FastlyVerified account

@fastly

Get more powerful websites and applications with Fastly’s edge cloud platform. We help places like Shopify, the NYT, and Stripe do so every day.

Everywhere
Joined July 2011

Tweets

You blocked @fastly

Are you sure you want to view these Tweets? Viewing Tweets won't unblock @fastly

  1. Pinned Tweet
    Mar 22

    90% of people use our next-gen WAF in blocking mode. In other words... it's security you'll *actually* use. 👉

    Undo
  2. Sep 10

    The modern enterprise needs a modern centralized stack to drive change. Too often the tooling needed to maintain API security is an afterthought, making efforts feel like an uphill battle. Learn more in :

    Undo
  3. Sep 9

    As our needs and behaviors change, so too should the internet. We're bringing you before-and-after stories of innovations that fundamentally bettered the web for us all. Part 2: HTTP-based adaptive bitrate streaming

    Undo
  4. Sep 8

    Cybercriminals use our “lizard brains” against us — but understanding the tactics they use can help you prepare and secure your organization against them. Learn more from in :

    Undo
  5. Sep 8

    The integration of Fastly’s Compute@Edge and 's observability platform is providing a different approach to going serverless. Register now for a deep dive with our experts on Sept 14th:

    Undo
  6. Retweeted
    Sep 7

    A week on, continues to recover from the damage caused by , including to power and telecom infrastructure. data shows that traffic from wired providers in the area (, ) is gradually increasing.

    Undo
  7. Sep 7

    Web apps are critical to most businesses' success — yet security tools haven't kept pace with development innovations. To understand today’s application security tipping point, we conducted research in partnership with . Here’s what we found:

    Undo
  8. Sep 6

    Busy, stressed-out employees are bad for the security of your web apps and APIs. Fullstop.

    Undo
  9. Sep 5

    Security teams can either slow themselves and developers down or optimize their security strategy to support velocity as safely as possible. Article by in :

    Undo
  10. Sep 4

    Learn more about JavaScript support on Compute@Edge from our APAC Technology Evangelist in this round-up of top edge computing stories:

    Undo
  11. Sep 4

    cURL is a tool used for all forms of URL fetching — our Sr. Sales Engineer uses it to test how an origin server responds by manipulating the request using flags. Learn how:

    Undo
  12. Sep 3

    📣 We’ve released a WAF rule that protects customers from the Atlassian Confluence vulnerability; we recommend our customers enable it immediately. Learn more about the patch and what else you can do to protect yourself from our Security Research Team:

    Undo
  13. Retweeted
    Sep 3

    Reported attack targeting / in New Zealand 🇳🇿 caused significant disruption to customer connectivity. data shows >90% drop in AS9790 traffic for nearly an hour. h/t:

    Undo
  14. Sep 3

    Learn how capturing valuable customer feedback and actionable insights can make all the difference 👇

    Undo
  15. Sep 2

    How we build the internet — and everything upon it — matters. We're bringing you stories of innovations that allowed the web to dynamically adapt to our needs and laid a more solid foundation for the future. Part 1: Zero-trust networking

    Undo
  16. Retweeted
    Aug 25

    Winning At VoC, our collaboration w/ , examines the strategies leading FinTechs and FIs employ to optimize their VoC data as a part of an overall customer experience strategy

    Undo
  17. Retweeted
    Sep 2

    Our friends at have been working hard to redefine the capabilities and role of the traditional CDN in terms of security and edge computing. Join us on and clear your cache with Teddi Poehls and

    Undo
  18. Sep 1

    Our CTO was live with discussing and Compute@Edge — watch the recording now👇

    Undo
  19. Retweeted
    Aug 31

    Announcing our first FinCyber Today keynote: 's Kelly Shortridge () on sifting signal from noise in a distributed, cloudier world, and how automation can support our resilience against information overflows going forward. Register now:

    Undo
  20. Aug 30

    Human error should never be labeled the cause of a security incident because it's likely the person only triggered another factor. Agree?

    Undo
  21. Retweeted
    Aug 30

    Web site & application usage remains elevated in 🇳🇿 due to extended lockdown. Current peak traffic levels to the country are 20-60% higher than peaks observed during the first half of the month.

    Undo

Loading seems to be taking a while.

Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.

    You may also like

    ·