Domain Inspector provides you with real-time and historical views of domain-level traffic and performance. Reduce the need for complex data pipelines, improve load balancing decisions, or…
Fastly Academy, our new on-demand learning center, contains lessons for learners of all levels. It’s one more way we’re helping you work — and expand your skills — the way that fits you best…
Open URL redirection is a class of web app security problems that make it easier for attackers to direct users to malicious resources. Here are some examples of how they do it and what you…
There are many benefits to adopting GraphQL, but its security implications are less understood. In this post, we’ll explore those implications and offer guidance on which defaults and…
The Fastly CLI now supports bootstrapping Compute projects using fiddles made in Fastly Fiddle as a template. This enables users to get a local developer environment up and running very…
We’re introducing Cloud Deploy, a wizard that helps you start building on Compute by deploying and customizing templates, and sets you up with an automated deployment workflow and best…
In this post, we’ll take a look back at the past year through the eyes of our edge cloud network to explore what we saw across new protocol adoption, security initiatives, network growth…
By bringing your content closer to the reader, you bypass the conventional cost and rules associated with server space and infrastructure maintenance, and you gain some additional benefits…
Origin Inspector provides you with a dataset and visualizations that offer real-time and historical visibility into responses delivered from your origin servers to our edge cloud. And we’re…
Our new WAF efficacy framework provides a standardized way to measure the effectiveness of a WAF’s detection capabilities through continuous verification and validation. Here’s how it works.
We’re sharing our latest data and new insights into the Log4j/Log4Shell vulnerability (CVE-2021-44228 + CVE-2021-45046) in this post in order to help the engineering community cope with the…
CVE-2021-44228 is a Remote Code Execution vulnerability in the Apache Log4j library being actively exploited. We provide our observations into the exploit and a summary of its impact.