If your application is on the internet, chances are it has been subjected to nefarious automation. These events can include many different attacks – including content scraping, credential…
The world changed when the pandemic hit in 2020, leaving organizations unsure of how it would affect the future. Security leaders may have found themselves wondering if their long-standing…
Fastly is thrilled to announce it has acquired Glitch, with plans to continue fostering one of the most beloved developer communities on the web today.
Almost all webpages today load resources from origins other than the one the page came from, which can play havoc with the way your site loads and make it harder to write a strict Content…
Threat hunting is the practice of looking for active attackers who have possibly penetrated security boundaries within an organization. WAF data can be a valuable resource in threat hunting…
At Fastly, we design for a delightful enterprise experience by looking deeply at customer needs. In this post, our Director of Product Experience shares some of the similarities and…
Fastly’s Observability Dashboard allows you to analyze all your edge delivery metrics and observability data in one interactive window. In this blog, learn more about the dashboard, now in…
This post will illuminate how deadlock bugs emerge, some facets of their fascinating and frustrating strangeness, and guidance on how to handle them in your own systems.
Our new KV Store offers global, durable storage for compute functions at the edge. With fast reads and writes from both the edge or via API, you can store, control, or cache your data to…
In this post, we’ll cover three questions — and recommendations for each — to ask yourself on the front end of application development to save time when it comes to scale.