API SecuritySeptember 11, 20245 min readShine a Light on Shadow APIs Lurking in Your IT InfrastructureMiko BautistaStaff Product Manager, Kong
Zero-TrustMay 28, 2021Executive Order 14028: How to Adopt Zero-Trust ArchitectureAhmed KoshokSenior Staff Solutions Engineer, Kong
api authenticationMay 25, 2021Protect Your Services With Kong Gateway Key AuthenticationAapo Talvensaari
Kong KonnectApril 27, 20213 Ways to Protect Your APIs With Kong Konnect and Fastly (Signal Sciences)Claudio AcquavivaPrincipal Architect, Kong
API SecurityFebruary 25, 2021Getting Started With Kong’s OpenID Connect PluginAhmed KoshokSenior Staff Solutions Engineer, Kong
Zero-TrustFebruary 9, 2021Implementing Zero-Trust Service Mesh SecurityMarco PalladinoCTO and Co-Founder
MicroservicesJanuary 14, 2021The Importance of Zero-Trust Security When Making the Microservices MoveMarco PalladinoCTO and Co-Founder
API GatewayOctober 28, 2020Deployment Patterns for API Gateways Within a DMZAhmed KoshokSenior Staff Solutions Engineer, Kong
api authenticationJuly 7, 2020Custom Authentication and Authorization Framework With KongDegui XuManager Solutions Engineer, Kong