Blog
  • AI Gateway
  • AI Security
  • AIOps
  • API Security
  • API Gateway
|
    • API Management
    • API Development
    • API Design
    • Automation
    • Service Mesh
    • Insomnia
    • View All Blogs
  1. Home
  2. Blog
  3. API Security

API Security

The latest news and announcements about Kong, our products, and our ecosystem, as well as voices from across our community.

‹Prev1…4567Next›

What Does a Secure API Gateway Look Like?

Kong Logo
API GatewayMarch 10, 2022

An API gateway provides routing, traffic control and security capabilities which would otherwise be the responsibility of API consumers and upstream APIs. Additionally, the Gateway becomes a rich source of operational metrics useful for analytics, usage statistics and alerting. However, by…

Kong

Microservices Monitoring and Distributed Tracing Tools

Kong Logo
MicroservicesMarch 10, 2022

Monitoring the health of your production system involves keeping track of various data points in real time in order to derive insights from them. Day to day, monitoring can provide early indications of problems, giving the team time to investigate and fix before a system fails completely. If youre…

Kong

A Strategy to Testing Microservices

Kong Logo
MicroservicesMarch 9, 2022

The shift towards microservices is closely related to both the rise in popularity of agile software development practices and DevOps cultures. These three trends share a common goal: building products that are responsive to user needs while maintaining high quality and high availability. A system…

Kong

Deploying Kong Mesh in Multiple Security Domains

Deploying Service Mesh in Multiple Security Domains
Service MeshMarch 3, 2022

It's not uncommon for organizations to have to deploy solutions across (or among) multiple security domains. Here, we use the term "security domain" to refer to a segregated network environment, like a restricted internal network or a DMZ. This post will explore some design considerations when…

Scott Lowe

Kong vs. Apigee: Fast, Pain-Free Compliance 

Kong vs. Apigee: Fast, Pain-Free Compliance 
API ManagementFebruary 16, 2022

We live in an API-driven economy , where Application Programming Interfaces (APIs) are increasingly being used to open new revenue channels, accelerate time to market and democratize data. Enterprises are constantly striving to build faster, more reliable and easier to use APIs. They understand…

Nishikant Singh

How an API Gateway Secures APIs

How an API Gateway Secures APIs 
API GatewayFebruary 9, 2022

API security starts with authentication and authorization, then data security and availability. In this post, I will review security considerations for an API gateway and how the capabilities of the Kong Gateway address them. First, let's review different aspects of API security in detail. A…

Krishnaraj Subburayalu

Simplifying Authentication for Microservices Security

kongcast banner
API AuthenticationFebruary 7, 2022

In this episode of Kongcast , Jeff Taylor , senior product manager at Okta, tells and shows us how to speed up microservices security and take the burden off developers by managing auth with an API gateway . Still using monolithic architectures? Check out our Guide to Microservices Adoption Check…

Kaitlyn Barnard

Downstream and Upstream Mutual TLS With an API Gateway

Downstream and upstream mutual tls with an api gateway
API GatewayJanuary 20, 2022

Like many developers and operations professionals, you may have had complicated experiences with security and certificates (encryption of the connection and authentication). Maybe so much so that you try to avoid working on them whenever possible. If you're looking for a simpler way, Kong may be…

Sven Walther

Achieving Maximum API Platform Security With Kong

Achieving Maximum API Platform Security With Kong Cover@2x (1)
API SecurityDecember 22, 2021

Before exposing your company's APIs, your highest priority should be to assure the API security , governance and reliability of that architecture. To do so, you'll need to use an API gateway as a single secure entry point for API consumers rather than allowing direct access to APIs. Kong Gateway…

Mani Hosseini

Log4J, Log4Shell and Kong

Log4J Log4Shell and Kong
API DesignDecember 16, 2021

If you've been online at all this week, chances are that you've heard about the Log4Shell zero-day ( CVE-2021-44228 ) in Log4J, a popular Java logging library. The vulnerability enables Remote Code Execution (RCE), which allows attackers to run arbitrary code on the target's machines. I know the…

Michael Heap

Zero-Touch Disaster Recovery With Ansible Automation Platform

Zero Touch Disaster Recovery With Ansible Automation Platform
AutomationOctober 27, 2021

This blog and video were co-created by David La Motta (Kong), Ross McDonald (Kong) and Alex Dworjan (Red Hat). Murphy's Law “Anything that can go wrong will go wrong.” To us mortals, that means we should try to prepare for the worst and hope for the best. Disaster Recovery (DR) is crucial to every…

David La Motta

Token-Based Access Control With Kong, OPA and Curity

Token Based Access Control with Kong
API SecurityOctober 6, 2021

As APIs and microservices evolve, the architecture used to secure these resources must also mature. Utilizing a token-based architecture to protect APIs is a robust, secure and scalable approach, and it is also much safer than API keys or basic authentication. However, token-based architecture…

Jonas Iggbom

Balancing Innovation and Security With API Automation

Balancing Innovation and Security With Automation 2
API SecuritySeptember 16, 2021

Automating digital transformation API deployments can help speed time to market and minimize the resources required for the deployments — if developers can be assured that the automated process meets all necessary security requirements. It's a topic that Kong Senior CustomerExperience Manager Peggy…

Josh Molina

Solving API Authorization Challenges in Multi-Cloud Environments

B1-Solving API Authorization Challenges in Multi-Cloud Environments Cover@2x
API SecuritySeptember 9, 2021

As more and more companies move to a multi-cloud strategy and increase usage of a cloud native infrastructure , API providers are under a lot of pressure to deliver APIs at scale in multi-cloud environments. At the same time, APIs should follow each company's security requirements and best…

Nima Moghadam

5 Steps to Serverless Security With the AWS Lambda Plugin

5 Steps to Serverless Security With the AWS Lambda Plugin
AWSAugust 17, 2021

For the DevOps-averse developer, lambdas are heaven. They can focus on writing self-contained and modularized pieces of code, deploying these functions for on-demand execution without being concerned about resource management or infrastructure. Lambda execution , however, can be tricky. Serverless…

Alvin Lee
‹Prev1…4567Next›

See AI Gateway in Action

Secure your AI infrastructure with prompt guards, PII sanitization, and centralized governance. Control LLM costs with token-based rate limiting and semantic routing across providers.

Get a Demo
Powering the API world

Increase developer productivity, security, and performance at scale with the unified platform for API management, AI gateways, service mesh, and ingress controller.

Sign up for Kong newsletter

    • Platform
    • Kong Konnect
    • Kong Gateway
    • Kong AI Gateway
    • Kong Insomnia
    • Developer Portal
    • Gateway Manager
    • Cloud Gateway
    • Get a Demo
    • Explore More
    • Open Banking API Solutions
    • API Governance Solutions
    • Istio API Gateway Integration
    • Kubernetes API Management
    • API Gateway: Build vs Buy
    • Kong vs Postman
    • Kong vs MuleSoft
    • Kong vs Apigee
    • Documentation
    • Kong Konnect Docs
    • Kong Gateway Docs
    • Kong Mesh Docs
    • Kong AI Gateway
    • Kong Insomnia Docs
    • Kong Plugin Hub
    • Open Source
    • Kong Gateway
    • Kuma
    • Insomnia
    • Kong Community
    • Company
    • About Kong
    • Customers
    • Careers
    • Press
    • Events
    • Contact
    • Pricing
  • Terms
  • Privacy
  • Trust and Compliance
  • © Kong Inc. 2026