Revenir au blog

Follow and Subscribe

Security

Seven Ways to Deploy Fastly’s Next-Gen WAF in Kubernetes

Brendon Macaraeg

DevOps teams adopt new tools and frameworks like application containers and Kubernetes, a container orchestration system, to more efficiently and quickly build and release applications.

Security
DevOps

Secure multi-cloud environments: Enterprise journey to the cloud

Jay Coley

As organizations go through a digital transformation of their processes and how they engage with their customers, they are often ready for a multi-cloud environment.

Security
2 de plus

Google BigQuery, Cloud Storage, Pub/Sub access management | Fastly

Dom Fee

Today we are excited to announce support for Google Identity and Access Management (IAM) in Limited Availability across our Google Logging endpoints Google BigQuery, Cloud Storage, and Pub/Sub.

Security
Privacy

Fastly talks with Mercedes-AMG PETRONAS F1 Team IT Director Michael Taylor | Fastly

Margaret Arakawa

In this interview, Fastly CMO Margaret Arakawa sits down with Michael Taylor, IT Director for Mercedes-AMG PETRONAS F1 Team, to discuss the role technology and security play within the Formula 1 team, as well as ways the two companies hope to work together to push the limits of innovation, performance, and the fan experience.

Culture
3 de plus

The Signals Series, Part 2: Diving into System Signals

Liz Hurder

Today we want to dive into the capabilities of system signals and how our wide range of signals provides customers with the most comprehensive out-of-the-box application protection.

Security
DevOps

Log4j JNDI Attack Signal Now Available

Daniel Corbett

We are excited to announce the general availability of our new LOG4J-JNDI attack signal, which allows for detecting and mitigating Log4Shell attacks.

Security
Product

A QUIC chat with Jana Iyengar: Rebuilding fundamental standards of the web

Anil Dash

A can’t-miss conversation with Fastly’s VP of Product, Infrastructure Services, Jana Iyengar about getting his hands dirty among a whole community of brilliant people who have been busy rebuilding the fundamental standards that underpin the internet that we all use every day.

Informations sur le secteur
3 de plus

Private Access Tokens and the Future of Anti-Fraud

Robert Gibson

Learn how the new authorization protocol, Private Access Tokens, is changing how DevOps teams and security professionals fight against fraudulent activity:

Privacy
Security

AWS Lambda and Cloud WAF upgrades for wider deployment | Fastly

Julie Rockett

WAF deployment flexibility is critical to keep up with the pace of business. That’s why we innovate on the widest range of WAF deployment methods in the market.

Security

Fastly in Gartner® Magic Quadrant™ for Web App and API Protection | Fastly

Lakshmi Sharma

Fastly Recognized in the Gartner® Magic Quadrant™ for Web Application and API Protection

Security

Interview with HUMAN CEO Tamer Hassan

Lakshmi Sharma

Fastly announced a reseller partnership with HUMAN Security, Inc. to better safeguard enterprises and internet platforms from sophisticated bot attacks and fraud. We sat down with HUMAN CEO and Co-founder Tamer Hassan to learn more about bots, and what HUMAN is doing to protect its customers from the threat.

Platform
2 de plus

Automating and Defending Nefarious Automation

Fastly Security Research Team, Simran Khalsa

If your application is on the internet, chances are it has been subjected to nefarious automation. These events can include many different attacks – including content scraping, credential stuffing, application DDoS, web form abuse, token guessing, and more.

Security

Pro Tips: Next-Gen WAF Mastery

The Fastly Security Technical Account Management Team

Learn how you can use your next-gen WAF effectively, along with best practices.

Security

Future security trends for 2022/2023 | Fastly

Mike Johnson

The world changed when the pandemic hit in 2020, leaving organizations unsure of how it would affect the future. Security leaders may have found themselves wondering if their long-standing business approaches, processes, and tools could withstand the changes brought on by the pandemic.

Security

What is TLS Fingerprinting?| Fastly

Fastly Security Research Team, Xavier Stevens

TLS fingerprinting has become a prevalent tool to help security defenders identify what clients are talking to their server infrastructure.

Security

The Signals Series, Part 1: Exploring Custom Signals

Liz Hurder

Traditional web application firewalls (WAFs) were created to stop malicious traffic from reaching your origin servers, which served its purpose well during an internet age of HTML and PNGs.

Product
Security

Fastly Wins 2 Cybersecurity Awards | Fastly

Julie Rockett

The RSA Conference (#RSAC) is here again, and we at Fastly couldn’t be more excited. It’s the first time the world-leading conference has been in-person since 2020, and we are thrilled to be reunited with friends, colleagues, and the entire security industry at San Francisco’s Moscone Center. And we’re excited for more than just who we’ll see and what we’ll learn at RSAC. During cybersecurity’s biggest week, Fastly has been honored with two industry awards.

Security

Virtual Patching with the Fastly Next-Gen WAF

Blake Dournaee

From bureaucratic red tape to chained dependencies patching servers has been a pain in the industry for years. This is why WAF-based virtual patching was introduced.

Security
Product

Future of web app/API security: Dept. of Know Live! | Fastly

Margaret Arakawa

Every Thursday in March, we hosted industry thought leaders on “The Dept. of Know Live!” Web Series to chat about trends in web app and API security. Read on to learn more about our takeaways from the series, how it resonated with our audience, and where we go from here.

Informations sur le secteur
Security

Threat hunting network callbacks in WAF data

Fastly Security Research Team, Xavier Stevens

Threat hunting is the practice of looking for active attackers who have possibly penetrated security boundaries within an organization. WAF data can be a valuable resource in threat hunting for network callbacks. Here’s how.

Security