently announced Microsoft Exchange Server vulnerabilities.
Engineering leaders: security is your job, too
The rise of secure DevOps has left many security professionals vying for the attention and support of their engineering counterparts. What can engineering leaders do to bridge the gap? We have four ideas to help you build security into your DevOps culture, workflows, and goals.
3 Benefits CDN's Bring to Startups
A modern CDN can help improve SEO rankings, make it easier to deliver personalized content, and secure your sites and apps — three keys to a startup’s success.
The new rules for web app and API security
Nearly everything we know about building web applications and APIs has changed in the last few decades. So why hasn't security? We argue it's time for a new approach to web app and API security, one that follows suit with how applications are really built and teams really work.
A unified platform is the future of secure DevOps
Fastly and Signal Sciences have joined forces to build the next generation of web app and API security at the edge. Explore what makes our approach different, and how it will empower developers to build more securely than ever before.
DDoS attacks grow bigger, but so do responses
DDoS attacks have been growing larger over the past few years. But so has the industry’s response to them. In this post, we take a look at what industry bodies and a modern CDN can do to protect your traffic.
5 best practices for your TLS configuration
The TLS Support Engineering team provides support for customers managing one to thousands of certificates. After helping so many customers tailor their DNS and TLS configurations, they have five best practices to recommend.
Prepare for DDoS attacks: 5 steps to take | Fastly
Layer 7 attacks that target applications and issue requests that can swamp origin systems often seek to blend into other network traffic and require a more focused defense than Layer 3 and 4 attacks. Here are five best practices you can implement to help prepare for such attacks.
Signal Sciences named Visionary in 2020 Magic Quadrant for Web Application Firewalls for second year | Fastly
We believe Signal Sciences’ innovation earned them recognition in the 2019 Gartner Magic Quadrant for WAF, and it’s this kind of innovation that excites us as we merge forces — now that Signal Sciences is part of Fastly.
Lessons Learned from Side-Channel Attacks
The largest category of difficult-to-anticipate security design weaknesses come from side-channel attacks. In this post, we take a tour of some of the more foundational and out-there side channel-related exploits that have afflicted the security conscious over the years.