Blog
  • AI Gateway
  • AI Security
  • AIOps
  • API Security
  • API Gateway
    • API Management
    • API Development
    • API Design
    • Automation
    • Service Mesh
    • Insomnia
    • View All Blogs
  1. Home
  2. Blog
  3. Zero-Trust

Zero-Trust

The latest news and announcements about Kong, our products, and our ecosystem, as well as voices from across our community.

Latest

Kong Mesh 2.12: SPIFFE/SPIRE Support and Consistent XDS Resource Names

Kong MeshSeptember 18, 2025

We're very excited to announce Kong Mesh 2.12 to the world! Kong Mesh 2.12 delivers two very important features: SPIFFE / SPIRE support, which provides enterprise-class workload identity and trust models for your mesh, as well as a consistent Kuma Resource Identifier (KRI) naming convention for…

Justin Davies

Achieving Zero Trust on VMs with Universal Mesh

Zero-TrustJune 10, 2024

Two of the main tenets of Zero Trust are encryption between services and managing the connections each service is allowed to use. Achieving this generally falls to running a service mesh in a Kubernetes cluster. Refactoring applications to run properly in Kubernetes takes time and considerable…

George Fridrich

5 Architectural Patterns for Securing Connectivity at Scale

5 Architectural Patterns for Securing Connectivity-Blog-Post-Header
API SecurityJune 3, 2024

In the age of surgical robots, smart refrigerators, self-driving vehicles, and unmanned aerial vehicles, connectivity undoubtedly is a foundational block for our modern world. As we move further into the 2020s, this connectivity has expanded to encompass emerging technologies like 5G networks ,…

Kong

Adopt a Zero Trust Approach with OAuth 2.0 Mutual TLS Client Authentication

Zero-TrustFebruary 19, 2024

In the modern IT stack, API gateways act as the first line of defense against attacks on backend services by enforcing authentication/authorization policies and validating and transforming requests. When backend services are protected with a token-based approach, client applications must obtain an…

Veena Rajarathna

Subscribe to Kong’s newsletter

Stay ahead of API and AI Gateway trends. Get expert insights, technical guides, and best practices delivered to your inbox.

View All Zero-Trust Posts

API Gateway and Service Mesh: Bridging API Management and Zero-Trust Architecture

API GatewayOctober 25, 2023

Over the last ten years, Kongers have witnessed hundreds of companies adopting a full lifecycle API management platform and have been working with the people behind the scenes, the “API tribes.” We’ve also learned from the field that API tribes most often have to deal with heterogeneous platforms,…

Baptiste Collard

Zero Trust Network Access (ZTNA) vs VPNs

Zero-TrustOctober 11, 2023

In today’s modern digital environment, more organizations are relying on remote work than ever before. While this shift has given companies unprecedented flexibility when it comes to deploying their workforce, it has also presented challenges in keeping their devices, operations, and personnel…

Kong

Zero Trust Security: The What, Why, and How

Zero-TrustJune 8, 2023

The concept of Zero Trust is based on the belief that no internal network or system can be fully trusted. Traditional network architectures, such as a perimeter-based model, rely on distinguishing between internal and external networks. However, this approach is flawed because internal networks can…

Kong

Guide to Defense in Depth Security

Minimizing-Security-Risks-
API SecuritySeptember 13, 2022

Security best practices remain a top priority for enterprises, especially as high-profile hacks and cybersecurity breaches pose increased risks. According to the 2022 Morgan Stanley CIO survey , IT spending is expected to reach 4.4%, with cloud computing and security software as the leading…

Eric Pulsifer

Zero-Touch Disaster Recovery With Ansible Automation Platform

Zero Touch Disaster Recovery With Ansible Automation Platform
AutomationOctober 27, 2021

This blog and video were co-created by David La Motta (Kong), Ross McDonald (Kong) and Alex Dworjan (Red Hat). Murphy's Law “Anything that can go wrong will go wrong.” To us mortals, that means we should try to prepare for the worst and hope for the best. Disaster Recovery (DR) is crucial to every…

David La Motta

ZeroLB in a Decentralized World

ZeroLB in a Decentralized World
Service MeshOctober 1, 2021

One of the things that’s quite interesting about service mesh is that it has not been a very well-defined category for a very long time. Service mesh is not a means to an end. By looking at its adoption, we’ve been seeing a refocus on the end use case that service mesh allows us…

Marco Palladino

Executive Order 14028: How to Adopt Zero-Trust Architecture

America’s Cybersecurity Mandate - 5 Ways to Adopt Zero-Trust Architecture
Zero-TrustMay 28, 2021

President Biden issued an " Executive Order on Improving the Nation's Cybersecurity " (Executive Order 14028) as of May 12, 2021. The order includes numerous actions and mandates to confront the dangers of cyber attacks that are increasing in frequency and sophistication. Cybersecurity has real and…

Ahmed Koshok

Implementing Zero-Trust Service Mesh Security

Destination: Zero-Trust
Zero-TrustFebruary 9, 2021

Imagine you're going through immigration at the airport. The immigration officer says, "I don't need your passport because I trust that you are who you claim to be." Wait, what? That would never happen, right? That's because trust is exploitable. Sooner or later, somebody will try to lie about who…

Marco Palladino

The Importance of Zero-Trust Security When Making the Microservices Move

The Importance of Zero-Trust Security When Making the Microservices Move
MicroservicesJanuary 14, 2021

Transitioning to microservices has many advantages for teams building large applications that must accelerate the pace of innovation, deployments and time to market. It also provides them the opportunity to secure their applications and services better than they did with monolithic codebases.…

Marco Palladino

See AI Gateway in Action

Secure your AI infrastructure with prompt guards, PII sanitization, and centralized governance. Control LLM costs with token-based rate limiting and semantic routing across providers.

Get a Demo
Powering the API world

Increase developer productivity, security, and performance at scale with the unified platform for API management, AI gateways, service mesh, and ingress controller.

Sign up for Kong newsletter

Platform
Kong KonnectKong GatewayKong AI GatewayKong InsomniaDeveloper PortalGateway ManagerCloud GatewayGet a Demo
Explore More
Open Banking API SolutionsAPI Governance SolutionsIstio API Gateway IntegrationKubernetes API ManagementAPI Gateway: Build vs BuyKong vs PostmanKong vs MuleSoftKong vs Apigee
Documentation
Kong Konnect DocsKong Gateway DocsKong Mesh DocsKong AI GatewayKong Insomnia DocsKong Plugin Hub
Open Source
Kong GatewayKumaInsomniaKong Community
Company
About KongCustomersCareersPressEventsContactPricing
  • Terms•
  • Privacy•
  • Trust and Compliance•
  • © Kong Inc. 2025