You are here

Fastly Blog (Security)

Subscribe to Fastly Blog (Security) feed
Fastly's edge cloud platform helps the world's most popular digital businesses keep pace with their customer expectations by delivering fast, secure, and scalable online experiences.
Updated: 7 hours 27 min ago

Fastly at RSAC 2026: New Advances in AppSec, Bot Management, and Deception

Sun, 03/22/2026 - 20:00
Bot traffic is rising and getting more sophisticated. Learn how Fastly’s Adaptive Threat Engine and ATO Deception help teams mislead attackers and protect the bottom line.
Categories: Software Security

What's New in the Fastly Extension for Raycast

Mon, 03/16/2026 - 20:00
Manage Fastly Compute data stores (KV, Config, Secret), ACLs, and view audit logs with 5 powerful new commands in the Fastly Raycast extension.
Categories: Software Security

Under Attack? How Fastly Can Help

Mon, 03/16/2026 - 20:00
Under attack? Fastly's CSOC provides human-led security with a median 1-minute response time for critical DDoS and security threats.
Categories: Software Security

Ingress NGINX Controller for Kubernetes Retires – Where to Go From Here

Wed, 03/11/2026 - 20:00
The Ingress NGINX Controller for Kubernetes is retiring in March 2026. Learn your migration options to the Gateway API or HAProxy to maintain security and long-term architecture.
Categories: Software Security

Europe Under Pressure

Wed, 03/04/2026 - 19:00
Is your infrastructure resilient? Use our 3-step checklist to manage geopolitical cyber risks, ensure GDPR compliance, and address European data sovereignty.
Categories: Software Security

The AI Speed Tax: Why Moving Fast is Breaking Things in Cybersecurity

Tue, 02/24/2026 - 19:00
AI-first companies face 80-day longer recovery times, 135% higher incident costs, and rising AI scraping losses. Explore Fastly’s 2026 Global Security Research Report findings.
Categories: Software Security

Enhancing Security and Transparency: Introducing Private Notifications for Fastly Maintenance and Incidents

Mon, 02/23/2026 - 19:00
Improve incident response with Fastly’s private status page. Receive secure, service-specific maintenance and DDoS updates via SSO and Slack.
Categories: Software Security

Multi-CDN: A Critical Decision for a Resilient Architecture

Wed, 02/18/2026 - 19:00
Learn why Multi-CDN is a critical architecture for resilience & performance. Explore DNS, Layer 7, CDN chaining, and client-side steering with Fastly.
Categories: Software Security

Stopping Bad Bots Without Blocking the Good Ones

Tue, 02/03/2026 - 19:00
Keep trusted automation running while blocking malicious bots. Learn how precise WAF controls reduce false positives without weakening security.
Categories: Software Security

You own your availability: resilience in the age of third-party dependencies

Mon, 02/02/2026 - 19:00
When third-party services fail, your website — and revenue — can fail with them. Learn how to uncover hidden dependencies and use edge proxying to maintain uptime, performance, and control during outages.
Categories: Software Security

DDoS in December 2025

Wed, 01/21/2026 - 19:00
Learn how sophisticated Layer 7 and network DDoS attacks evolved in December 2025, including the year’s largest attack and mitigation strategies.
Categories: Software Security

Streamlining User Experiences While Fighting Bots

Tue, 01/13/2026 - 19:00
Streamline user experiences and fight bots with Fastly's new embedded challenges for Bot Management.
Categories: Software Security

Building Resilient Applications with Layered Security

Mon, 01/12/2026 - 19:00
Fastly's new security packages make layered application security easier to buy, use, and grow. Protect your apps with predictable pricing.
Categories: Software Security

API Security Features

Wed, 01/07/2026 - 19:00
Explore API security features, testing best practices, and edge protections to prevent data breaches, bot abuse, credential attacks, and API exploitation.
Categories: Software Security

Credential Stuffing Attacks Vs. Brute Force Attacks - What is the difference?

Wed, 12/31/2025 - 19:00
Learn the difference between credential stuffing and brute force attacks, how each works, and best practices to prevent account takeover and unauthorized access.
Categories: Software Security