Blog
  • AI Gateway
  • AI Security
  • AIOps
  • API Security
  • API Gateway
|
    • API Management
    • API Development
    • API Design
    • Automation
    • Service Mesh
    • Insomnia
    • View All Blogs
  1. Home
  2. Blog
  3. API Security

API Security

The latest news and announcements about Kong, our products, and our ecosystem, as well as voices from across our community.

‹Prev1…345…7Next›

OWASP API Security Top 10: Mitigating Risks with Kong

API SecurityAugust 10, 2023

The Open Web Application Security Project (OWASP for short) is a not-for-profit entity devoted to improving the security of software. Founded in 2001, OWASP is a global organization that supports thousands of volunteers globally to produce freely available articles, documentation, tutorials, and…

Kong

How to Choose the Right API Gateway for Your Business

API GatewayAugust 8, 2023

Modern organizations rely on APIs to power their digital customer experiences. This can lead to stronger brand loyalty and higher revenues — if they play their cards right. The driving factor in delivering personalized content is connectivity to more applications, systems, and data sources. That…

Kong

API Infrastructure is Mission Critical — and Increasingly Under Attack

API SecurityJuly 27, 2023

APIs have revolutionized every industry. They fuel digital transformation and power the web, making up more than 83% of global internet traffic. And API adoption will only grow, with AI, Web3 , and decentralization only further driving API usage and integration. But these sometimes-overlooked…

Kong

API Security and Management: The Impact on the Fintech Industry

API SecurityJune 29, 2023

The world of financial services is driven by digital experiences. Over the last 20 years, virtually all banking activities have been taken online (an unfortunate change only for fans of pneumatic tubes and pens on beaded chains). Like other industries that have undergone digital transformation,…

Greg Peranich

Kong Mesh 2.3 Improves Security, Flexibility, and Resiliency

Service MeshJune 26, 2023

Kong is proud to announce the release of the latest version of Kong Mesh 2.3. In this release, Kong Mesh continues to build upon the enterprise-grade service mesh in the critical areas of, security, flexibility, and resiliency. As organizations continue to leverage APIs to deliver digital…

John Harris

Zero Trust Security: The What, Why, and How

Zero-TrustJune 8, 2023

The concept of Zero Trust is based on the belief that no internal network or system can be fully trusted. Traditional network architectures, such as a perimeter-based model, rely on distinguishing between internal and external networks. However, this approach is flawed because internal networks can…

Kong

Understand the Differences: API Authentication vs API Authorization

API AuthenticationJune 8, 2023

If you landed on this blog post, chances are that you care about keeping your API secure. It's an important topic to discuss: API exploits are on the rise, and you don't want unauthorized users accessing your data. A big part of that security is implementing API authentication and API…

Kong

Imperva and Kong Join Forces to Integrate Leading API Management and Cybersecurity Solutions

API SecurityApril 19, 2023

Today we're pleased to announce a new strategic partnership and resale agreement with Imperva . Imperva customers will now be able to directly license Kong Enterprise, the fastest, most feature-rich, and secure API management solution. In addition, Kong customers will be able to use the Imperva API…

Kong

APISecOps Tutorial: Delivering APIs Securely Together with Kong Konnect and Red Hat OpenShift Service on AWS (ROSA)

Kong KonnectFebruary 23, 2023

Red Hat OpenShift is the industry's leading enterprise Kubernetes platform that runs ubiquitously across on-prem, and the cloud. With Red Hat OpenShift Service on AWS (ROSA) , a managed Red Hat OpenShift platform that runs natively on AWS, it is even easier to get kick-started on an…

Danny Freese

How APISecOps Protects Against API Abuse

Minimizing-Security-Risks-
ObservabilityFebruary 17, 2023

In this post, we'll talk about what API SecOps is, including the fundamentals of it and the personas involved. Then, we'll discuss how API, microservice, and policy lifecycles integrate to produce a secure service in production, and why collaboration and API-First Design are essential for APISecOps…

Danny Freese

Secure Self-Service Custom Domains for Dev Portals

Developer PortalNovember 15, 2022

In the Dev Portal world, offering users the ability to use their own domain is a milestone on our way to fully customized Dev Portals. Since Konnect-hosted portals are fronted by a Kong gateway, we looked to use our own plugins to achieve this feature. The ACME plugin is an open-source Kong plugin…

Vincent Le Goff

Kong Konnect Increases Security, Streamlines API Management

API ManagementNovember 1, 2022

We’re excited to announce new features in Kong Konnect , including the ability to take advantage of identity management APIs, streamlined certificate management, and latency metrics as part of Analytics . Read on to learn about these features and how kong helps future-proof API security . Now you…

Ishwari Lokare

Guide to Defense in Depth Security

Minimizing-Security-Risks-
API SecuritySeptember 13, 2022

Security best practices remain a top priority for enterprises, especially as high-profile hacks and cybersecurity breaches pose increased risks. According to the 2022 Morgan Stanley CIO survey , IT spending is expected to reach 4.4%, with cloud computing and security software as the leading…

Eric Pulsifer

Reasons to Use an API Gateway

Kong Logo
API GatewayMarch 10, 2022

A microservice -based system can consist of dozens or even hundreds of individual services communicating with each other via APIs . While its possible for a client be that a web browser, application or IoT device to make requests to the relevant microservice directly, this approach has a number of…

Kong

Building and Securing API Gateway Architecture

Kong Logo
API GatewayMarch 10, 2022

If the connection from clients to your API gateway isn't encrypted, all messages you send and receive are out in the open for all to read. In looking for a way in, attackers will make use of all features of an API, even the undocumented ones; security by obscurity is not a realistic defense…

Kong
‹Prev1…345…7Next›

See AI Gateway in Action

Secure your AI infrastructure with prompt guards, PII sanitization, and centralized governance. Control LLM costs with token-based rate limiting and semantic routing across providers.

Get a Demo
Powering the API world

Increase developer productivity, security, and performance at scale with the unified platform for API management, AI gateways, service mesh, and ingress controller.

Sign up for Kong newsletter

    • Platform
    • Kong Konnect
    • Kong Gateway
    • Kong AI Gateway
    • Kong Insomnia
    • Developer Portal
    • Gateway Manager
    • Cloud Gateway
    • Get a Demo
    • Explore More
    • Open Banking API Solutions
    • API Governance Solutions
    • Istio API Gateway Integration
    • Kubernetes API Management
    • API Gateway: Build vs Buy
    • Kong vs Postman
    • Kong vs MuleSoft
    • Kong vs Apigee
    • Documentation
    • Kong Konnect Docs
    • Kong Gateway Docs
    • Kong Mesh Docs
    • Kong AI Gateway
    • Kong Insomnia Docs
    • Kong Plugin Hub
    • Open Source
    • Kong Gateway
    • Kuma
    • Insomnia
    • Kong Community
    • Company
    • About Kong
    • Customers
    • Careers
    • Press
    • Events
    • Contact
    • Pricing
  • Terms
  • Privacy
  • Trust and Compliance
  • © Kong Inc. 2026