Home Blog API Security Adopt a Zero Trust Approach with OAuth 2.0 Mutual TLS Client Authentication
Understanding Microsegmentation in Zero Trust Security
Kong Mesh 2.6: More Flexibility, Usability, and Security
Top GraphQL Security Vulnerabilities: Lessons Learned Analyzing 1,500+ Endpoints
Layered Security Strategy for Managing APIs
Tightening Bearer Token Authentication with Proof-of-Possession Tokens
Your Secrets and Tokens are Secure with Kong Gateway Enterprise 3.5
Kong Releases Product Updates to Address Novel HTTP/2 'Rapid Reset' DDoS Vulnerability
Zero Trust Network Access (ZTNA) vs VPNs
OpenID vs OAuth: Understanding API Security Protocols
Unlocking Success with Kong Mesh 2.4 with Security, Resilience, and Flexibility
Reduce API Security Risks with Standardized Governance
OWASP API Security Top 10: Mitigating Risks with Kong
How to Choose the Right API Gateway for Your Business
API Infrastructure is Mission Critical — and Increasingly Under Attack