Blog
  • AI Gateway
  • AI Security
  • AIOps
  • API Security
  • API Gateway
|
    • API Management
    • API Development
    • API Design
    • Automation
    • Service Mesh
    • Insomnia
    • View All Blogs
  1. Home
  2. Blog

All Blogs

‹Prev1…8910…54Next›

How to Create a Platform Cross-Charging Model (and Why Not To Do It)

EnterpriseMay 2, 2025

I'm commonly asked by customers for advice on how they can build a good platform cross-charging model for their organization. And my gut reaction is nearly always "don't." We'll come back to why I think that later, but first let's look at what cross-charging means, why you might want it, and how it…

Steve Roberts

It’s Time to Bring Kafka Event Streaming into Your API Platform

EnterpriseApril 29, 2025

For the past several years, there have been murmurs of an incoming convergence between API management and event management. This has been more than a vendor-led phenomenon; industry analysts — such as Gartner and Forrester — see the worlds colliding as well, which is why Gartner mentions event…

Alex Drag

Semantic Processing and Vector Similarity Search with Kong and Redis

EngineeringApril 29, 2025

Kong has supported Redis since its early versions. In fact, the integration between Kong Gateway and Redis is a powerful combination to enhance API management. We can summarize the integration points and use cases of Kong and Redis into three main groups: For all use cases, Kong supports multiple…

Claudio Acquaviva

Implementing an Open Source Vulnerability Management Strategy

EngineeringApril 28, 2025

Open source software has become an indispensable component of modern software development. With its easy accessibility, it offers numerous benefits such as cost savings, flexibility, and collaborative innovation. Since the use of open source components has become so mainstream, it poses some unique…

Kong

Securing, Observing, and Governing MCP Servers with Kong AI Gateway

Product ReleasesApril 24, 2025

The explosion of AI-native applications is upon us. With each new week, massive innovations are being made in how AI-centric applications are being built. There are a variety of tools developers need to consider, be it supplying live contextual data via the Model Context Protocol (MCP) or…

Greg Peranich

Ensuring Tenant Scoping in Kong Konnect Using Row-Level Security

EngineeringApril 22, 2025

In the SaaS world, providers must offer tenant isolations for their customers and their data. This is a key requirement when offering services at scale. At Kong, we've invested a lot of time to provide a scalable and seamless approach for developers to avoid introducing breaches in our systems. In…

Vincent Le Goff

Terraform Your Way to the Cloud with Konnect Dedicated Cloud Gateways

EngineeringApril 16, 2025

Too many organizations manually manage their API gateways and policy enforcement today. As humans, we make mistakes. You’ve got one team manually configuring Kong or another gateway on AWS, another fiddling with policies in Azure, and someone else applying governance rules by hand in GCP. That’s a…

Declan Keane

New Enhancements to Konnect to Fuel API-Driven Innovation

Product ReleasesApril 15, 2025

APIs are the lifeblood of disruption . . . when leveraged correctly. The best, most disruptive businesses are able to harness API growth as a strategic opportunity. But how? With an API platform that drives innovation, faster delivery, and top-tier customer experiences alongside a top-notch…

Erin Choi

RBAC Explained: The Basics of Role-Based Access Control

Learning CenterApril 14, 2025

As cybersecurity takes the main stage, organizations face a significant challenge: how do you strike a balance between maintaining a high level of security and ensuring employees have enough data access to perform their jobs properly? Role-based access control (RBAC) is a solution that can support…

Kong

What Is RAG? Guide to Retrieval-Augmented Generation in AI

WHAT IS RAG
Learning CenterApril 14, 2025

When was the last time your AI assistant confused a memo from the CEO with 'Game of Thrones' plot lines? Have you ever asked a chatbot a question, only to receive an answer that was not only wrong but hilariously outdated? Imagine asking about the latest iPhone model and getting a response…

What is Docs as Code?

Learning CenterApril 14, 2025

If you take a step back and think about today’s software development landscape, you could argue that documentation is just as important as the code itself. That’s because traditional documentation workflows — where documentation is manually updated, stored separately from code, and thus often falls…

Kong

Implementing OpenTelemetry Observability with Kong Konnect & Dynatrace

EngineeringApril 9, 2025

Observability has become critical to ensuring the effective monitoring of application and system performance and health. It focuses on understanding a system’s internal state by analyzing the data it produces in the context of real-time events and actions across the infrastructure. Unlike…

Claudio Acquaviva

G2 Ranks Kong #1 for API Management and API Development

NewsApril 8, 2025

Kong is ranked number 1 on the G2 Momentum Grids for API Management and API Development for Spring 2025. And users seem to agree with the glowing assessment: Kong is currently the highest-rated tool based on user satisfaction in the categories of API Management and API Development on G2. We think…

Eric Pulsifer

Tracing, Logging, Metrics: Unifying Observability with OpenTelemetry

EngineeringApril 8, 2025

Software development has always evolved with new paradigms to meet the growing demands of modern systems. One of the most significant shifts has been the adoption of microservices. Emerging in the early 2010s, this architectural pattern moved away from monolithic applications in favor of smaller,…

Madan Thangavelu

API and Data Security: Is It Time to Switch to Kong Insomnia?

EnterpriseApril 8, 2025

Recent leaks have once again brought API and data security concerns into the spotlight. Specifically, the leaks pointed at the following as major areas to consider when thinking through your API and data security strategies: When considering the above, it’s critical to think about best practices…

Adam Jiroun
‹Prev1…8910…54Next›

See AI Gateway in Action

Secure your AI infrastructure with prompt guards, PII sanitization, and centralized governance. Control LLM costs with token-based rate limiting and semantic routing across providers.

Get a Demo
Powering the API world

Increase developer productivity, security, and performance at scale with the unified platform for API management, AI gateways, service mesh, and ingress controller.

Sign up for Kong newsletter

    • Platform
    • Kong Konnect
    • Kong Gateway
    • Kong AI Gateway
    • Kong Insomnia
    • Developer Portal
    • Gateway Manager
    • Cloud Gateway
    • Get a Demo
    • Explore More
    • Open Banking API Solutions
    • API Governance Solutions
    • Istio API Gateway Integration
    • Kubernetes API Management
    • API Gateway: Build vs Buy
    • Kong vs Postman
    • Kong vs MuleSoft
    • Kong vs Apigee
    • Documentation
    • Kong Konnect Docs
    • Kong Gateway Docs
    • Kong Mesh Docs
    • Kong AI Gateway
    • Kong Insomnia Docs
    • Kong Plugin Hub
    • Open Source
    • Kong Gateway
    • Kuma
    • Insomnia
    • Kong Community
    • Company
    • About Kong
    • Customers
    • Careers
    • Press
    • Events
    • Contact
    • Pricing
  • Terms
  • Privacy
  • Trust and Compliance
  • © Kong Inc. 2026