Revenir au blog

Follow and Subscribe

Tous les articles

Page 8

How to recognize and repel four high-risk attack types

Brendon Macaraeg

After years of helping protect companies across a variety of industries, we’ve come to recognize four common risk attack types. Here’s how they work and how to counter them.

Security

Endless OS Foundation Bridges Digital Divide | Fastly

Hannah Aubry

The Endless OS Foundation saw a big spike in traffic at the onset of the COVID-19 pandemic. But thanks to modern CDN features like soft purge, TTL, and segmented caching, they’re able to continue bridging the digital divide.

Customers
Performances

How to test site speed optimizations with Compute

Leon Brocard

In this post, we show how to test site speed modifications before implementing them using Compute and WebPageTest, a web performance tool that uses real browsers, to compare web performance between the original and transformed page versions.

Engineering
Compute

4 Ways Legacy WAF Fails to Protect Your Apps

Liz Hurder

The legacy WAF isn’t ubiquitous because it’s the perfect technology. Its success comes down to being mandated, despite four ways it often fails.

Security

Suggestive signals: how to tell good bot traffic from bad

Brendon Macaraeg

While some bots are benign search engine crawlers or website health monitors, others are on the prowl with nefarious intent, looking to execute account takeovers and compromise APIs. In this post, we’ll look at how to tell them apart in order to allow the good bots and block the bad ones.

Security

Summary of June 8 outage

Nick Rockwell

We experienced a global outage due to an undiscovered software bug that surfaced on June 8 when it was triggered by a valid customer configuration change. Here's a rundown of what happened, why, and what we're doing about it.

Actualités de la société
2 de plus

Cranelift vetted for secure sandboxing in Compute@Edge | Fastly

Pat Hickey, Chris Fallin, 1 de plus

Alongside the Bytecode Alliance, Fastly’s WebAssembly team recently led a rigorous security assessment of Cranelift, an open-source, next-generation code generator for use in WebAssembly to provide sandbox security functionality.

Informations sur le secteur
3 de plus

Minimizing ossification risk is everyone’s responsibility

Mark Nottingham

Building protocols in a way that anticipates future change in order to prevent ossification is critical. Because it’s impossible to upgrade everyone on the internet at the same time; it needs to be possible to introduce changes gradually, without harming communication where only one party understands the change — and this is everyone’s responsibility.

Engineering
Informations sur le secteur