Blog
  • AI Gateway
  • AI Security
  • AIOps
  • API Security
  • API Gateway
|
    • API Management
    • API Development
    • API Design
    • Automation
    • Service Mesh
    • Insomnia
    • View All Blogs
  1. Home
  2. Blog
  3. API Security

API Security

The latest news and announcements about Kong, our products, and our ecosystem, as well as voices from across our community.

‹Prev1234…7Next›

Achieving Zero Trust on VMs with Universal Mesh

Zero-TrustJune 10, 2024

Two of the main tenets of Zero Trust are encryption between services and managing the connections each service is allowed to use. Achieving this generally falls to running a service mesh in a Kubernetes cluster. Refactoring applications to run properly in Kubernetes takes time and considerable…

George Fridrich

5 Architectural Patterns for Securing Connectivity at Scale

5 Architectural Patterns for Securing Connectivity-Blog-Post-Header
API SecurityJune 3, 2024

In the age of surgical robots, smart refrigerators, self-driving vehicles, and unmanned aerial vehicles, connectivity undoubtedly is a foundational block for our modern world. As we move further into the 2020s, this connectivity has expanded to encompass emerging technologies like 5G networks ,…

Kong

Federated Connectivity: Unlocking Data Silos with API Gateways

API GatewayMay 6, 2024

"The whole is more than the sum of its parts." Aristotle is credited with this quote, and it's true in the world of data. Legacy systems typically approached their role in a limited manner. Each system was intended to be used by a certain user set and handle well-defined processes and associated…

Ahmed Koshok

Adopt a Zero Trust Approach with OAuth 2.0 Mutual TLS Client Authentication

Zero-TrustFebruary 19, 2024

In the modern IT stack, API gateways act as the first line of defense against attacks on backend services by enforcing authentication/authorization policies and validating and transforming requests. When backend services are protected with a token-based approach, client applications must obtain an…

Veena Rajarathna

Understanding Microsegmentation in Zero Trust Security

API SecurityFebruary 6, 2024

With digital transformation shifting networks into the cloud — from remote workforces to online banking — cyberattacks are growing more prevalent and sophisticated. Legacy security models like VPNs and perimeter-based firewalls are proving inadequate in addressing modern threats because perimeters…

Kong

Kong Mesh 2.6: More Flexibility, Usability, and Security

Service MeshFebruary 1, 2024

The first release of Kong Mesh for 2024 (version 2.6) brings many new features that ease day 0 for new starters of service mesh reinforcing our goal of making a simple yet powerful product! In this blog, we'll break down these new features and provide tailored use cases to illustrate how Kong Mesh…

Charly Molter

Top GraphQL Security Vulnerabilities: Lessons Learned Analyzing 1,500+ Endpoints

API SecurityJanuary 29, 2024

With its flexible querying capabilities, GraphQL makes it easy to combine data from multiple sources into a single endpoint. GraphQL and API management go hand in hand to build next-generation API platforms. However, GraphQL's features can also introduce security risks if not properly…

Kong

Layered Security Strategy for Managing APIs

API SecurityDecember 21, 2023

This post is part of a series on becoming a secure API-first company. For a deeper dive, check out the eBook Leading Digital Transformation: Best Practices for Becoming a Secure API-First Company. As APIs have become mission-critical , securing them against threats is crucial. APIs are an…

Kong

Tightening Bearer Token Authentication with Proof-of-Possession Tokens

API AuthenticationNovember 15, 2023

In token-based architecture, tokens represent the client’s entitlement to access protected resources. Access tokens (or bearer tokens as they're commonly known) are issued by authorization servers after successful user authentication. The tokens are passed as credentials in the request to the…

Veena Rajarathna

Your Secrets and Tokens are Secure with Kong Gateway Enterprise 3.5

API SecurityNovember 13, 2023

Kong Gateway Enterprise 3.5 is packed with security features to support the use cases demanded by our enterprise customers through major improvements in Secrets Management integrations and our Open-ID Connect (OIDC) plugin. Additionally, we’ve added key security updates for a few of our AWS…

Tom Brightbill

Kong Releases Product Updates to Address Novel HTTP/2 'Rapid Reset' DDoS Vulnerability

API SecurityOctober 12, 2023

At Kong, the security and reliability of our products have always been paramount. In light of the recent discovery of the Novel HTTP/2 ‘Rapid Reset’ DDoS attack ( CVE-2023-44487 ), we have taken steps to proactively address potential issues. Today we’re providing guidance on how our users can best…

Tom Brightbill

Zero Trust Network Access (ZTNA) vs VPNs

Zero-TrustOctober 11, 2023

In today’s modern digital environment, more organizations are relying on remote work than ever before. While this shift has given companies unprecedented flexibility when it comes to deploying their workforce, it has also presented challenges in keeping their devices, operations, and personnel…

Kong

OpenID vs OAuth: Understanding API Security Protocols

API SecurityOctober 10, 2023

When it comes to digital identity, OpenID and OAuth are two peas in a pod, but they have their differences. OpenID connects you to relying parties using a single sign-on, while OAuth grants access tokens so you can give apps limited access. They both make authentication simple, seamless, and…

Axandria Shepard

Unlocking Success with Kong Mesh 2.4 with Security, Resilience, and Flexibility

Kong Logo
Service MeshSeptember 11, 2023

In the ever-evolving landscape of digital business operations, staying ahead of the curve requires constant adaptation and innovation. Kong Mesh 2.4 contains several enhancements to help your organization's infrastructure be more efficient. In this blog post, we’ll explore the key benefits of Kong…

John Harris

Reduce API Security Risks with Standardized Governance

API SecurityAugust 18, 2023

APIs serve as the foundation for how software systems and services communicate and exchange data. But unmanaged and unsecured APIs can open up massive vulnerabilities that lead to disastrous security breaches and data leaks without proper governance. With API-related attacks increasing — and set…

Kong
‹Prev1234…7Next›

See AI Gateway in Action

Secure your AI infrastructure with prompt guards, PII sanitization, and centralized governance. Control LLM costs with token-based rate limiting and semantic routing across providers.

Get a Demo
Powering the API world

Increase developer productivity, security, and performance at scale with the unified platform for API management, AI gateways, service mesh, and ingress controller.

Sign up for Kong newsletter

    • Platform
    • Kong Konnect
    • Kong Gateway
    • Kong AI Gateway
    • Kong Insomnia
    • Developer Portal
    • Gateway Manager
    • Cloud Gateway
    • Get a Demo
    • Explore More
    • Open Banking API Solutions
    • API Governance Solutions
    • Istio API Gateway Integration
    • Kubernetes API Management
    • API Gateway: Build vs Buy
    • Kong vs Postman
    • Kong vs MuleSoft
    • Kong vs Apigee
    • Documentation
    • Kong Konnect Docs
    • Kong Gateway Docs
    • Kong Mesh Docs
    • Kong AI Gateway
    • Kong Insomnia Docs
    • Kong Plugin Hub
    • Open Source
    • Kong Gateway
    • Kuma
    • Insomnia
    • Kong Community
    • Company
    • About Kong
    • Customers
    • Careers
    • Press
    • Events
    • Contact
    • Pricing
  • Terms
  • Privacy
  • Trust and Compliance
  • © Kong Inc. 2026