Resources
  • eBooks
  • Reports
  • Case Studies
  • Demos
  • Videos
  • Value Calculator
  • Home
  • Resources
  • Videos
  • Protecting your APIs: Moving Beyond OWASP Top 10
Video

Elevate API Security Beyond OWASP Best Practices

Revisit one of our sessions from API Summit 2024!

While the OWASP guidelines provide a solid foundation, a comprehensive approach to API security is crucial to ensure the confidentiality, integrity, and availability of your data. In this session, we'll explore Kong's robust API security strategy and how to implement advanced threat protection, enforce identity and access management, monitor and analyze API traffic, and ensure continuous security testing and integration. Don't just meet the minimum requirements — join us to learn how to excel in API security with Kong.

Topics:API Security
|
JWT
|
API Summit
Powering the API world

Increase developer productivity, security, and performance at scale with the unified platform for API management, AI gateways, service mesh, and ingress controller.

Sign up for Kong newsletter

Platform
Kong KonnectKong GatewayKong AI GatewayKong InsomniaDeveloper PortalGateway ManagerCloud GatewayGet a Demo
Explore More
Open Banking API SolutionsAPI Governance SolutionsIstio API Gateway IntegrationKubernetes API ManagementAPI Gateway: Build vs BuyKong vs PostmanKong vs MuleSoftKong vs Apigee
Documentation
Kong Konnect DocsKong Gateway DocsKong Mesh DocsKong AI GatewayKong Insomnia DocsKong Plugin Hub
Open Source
Kong GatewayKumaInsomniaKong Community
Company
About KongCustomersCareersPressEventsContactPricing
  • Terms•
  • Privacy•
  • Trust and Compliance
  • © Kong Inc. 2025