Follow and Subscribe

Featured

23 avril
We are thrilled to announce the launch of Log Manager & Insights, now in beta! Store, inspect, and monitor your log data on the Fastly platform.
5 octobre 2022
In this interview, Fastly CMO Margaret Arakawa sits down with Michael Taylor, IT Director for Mercedes-AMG PETRONAS F1 Team, to discuss the role technology and security play within the…
23 septembre 2022
The internet is an unprecedented venue for connecting with others, transacting business, learning and expressing ourselves. However, some of the fundamental mechanics of the web lend…
21 septembre 2022
With our new next-compute-js library, you can now host your Next.js application on our Compute@Edge platform – giving you the benefits of both the Next.js developer experience and our…
14 septembre 2022
WAF deployment flexibility is critical to keep up with the pace of business. That’s why we innovate on the widest range of WAF deployment methods in the market.
6 septembre 2022
Fastly Recognized in the Gartner® Magic Quadrant™ for Web Application and API Protection
29 août 2022
If your application is on the internet, chances are it has been subjected to nefarious automation. These events can include many different attacks – including content scraping, credential…
11 août 2022
The world changed when the pandemic hit in 2020, leaving organizations unsure of how it would affect the future. Security leaders may have found themselves wondering if their long-standing…
19 mai 2022
Fastly is thrilled to announce it has acquired Glitch, with plans to continue fostering one of the most beloved developer communities on the web today.
11 mai 2022
Almost all webpages today load resources from origins other than the one the page came from, which can play havoc with the way your site loads and make it harder to write a strict Content…
9 mai 2022
We’re thrilled to announce that Fastly has been named a “Customers’ Choice” in the 2022 Gartner Peer Insights™ “Voice of the Customer”: Global CDN.
3 mai 2022
Threat hunting is the practice of looking for active attackers who have possibly penetrated security boundaries within an organization. WAF data can be a valuable resource in threat hunting…

Ready to get started?

Get in touch or create an account.