Resources
  • eBooks
  • Reports
  • Demos
  • Videos
|
  • Value Calculator
  1. Home
  2. Resources
  3. Videos
  4. Protecting your APIs: Moving Beyond OWASP Top 10
Video

Elevate API Security Beyond OWASP Best Practices

Revisit one of our sessions from API Summit 2024!

While the OWASP guidelines provide a solid foundation, a comprehensive approach to API security is crucial to ensure the confidentiality, integrity, and availability of your data. In this session, we'll explore Kong's robust API security strategy and how to implement advanced threat protection, enforce identity and access management, monitor and analyze API traffic, and ensure continuous security testing and integration. Don't just meet the minimum requirements — join us to learn how to excel in API security with Kong.

Topics
API SecurityJWTAPI Summit
Share on Social
Powering the API world

Increase developer productivity, security, and performance at scale with the unified platform for API management, AI gateways, service mesh, and ingress controller.

Sign up for Kong newsletter

    • Platform
    • Kong Konnect
    • Kong Gateway
    • Kong AI Gateway
    • Kong Insomnia
    • Developer Portal
    • Gateway Manager
    • Cloud Gateway
    • Get a Demo
    • Explore More
    • Open Banking API Solutions
    • API Governance Solutions
    • Istio API Gateway Integration
    • Kubernetes API Management
    • API Gateway: Build vs Buy
    • Kong vs Postman
    • Kong vs MuleSoft
    • Kong vs Apigee
    • Documentation
    • Kong Konnect Docs
    • Kong Gateway Docs
    • Kong Mesh Docs
    • Kong AI Gateway
    • Kong Insomnia Docs
    • Kong Plugin Hub
    • Open Source
    • Kong Gateway
    • Kuma
    • Insomnia
    • Kong Community
    • Company
    • About Kong
    • Customers
    • Careers
    • Press
    • Events
    • Contact
    • Pricing
  • Terms
  • Privacy
  • Trust and Compliance
  • © Kong Inc. 2026