Blog
  • AI Gateway
  • AI Security
  • AIOps
  • API Security
  • API Gateway
|
    • API Management
    • API Development
    • API Design
    • Automation
    • Service Mesh
    • Insomnia
    • View All Blogs
  1. Home
  2. Blog
  3. API Security

API Security

The latest news and announcements about Kong, our products, and our ecosystem, as well as voices from across our community.

‹Prev1…567Next›

Minimizing Security Risks in APIs and Microservices

Minimizing-Security-Risks-
MicroservicesAugust 6, 2021

Application Programming Interfaces (APIs) and microservices are the foundational pillars of digital transformation initiatives. They simplify the development process for our technology teams, enabling them to innovate faster, increase customer engagement and boost business agility. However, while…

Ishwari Lokare

Setting Access Control Policies With Kong and Okta

Kong and Okta Access Control Policies with OpenID Connect
API SecurityJune 24, 2021

In our last Kong and Okta tutorial, we will implement a basic access control policy based on Okta’s groups and planes. This series will show you how to implement service authentication and authorization for Kong Konnect and Okta using the OpenID Connect ( OIDC ) plugin. Parts 1, 2 and 3…

Claudio Acquaviva

Implementing Introspection Flow With Kong and Okta

Kong and Okta Introspection Flow
API SecurityJune 10, 2021

In our third Kong and Okta tutorial, we'll go through the introspection flow implementation. This series will show you how to implement service authentication and authorization for Kong Konnect and Okta using the OpenID Connect ( OIDC ) plugin. Parts 1, 2 and 4 cover: [iframe loading="lazy"…

Claudio Acquaviva

Security Game Plan for Your Microservices Applications

Security Game Plan for Your Microservices Applications
MicroservicesJune 8, 2021

The demand for digital transformation has accelerated, with 62% of technology leaders sharing that they fear they are at risk of being displaced by competitors who innovate more quickly. Enterprises are increasingly transitioning from monolithic to microservices architecture, with the goal to…

Ishwari Lokare

Executive Order 14028: How to Adopt Zero-Trust Architecture

America’s Cybersecurity Mandate - 5 Ways to Adopt Zero-Trust Architecture
Zero-TrustMay 28, 2021

President Biden issued an " Executive Order on Improving the Nation's Cybersecurity " (Executive Order 14028) as of May 12, 2021. The order includes numerous actions and mandates to confront the dangers of cyber attacks that are increasing in frequency and sophistication. Cybersecurity has real and…

Ahmed Koshok

Protect Your Services With Kong Gateway Key Authentication

Kong Gateway Key Authentication
API AuthenticationMay 25, 2021

This tutorial will walk through a common use case for the Kong Gateway Key Authentication plugin : using API key authentication to protect a route to an API server endpoint. It’s a simple use case, but it will give you the foundation to deploy and configure the plugin for your own unique project…

Aapo Talvensaari

3 Ways to Protect Your APIs With Kong Konnect and Fastly (Signal Sciences)

Kong Konnect and Fastly
Kong KonnectApril 27, 2021

Fastly's next-gen WAF (formerly Signal Sciences ) integrates with Kong Konnect to block malicious requests to your services. Kong Gateway provides a robust and secure enterprise API management platform to front web traffic. In partnership, Fastly focuses on Layer 7 application security for that…

Claudio Acquaviva

Getting Started With Kong’s OpenID Connect Plugin

Getting Started With Kong’s OpenID Connect Plugin
API SecurityFebruary 25, 2021

The concept of zero-trust security is relatively simple. In essence, no entity or system should have trust by default. You should assume that any system you are talking to is not trustworthy until you establish otherwise. Within Kong Konnect , one mechanism to apply zero-trust is the OpenID Connect…

Ahmed Koshok

Implementing Zero-Trust Service Mesh Security

Destination: Zero-Trust
Zero-TrustFebruary 9, 2021

Imagine you're going through immigration at the airport. The immigration officer says, "I don't need your passport because I trust that you are who you claim to be." Wait, what? That would never happen, right? That's because trust is exploitable. Sooner or later, somebody will try to lie about who…

Marco Palladino

The Importance of Zero-Trust Security When Making the Microservices Move

The Importance of Zero-Trust Security When Making the Microservices Move
MicroservicesJanuary 14, 2021

Transitioning to microservices has many advantages for teams building large applications that must accelerate the pace of innovation, deployments and time to market. It also provides them the opportunity to secure their applications and services better than they did with monolithic codebases.…

Marco Palladino

3 Solutions for Avoiding Plain-Text Passwords in Insomnia

3 Solutions for Avoiding Plain-Text Passwords in Insomnia
InsomniaDecember 8, 2020

When testing APIs, software engineers often repeat identical values across multiple requests, but who wants to waste time typing the same values every time? Insomnia 's environment variables solve this problem by allowing you to define a value once as an environment variable and reference that…

Kevin Chen

Deployment Patterns for API Gateways Within a DMZ

Deployment Patterns for API Gateways Within a DMZ
API GatewayOctober 28, 2020

A DMZ – Demilitarized Zone – is a military term, roughly summarized, as an area between two adversaries established as a buffer in order to reduce, or eliminate, the possibility of further conflict. In networking, the term usually refers to an area that acts as a buffer between two segregated…

Ahmed Koshok

Custom Authentication and Authorization Framework With Kong

Custom Authentication and Authorization Framework With Kong
API AuthenticationJuly 7, 2020

Kong Enterprise provides many out-of-the-box plugins to support various access control solutions like basic authentication , key authentication , JWT, LDAP, OAuth 2.0, OpenID Connect, among others. Most of the time, you should be able to find a plugin to suit your needs to protect your private or…

Degui Xu

How to Secure APIs and Services Using OpenID Connect

How to Secure APIs and Services Using OpenID Connect
API SecurityMarch 18, 2020

A modern API gateway like Kong enables organizations to achieve some use cases much more easily than traditional gateways. The reason is older, traditional gateways try to provide as many features as possible into a heavyweight monolith, while modern solutions use a best-in-breed approach. These…

Sven Walther

Configuring AWS GuardDuty with Lambda for Slack Notifications

Configuring AWS GuardDuty with Lambda for Slack Notifications
API SecurityNovember 13, 2019

At Kong, we leverage many tools to protect our services and customers. Terraform from HashiCorp allows us to automate the process with Infrastructure as Code (IaC). Another important tool is Amazon Web Services (AWS) GuardDuty , a continuous monitoring service for security threat detection in your…

Dennis Kelly
‹Prev1…567Next›

See AI Gateway in Action

Secure your AI infrastructure with prompt guards, PII sanitization, and centralized governance. Control LLM costs with token-based rate limiting and semantic routing across providers.

Get a Demo
Powering the API world

Increase developer productivity, security, and performance at scale with the unified platform for API management, AI gateways, service mesh, and ingress controller.

Sign up for Kong newsletter

    • Platform
    • Kong Konnect
    • Kong Gateway
    • Kong AI Gateway
    • Kong Insomnia
    • Developer Portal
    • Gateway Manager
    • Cloud Gateway
    • Get a Demo
    • Explore More
    • Open Banking API Solutions
    • API Governance Solutions
    • Istio API Gateway Integration
    • Kubernetes API Management
    • API Gateway: Build vs Buy
    • Kong vs Postman
    • Kong vs MuleSoft
    • Kong vs Apigee
    • Documentation
    • Kong Konnect Docs
    • Kong Gateway Docs
    • Kong Mesh Docs
    • Kong AI Gateway
    • Kong Insomnia Docs
    • Kong Plugin Hub
    • Open Source
    • Kong Gateway
    • Kuma
    • Insomnia
    • Kong Community
    • Company
    • About Kong
    • Customers
    • Careers
    • Press
    • Events
    • Contact
    • Pricing
  • Terms
  • Privacy
  • Trust and Compliance
  • © Kong Inc. 2026