JupiterOne CISO and Head of Research Sounil Yu joined hosts Kelly Shortridge and Bea Hughes on The Dept. of Know Live! to chat about how to make security an enabler of innovation. In this…
While there’s no magic answer to stop all cyberattacks, there are a number of principles used in a defense-in-depth strategy that can be put in place ahead of a possible attack to limit its…
Former Twitter CISO Rinki Sethi joined hosts Kelly Shortridge and Bea Hughes on The Dept. of Know Live! to chat about what success in modern security means. In this blog post, Rinki shares…
With the introduction of custom response codes, our edge cloud network can now pick up response codes from the Fastly Next-Gen WAF and take custom action at the edge — without the need to…
We’re excited to announce a growing ecosystem of partners who are tapping into our powerful edge cloud network and using Compute to extend their platform to be even closer to customers.
Amid the escalating invasion of Ukraine, the Fastly team is actively monitoring the health, availability, and performance of our edge cloud network along with maintaining close communication…
In this post, we break down our current observability offering and highlight some of the ways DevOps and SRE teams are using Fastly to investigate anomalies, improve performance and up-time…
The Dept. of Know Live! is a virtual speaker series designed to make you think differently about web app and API security. Each episode in March will feature a different guest for a 1…
OpenStreetMap, a member of our open-source program, moved from a proprietary content delivery network to ours and saw improvements in speed, customizability, and innovation.
The Fastly Next-Gen WAF (powered by Signal Sciences) protects apps wherever they live: on-premises, in containers, in the cloud, and — as of today — at the edge. This makes it the industry’s…
Our new partnership lets you deploy Glitch apps to Compute@Edge, making it even easier to build high-quality, customized digital experiences on our edge cloud platform.
In this post, we present a look at our vulnerability remediation and engineering team and how they were able to roll out a recent fix for a QUIC/H2O vulnerability in under two weeks.