Zero Trust in a Cloud Native Enterprise
If we consider zero-trust as a model, we assume that every network is insecure and untrustworthy. Furthermore, it is also about the fact that every access to a service is…
If we consider zero-trust as a model, we assume that every network is insecure and untrustworthy. Furthermore, it is also about the fact that every access to a service is…
APIs are great for providing direct access to your data, but they are also a new attack vector. This talk discusses the top API security threats you should be familiar…
Kong supports many authentication frameworks and standards to properly govern and secure APIs. One of the more popular approaches is to use OpenID Connect/OAuth 2.0 since they provide multiple ways…
Nobody can dispute the importance of security, but the reality is that most people don’t have the background (or desire) to do the work to pull it off. That doesn’t…
Organizations are rapidly becoming more distributed and decoupled to deploy more often and improve reliability. As we accelerate our digitalization and move to microservices, it becomes vital to tighten up…
See how we can deploy policies such as Mutual TLS and tracing within Kong Mesh to provide zero-trust and visibility. Speakers Ned Harris Solutions Engineer Kong Inc.