WHY GARTNER’S “CONTEXT MESH” CHANGES EVERYTHING AI CONNECTIVITY: THE ROAD AHEAD DON’T MISS API + AI SUMMIT 2026 SEPT 30 – OCT 1
  • Why Kong
    • Explore the unified API Platform
        • BUILD APIs
        • Kong Insomnia
        • API Design
        • API Mocking
        • API Testing and Debugging
        • MCP Client
        • RUN APIs
        • API Gateway
        • Context Mesh
        • AI Gateway
        • Event Gateway
        • Kubernetes Operator
        • Service Mesh
        • Ingress Controller
        • Runtime Management
        • DISCOVER APIs
        • Developer Portal
        • Service Catalog
        • MCP Registry
        • GOVERN APIs
        • Metering and Billing
        • APIOps and Automation
        • API Observability
        • Why Kong?
      • CLOUD
      • Cloud API Gateways
      • Need a self-hosted or hybrid option?
      • COMPARE
      • Considering AI Gateway alternatives?
      • Kong vs. Postman
      • Kong vs. MuleSoft
      • Kong vs. Apigee
      • Kong vs. IBM
      • GET STARTED
      • Sign Up for Kong Konnect
      • Documentation
      • FOR PLATFORM TEAMS
      • Developer Platform
      • Kubernetes and Microservices
      • Observability
      • Service Mesh Connectivity
      • Kafka Event Streaming
      • FOR EXECUTIVES
      • AI Connectivity
      • Open Banking
      • Legacy Migration
      • Platform Cost Reduction
      • Kafka Cost Optimization
      • API Monetization
      • AI Monetization
      • AI FinOps
      • FOR AI TEAMS
      • AI Governance
      • AI Security
      • AI Cost Control
      • Agentic Infrastructure
      • MCP Production
      • MCP Traffic Gateway
      • FOR DEVELOPERS
      • Mobile App API Development
      • GenAI App Development
      • API Gateway for Istio
      • Decentralized Load Balancing
      • BY INDUSTRY
      • Financial Services
      • Healthcare
      • Higher Education
      • Insurance
      • Manufacturing
      • Retail
      • Software & Technology
      • Transportation
      • See all Solutions
  • Pricing
      • DOCUMENTATION
      • Kong Konnect
      • Kong Gateway
      • Kong Mesh
      • Kong AI Gateway
      • Kong Event Gateway
      • Kong Insomnia
      • Plugin Hub
      • EXPLORE
      • Blog
      • Learning Center
      • eBooks
      • Reports
      • Demos
      • Customer Stories
      • Videos
      • EVENTS
      • API + AI Summit
      • Webinars
      • User Calls
      • Workshops
      • Meetups
      • See All Events
      • FOR DEVELOPERS
      • Get Started
      • Community
      • Certification
      • Training
      • COMPANY
      • About Us
      • We're Hiring!
      • Press Room
      • Contact Us
      • Kong Partner Program
      • Enterprise Support Portal
      • Documentation
  • Login
  • Book Demo
  • Get Started
Blog
  • AI Gateway
  • AI Security
  • AIOps
  • API Security
  • API Gateway
|
    • API Management
    • API Development
    • API Design
    • Automation
    • Service Mesh
    • Insomnia
    • View All Blogs
  1. Home
  2. Blog

All Blogs

‹Prev1…171819…56Next›

Deep Dive into Kong Gateway's New Rust-Based Router

EngineeringJuly 18, 2024

The router component in the Kong Gateway is a crucial element for traffic handling, allowing the definition of specific matching rules to identify and process client requests. As a core component of the gateway, the router plays a vital role in ensuring the functionality, flexibility, security as…

Guanlan Dai

API Productization Simplified with Multiple Portals in Kong Konnect

Product ReleasesJuly 16, 2024

Efficiently managing your developer portal is critical in productizing your APIs quickly and reliably. A streamlined developer portal ensures that your APIs are easily accessible, well-documented, and secure — driving higher adoption and easier integration. With the increasing demand for APIs…

Ella Kuzmenko

Demonstrating Proof-of-Possession (DPoP): Preventing Illegal Access of APIs

EngineeringJuly 15, 2024

In a previous blog post , we discussed the prevalence of bearer tokens (or access tokens) to restrict access to protected resources, the challenges the sheer nature of bearer tokens present, and available mitigations. To recap, presenting a bearer token is proof enough of an authorization grant to…

Veena Rajarathna

Lessons We Learned Implementing a Design System at Kong

EngineeringJuly 3, 2024

In this article, we'll talk about our experience implementing a design system at Kong. We'll go over the reasons why we decided we needed one in the first place, where we started, and how we got to where we are today. We'll also cover the technology we used and how it has transformed software…

Maksym Portianoi

Introducing Insomnia 9.3 GA with After-Response Scripting, Global Environments, Folder-Level Configuration, and More

Product ReleasesJune 27, 2024

Today, we're pleased to announce another packed release for Kong Insomnia with many new features and improvements. We recommend every user update to this latest version, available for download today at https://insomnia.rest/download . We've released after-response scripting, which in combination…

Marco Palladino

3 Strategies to Supercharge Developer Operational Efficiency

EnterpriseJune 27, 2024

Developer operational efficiency is crucial for streamlining API management processes and empowering development teams to work more effectively. In this blog post, we'll explore three key tips to unlock developer operational efficiency — leveraging API documentation and self-service credential…

Peter Barnard

Extensions to Improve Security and Get the Most Out of Kong

EngineeringJune 26, 2024

OAuth 2.0 is the current gold standard for secure delegated authorization. The reason is simple: OAuth puts control back in the hands of the users. It enables users to securely grant access to their resources without having to share passwords with third-party applications. Hence, it's one of the…

Veena Rajarathna

8 Cloud Cost Optimization Tactics for Kubernetes

8 Cloud Cost Optimization Tactics for Kubernetes
EnterpriseJune 26, 2024

If you've ever gotten sticker shock after receiving a surprisingly large cloud bill, you're not alone. Many organizations have faced this challenge, especially as they scale their Kubernetes deployments . While the cloud makes flexible scaling possible, it has also introduced many new services one…

Annie Talvasto

What's New in Kong Ingress Controller 3.2?

Product ReleasesJune 20, 2024

Kong Ingress Controller (KIC) 3.2 is here, and it’s an incredible release. It contains features related to graph theory, features that mean you’ll never need a database again, and a whole host of quality-of-life fixes. If you’ve been using KIC for a long time, you might remember that it was…

Michael Heap

How to Craft and Sign a Custom JWT in Kong Konnect

EngineeringJune 18, 2024

The JSON Web Token (JWT) is an open standard that allows information to be transferred securely between different parties. The token is digitally signed by using a private key (HMAC) or a public/private key (RSA) by building a JSON Web Signature (JWS). It guarantees that the JWT hasn’t been…

Jerome Guillaume

Why Your Engineers Want to Migrate to Kubernetes

Why Your Engineers Want to Migrate to Kubernetes
EnterpriseJune 11, 2024

In today's rapidly evolving technological landscape, software teams have found themselves at the heart of business strategy. Their decisions on which technologies to invest in have become crucial, directly impacting a company's agility and ability to differentiate itself in the market. As a result,…

Kong

Achieving Zero Trust on VMs with Universal Mesh

EngineeringJune 10, 2024

Two of the main tenets of Zero Trust are encryption between services and managing the connections each service is allowed to use. Achieving this generally falls to running a service mesh in a Kubernetes cluster. Refactoring applications to run properly in Kubernetes takes time and considerable…

George Fridrich

Automating API Delivery with APIOps and Kong

EngineeringJune 5, 2024

As organizations build more APIs, manual processes and frequent handoffs in the API development workflow can lead to a slower time to market, higher development costs, and poor-quality APIs. They can also result in APIs being poorly documented, causing poor API adoption and lower revenues. APIOps…

Rick Spurgeon

API Management is Fundamental to Modernizing Insurance Operations

EnterpriseJune 5, 2024

The concept of insurance predates the printing press and the steam engine. So it's likely no surprise that the industry — as obviously adaptable as it is — often faces challenges related to the modernization of legacy systems. In the age of AI and APIs (application programming interfaces) ,…

Wes Beck

5 Architectural Patterns for Securing Connectivity at Scale

5 Architectural Patterns for Securing Connectivity-Blog-Post-Header
EnterpriseJune 3, 2024

In the age of surgical robots, smart refrigerators, self-driving vehicles, and unmanned aerial vehicles, connectivity undoubtedly is a foundational block for our modern world. As we move further into the 2020s, this connectivity has expanded to encompass emerging technologies like 5G networks ,…

Kong
‹Prev1…171819…56Next›

See AI Gateway in Action

Secure your AI infrastructure with prompt guards, PII sanitization, and centralized governance. Control LLM costs with token-based rate limiting and semantic routing across providers.

Get a Demo

See AI Gateway in Action

Secure your AI infrastructure with prompt guards, PII sanitization, and centralized governance. Control LLM costs with token-based rate limiting and semantic routing across providers.

Get a Demo

Increase developer productivity, security, and performance at scale with the unified platform for API management and AI.

  • Japanese
  • Frenchcoming soon
  • Spanishcoming soon
  • Germancoming soon
© Kong Inc. 2026
  • Terms
  • Privacy
  • Trust and Compliance