How APISecOps Protects Against API Abuse

In this post, we'll talk about what API SecOps is, including the fundamentals of it and the personas involved. Then, we'll discuss how API, microservice, and policy lifecycles integrate to produce a secure service in production, and why collaboratio
2 Approaches to Microservices Monitoring and Logging

We're seeing a massive shift in how companies build their software. More and more, companies are building—or are rapidly transitioning—their applications to a microservice architecture. The monolithic application is giving way to the rise of micro
Expanded Observability, Orchestration, and Security with Kong Gateway 3.13

As API ecosystems grow more complex, maintaining visibility and security shouldn't be a hurdle. Kong Gateway 3.13 simplifies these challenges with expanded OpenTelemetry support and more flexible orchestration. These new capabilities not only make y
A Strategy to Testing Microservices

With microservices architectures being adopted more and more widely, organizations need to adapt their testing strategy in order to capitalize on the advantages of a loosely coupled system. The shift towards microservices is closely related to bot
From Chaos to Control: How Kong AI Gateway Streamlined My GenAI Application

🚧 The challenge: Scaling GenAI with governance While building a GenAI-powered agent for one of our company websites, I integrated components like LLM APIs, embedding models, and a RAG (Retrieval-Augmented Generation) pipeline. The application was d
10 Ways Microservices Create New Security Challenges

Why are Microservices Security Risks?
Traditional security was simple. One perimeter. Few entry points. Clear boundaries.
Microservices shattered this model. Now organizations manage hundreds of independent services. The average number of API calls
5 Best Practices for Securing Microservices at Scale in 2025

The Challenge: Securing Distributed Systems
Netflix operates over 1,000 microservices handling two billion daily requests (Microservices architecture: from Netflix to APIs). One security gap can trigger cascading breaches.
Traditional perimeter sec