Blog
  • AI Gateway
  • AI Security
  • AIOps
  • API Security
  • API Gateway
|
    • API Management
    • API Development
    • API Design
    • Automation
    • Service Mesh
    • Insomnia
    • View All Blogs
  1. Home
  2. Blog
  3. API Security

API Security

The latest news and announcements about Kong, our products, and our ecosystem, as well as voices from across our community.

‹Prev123…7Next›

RBAC Explained: The Basics of Role-Based Access Control

API SecurityApril 14, 2025

As cybersecurity takes the main stage, organizations face a significant challenge: how do you strike a balance between maintaining a high level of security and ensuring employees have enough data access to perform their jobs properly? Role-based access control (RBAC) is a solution that can support…

Kong

Kong Insomnia 11: Elevating API Security and Collaboration

InsomniaMarch 18, 2025

We’re excited to announce the general availability of Kong Insomnia 11! This release introduces third-party vault integrations for enhanced security, an all-new Git sync experience for more seamless collaboration, and support for multi-tabs to improve efficiency within the Insomnia application.…

Adam Jiroun

Building and Running Secure APIs with Kong and Traceable

Kong Logo
API SecurityFebruary 6, 2025

Cloud native application development relies heavily on APIs. APIs have proven themselves as a scalable and efficient way to capture, deploy, and scale functionality. Consequently, APIs became a target for malicious actors to misuse. Therefore, building quality APIs with adequate security controls…

Ahmed Koshok

How to Implement Secure Access Control with OPA and Kong Gateway

API SecurityJanuary 8, 2025

Ensuring secure access to applications and APIs is critical. As organizations increasingly adopt microservices architectures and cloud native solutions, the need for robust, fine-grained access control mechanisms becomes paramount. This is where the combination of Open Policy Agent (OPA) and Kong…

Raja Ravi Varman

Kong Gateway 3.9: Extended AI Support and Enhanced Security

API SecurityDecember 20, 2024

Today we're excited to announce Kong Gateway 3.9! Since unveiling Kong Gateway 3.8 at API Summit 2024 just a few months ago, we’ve been busy making important updates and improvements to Kong Gateway. This release introduces new functionality around LLM support for AI governance and security and…

Alex Drag

Protect APIs Against Injection Attacks with Content Inspection

API SecurityDecember 20, 2024

APIs facilitate effortless communication and data exchange between applications and services. However, their inherent design, which codifies service capabilities within the API definition, makes them easily exploitable by malicious actors. API attacks in the US alone are projected to cost $506…

Veena Rajarathna

IT Leaders Share Cost of API Incidents, Concerns Over AI Threats

AIDecember 10, 2024

More than 80% of developers and business leaders say AI investments have already created the opportunity for new products or services, according to Kong’s 2024 API Impact Report . Clearly, AI has proven its value and place in the enterprise, but with new innovations come new potential…

Eric Pulsifer

The Ultimate CORS Crash Course

Guide to CORS basics
PluginsDecember 9, 2024

In today's interconnected web ecosystem, modern applications frequently need to communicate across different domains, making Cross-Origin Resource Sharing (CORS) a fundamental concept for web developers to master. This comprehensive guide explores CORS from its basic principles to advanced…

Kong

Keeping Your APIs Safe: Best Practices for Top-Notch Security

API SecurityNovember 1, 2024

Application programming interfaces (APIs) are everywhere, and they play a role in running nearly everything in our digital-centric lives. Each time you launch a web page or an app on your phone, dozens of API calls are happening in the background to render an experience heavily customized to you.…

Paul Vergilis

Announcing Kong Gateway 3.8

Kong GatewaySeptember 11, 2024

We're excited to announce the release of Kong Gateway 3.8 , a significant update that marks a major milestone in the evolution of our API management platform. This release is packed with enhancements designed to boost performance, fortify security, and provide greater flexibility and ease of use…

Silvano Luciani

Shine a Light on Shadow APIs Lurking in Your IT Infrastructure

API SecuritySeptember 11, 2024

The service catalog is an essential tool that all organizations invested in effective IT management should own and maintain. Without an up-to-date system of record of all services and APIs, organizations run the risk of having what we call “Shadow APIs” — or APIs that are undiscovered, unmanaged,…

Miko Bautista

API Security Risks and How to Mitigate Them

API SecurityAugust 13, 2024

Today, more organizations than ever before rely on web and mobile applications and partner integrations to help them automate and scale, making APIs essential to today’s software ecosystem. But because APIs are gateways to sensitive data, this also makes them an attractive target for hackers who…

Kong

The Critical Role of API Security in the Internet of Things (IoT)

API DevelopmentAugust 1, 2024

From smart homes to wearable devices to connected cars, the Internet of Things (IoT) is bringing about a new era of hyper-connectivity. Experts expect investments in the IoT ecosystem to rise above $1 trillion in 2026 — with no signs of slowing down. Application programming interfaces (APIs) are…

Kong

Demonstrating Proof-of-Possession (DPoP): Preventing Illegal Access of APIs

API SecurityJuly 15, 2024

In a previous blog post , we discussed the prevalence of bearer tokens (or access tokens) to restrict access to protected resources, the challenges the sheer nature of bearer tokens present, and available mitigations. To recap, presenting a bearer token is proof enough of an authorization grant to…

Veena Rajarathna

Extensions to Improve Security and Get the Most Out of Kong

API SecurityJune 26, 2024

OAuth 2.0 is the current gold standard for secure delegated authorization. The reason is simple: OAuth puts control back in the hands of the users. It enables users to securely grant access to their resources without having to share passwords with third-party applications. Hence, it's one of the…

Veena Rajarathna
‹Prev123…7Next›

See AI Gateway in Action

Secure your AI infrastructure with prompt guards, PII sanitization, and centralized governance. Control LLM costs with token-based rate limiting and semantic routing across providers.

Get a Demo
Powering the API world

Increase developer productivity, security, and performance at scale with the unified platform for API management, AI gateways, service mesh, and ingress controller.

Sign up for Kong newsletter

    • Platform
    • Kong Konnect
    • Kong Gateway
    • Kong AI Gateway
    • Kong Insomnia
    • Developer Portal
    • Gateway Manager
    • Cloud Gateway
    • Get a Demo
    • Explore More
    • Open Banking API Solutions
    • API Governance Solutions
    • Istio API Gateway Integration
    • Kubernetes API Management
    • API Gateway: Build vs Buy
    • Kong vs Postman
    • Kong vs MuleSoft
    • Kong vs Apigee
    • Documentation
    • Kong Konnect Docs
    • Kong Gateway Docs
    • Kong Mesh Docs
    • Kong AI Gateway
    • Kong Insomnia Docs
    • Kong Plugin Hub
    • Open Source
    • Kong Gateway
    • Kuma
    • Insomnia
    • Kong Community
    • Company
    • About Kong
    • Customers
    • Careers
    • Press
    • Events
    • Contact
    • Pricing
  • Terms
  • Privacy
  • Trust and Compliance
  • © Kong Inc. 2026