
# API Security
The latest news and announcements about Kong, our products, and our ecosystem, as well as voices from across our community.

## All API Security Videos

[__
How Delta Fiber Scaled Transformation with Kong Gateway
__](/resources/videos/delta-fiber-kong-gateway-self-care-modernization)__How Delta Fiber Scaled Transformation with Kong Gateway
__[](/resources/videos/delta-fiber-kong-gateway-self-care-modernization)[__
Leveraging Kong for Secure Healthcare Interoperability
__](/resources/videos/cms-0057-f-hl7-fhir-cds-hooks-kong-gateway)__Leveraging Kong for Secure Healthcare Interoperability
__[](/resources/videos/cms-0057-f-hl7-fhir-cds-hooks-kong-gateway)[__
Moving Beyong the API Gateway to an API Platform
__](/resources/videos/build-api-platform-governance-security-kong)__Moving Beyong the API Gateway to an API Platform
__[](/resources/videos/build-api-platform-governance-security-kong)
[__
Streamline API Security with Kong + Traceable
__](/resources/videos/kong-traceable-unified-api-security)__Streamline API Security with Kong + Traceable
__[](/resources/videos/kong-traceable-unified-api-security)
[__
Svenska Spel’s API Modernization with Kong Konnect
__](/resources/videos/svenska-spels-api-modernization-with-kong-konnect)__Svenska Spel’s API Modernization with Kong Konnect
__[](/resources/videos/svenska-spels-api-modernization-with-kong-konnect)[Videos](/resources/videos)Videos[Customer Stories](/resources/videos/customer-stories)Customer Stories
[__Boost Bank Launches Products and Services 20x Faster With Kong
__](/resources/videos/boost-bank-video-testimonial)__Boost Bank Launches Products and Services 20x Faster With Kong
__[](/resources/videos/boost-bank-video-testimonial)
[__
Kongfidential Computing
__](/resources/videos/apis-ai-integration-high-trust-environments)__Kongfidential Computing
__[](/resources/videos/apis-ai-integration-high-trust-environments)
[__
Shining a Light on Shadow APIs with Kong and Traceable AI
__](/resources/videos/unmasking-shadow-apis-secure-digital-ecosystem)__Shining a Light on Shadow APIs with Kong and Traceable AI
__[](/resources/videos/unmasking-shadow-apis-secure-digital-ecosystem)
[__
Taming the API Monster: How to Secure Your APIs Before They Bite You
__](/resources/videos/taming-api-monster-effective-strategies-posture-governance)__Taming the API Monster: How to Secure Your APIs Before They Bite You
__[](/resources/videos/taming-api-monster-effective-strategies-posture-governance)
[__
I’m an API Hacker and Here’s How I Hack Everything from the Military to AI
__](/resources/videos/top-4-api-bug-bounty-finds-avoid-common-mistakes-vulnerabilities)__I’m an API Hacker and Here’s How I Hack Everything from the Military to AI
__[](/resources/videos/top-4-api-bug-bounty-finds-avoid-common-mistakes-vulnerabilities)
[__