Blog
  • AI Gateway
  • AI Security
  • AIOps
  • API Security
  • API Gateway
    • API Management
    • API Development
    • API Design
    • Automation
    • Service Mesh
    • Insomnia
  1. Home
  2. Blog
  3. API Security

API Security

The latest news and announcements about Kong, our products, and our ecosystem, as well as voices from across our community.

Latest

Merge API Management & Identity to Unlock Your API Platform's Potential

API ManagementOctober 7, 2025

APIs empower every enterprise function, starting from seamless customer experiences to efficient internal operations. As a matter of fact, APIs are the foundational technology that fuels the advancements in AI, MCP, agentic, and autonomous systems. They're the critical connective tissue that allows…

Dan Temkin

From Chaos to Control: How Kong AI Gateway Streamlined My GenAI Application

AI GatewayOctober 6, 2025

In this post, Kong Champion Sachin Ghumbre shares his journey of transforming a complex GenAI application from a state of operational challenges to streamlined control. Discover how Kong AI Gateway provided the enterprise-grade governance needed to secure, optimize, and scale his GenAI solution,…

Sachin Ghumbre

Enable Enterprise-Wide Agentic Access to APIs

API ManagementOctober 3, 2025

While more and more organizations are seeking to standardize and consolidate their API and AI infrastructure efforts in a unified platform , the reality is that many — especially large — organizations already have disparate API deployments across disparate API gateways. One common API gateway that…

Alex Drag

10 Ways Microservices Create New Security Challenges

MicroservicesOctober 1, 2025

TL;DR: Challenges with Microservices Security The Challenge: API calls make up a massive 71% of all web traffic, yet many organizations still rely on traditional security tools designed for monolithic architectures. The Risk: Organizations face an average of 421 APIs to manage, with machine…

Mike Bilodeau

Subscribe to Kong’s newsletter

Stay ahead of API and AI Gateway trends. Get expert insights, technical guides, and best practices delivered to your inbox.

View All API Security Posts

5 Best Practices for Securing Microservices at Scale in 2025

5 Best Practices for Securing Microservices at Scale
MicroservicesSeptember 26, 2025

TL;DR Secure microservices at scale with these five proven practices: Build Complete Architecture Visibility - Map all services and dependencies to identify security gaps Implement Zero Trust Authentication - Verify every request between services using mTLS and centralized identity Create…

Kong

Federated Deployments with Control Plane Groups

API SecuritySeptember 24, 2025

In this blog post, we'll talk about the significant challenge of managing and governing a growing number of APIs across multiple teams in an organization — and how Control Plane Groups are a clear solution to avoid the chaos of inconsistent policies and operational bottlenecks. Scaling your API…

Declan Keane

API Management as a Central Security Hub

API PlatformSeptember 11, 2025

While many organizations mistakenly believe a single tool can solve all their API security woes, the truth is far more complex. This blog post will dismantle the myth of the "silver bullet" and demonstrate how a comprehensive, defense-in-depth strategy, centered around a robust API management…

Veena Rajarathna

What is API Security?

API ManagementJuly 3, 2025

APIs are the digital lifelines powering modern applications, microservices, IoT devices, and everything in between. They act as the universal translators of data, ferrying information between diverse software platforms. API security encompasses the technologies, practices, and protocols dedicated…

Kong

Create an Internal API and Service Inventory with Konnect Service Catalog

Kong GatewayJuly 1, 2025

When speaking with our customers, and particularly with platform teams, we repeatedly hear about how difficult it is to discover and govern all the services and APIs that actively run on their infrastructure. In ever-expanding and changing environments, platform teams often grapple with the…

Erin Choi

Kong Event Gateway: Unifying APIs and Events in a Single API Platform

KafkaMay 13, 2025

Kong customers include some of the most forward-thinking, tech-savvy organizations in the world. And while we’re proud to help them innovate through traditional APIs, the reality is that their ambitions don’t stop there. Increasingly, our customers are investing heavily in real-time data and event…

Umair Waheed

Implementing an Open Source Vulnerability Management Strategy

API SecurityApril 28, 2025

Open source software has become an indispensable component of modern software development. With its easy accessibility, it offers numerous benefits such as cost savings, flexibility, and collaborative innovation. Since the use of open source components has become so mainstream, it poses some unique…

Kong

Ensuring Tenant Scoping in Kong Konnect Using Row-Level Security

Kong KonnectApril 22, 2025

In the SaaS world, providers must offer tenant isolations for their customers and their data. This is a key requirement when offering services at scale. At Kong, we've invested a lot of time to provide a scalable and seamless approach for developers to avoid introducing breaches in our systems. In…

Vincent Le Goff

RBAC Explained: The Basics of Role-Based Access Control

API SecurityApril 14, 2025

As cybersecurity takes the main stage, organizations face a significant challenge: how do you strike a balance between maintaining a high level of security and ensuring employees have enough data access to perform their jobs properly? Role-based access control (RBAC) is a solution that can support…

Kong

Kong Insomnia 11: Elevating API Security and Collaboration

InsomniaMarch 18, 2025

We’re excited to announce the general availability of Kong Insomnia 11! This release introduces third-party vault integrations for enhanced security, an all-new Git sync experience for more seamless collaboration, and support for multi-tabs to improve efficiency within the Insomnia application.…

Adam Jiroun

Building and Running Secure APIs with Kong and Traceable

Kong Logo
API SecurityFebruary 6, 2025

Cloud native application development relies heavily on APIs. APIs have proven themselves as a scalable and efficient way to capture, deploy, and scale functionality. Consequently, APIs became a target for malicious actors to misuse. Therefore, building quality APIs with adequate security controls…

Ahmed Koshok

How to Implement Secure Access Control with OPA and Kong Gateway

API SecurityJanuary 8, 2025

Ensuring secure access to applications and APIs is critical. As organizations increasingly adopt microservices architectures and cloud native solutions, the need for robust, fine-grained access control mechanisms becomes paramount. This is where the combination of Open Policy Agent (OPA) and Kong…

Raja Ravi Varman
12…6Next›

See AI Gateway in Action

Secure your AI infrastructure with prompt guards, PII sanitization, and centralized governance. Control LLM costs with token-based rate limiting and semantic routing across providers.

Get a Demo
Powering the API world

Increase developer productivity, security, and performance at scale with the unified platform for API management, AI gateways, service mesh, and ingress controller.

Sign up for Kong newsletter

Platform
Kong KonnectKong GatewayKong AI GatewayKong InsomniaDeveloper PortalGateway ManagerCloud GatewayGet a Demo
Explore More
Open Banking API SolutionsAPI Governance SolutionsIstio API Gateway IntegrationKubernetes API ManagementAPI Gateway: Build vs BuyKong vs PostmanKong vs MuleSoftKong vs Apigee
Documentation
Kong Konnect DocsKong Gateway DocsKong Mesh DocsKong AI GatewayKong Insomnia DocsKong Plugin Hub
Open Source
Kong GatewayKumaInsomniaKong Community
Company
About KongCustomersCareersPressEventsContactPricing
  • Terms•
  • Privacy•
  • Trust and Compliance•
  • © Kong Inc. 2025