[Videos](/resources/videos)Videos[API Security](/resources/videos/api-security)API Security [__Driving Innovation and Efficiency at Rabobank with Kong__](/resources/videos/rabobank-kong-partnership-standardization-efficiency)__Driving Innovation and Efficiency at Rabobank with Kong__[](/resources/videos/rabobank-kong-partnership-standardization-efficiency)
[Videos](/resources/videos)Videos[API Authorization](/resources/videos/api-authorization)API Authorization [__Federated Data Authorization using Semantic Policies__](/resources/videos/semantic-authorization-for-consistent-data-access)__Federated Data Authorization using Semantic Policies__[](/resources/videos/semantic-authorization-for-consistent-data-access)
[Videos](/resources/videos)Videos[API Security](/resources/videos/api-security)API Security [__The API Secret Pandemic: Uncovering Critical API Secrets Embedded in Javascript Frontend Code at Scale__](/resources/videos/how-to-uncover-exposed-api-tokens)__The API Secret Pandemic: Uncovering Critical API Secrets Embedded in Javascript Frontend Code at Scale__[](/resources/videos/how-to-uncover-exposed-api-tokens)
[Videos](/resources/videos)Videos[API Security](/resources/videos/api-security)API Security [__REST APIs from Hell - True Stories About Failures__](/resources/videos/api-design-pitfalls-to-avoid)__REST APIs from Hell - True Stories About Failures__[](/resources/videos/api-design-pitfalls-to-avoid)
[Videos](/resources/videos)Videos[API Security](/resources/videos/api-security)API Security [__Service Catalog with Traceable AI__](/resources/videos/service-catalog-with-traceable-ai)__Service Catalog with Traceable AI__[](/resources/videos/service-catalog-with-traceable-ai)
[Videos](/resources/videos)Videos[API Management](/resources/videos/api-management)API Management [__Kong Konnect | API Management for Platform Builders__](/resources/videos/konnect-awareness)__Kong Konnect | API Management for Platform Builders__[](/resources/videos/konnect-awareness)
[Videos](/resources/videos)Videos[API Security](/resources/videos/api-security)API Security [__Best Practices for Securing APIs__](/resources/videos/api-summit-securing-apis)__Best Practices for Securing APIs__[](/resources/videos/api-summit-securing-apis)
[Videos](/resources/videos)Videos[API Security](/resources/videos/api-security)API Security [__Next-Level API Security | Giora Engel | Neosec__](/resources/videos/next-level-api-security)__Next-Level API Security | Giora Engel | Neosec__[](/resources/videos/next-level-api-security)
[Videos](/resources/videos)Videos[API Security](/resources/videos/api-security)API Security [__Embracing Failure With Chaos Engineering | Jason Yee from Gremlin__](/resources/videos/gremlin-chaos-engineering)__Embracing Failure With Chaos Engineering | Jason Yee from Gremlin__[](/resources/videos/gremlin-chaos-engineering)
[Videos](/resources/videos)Videos[API Security](/resources/videos/api-security)API Security [__Kong as a Strategic Initiative to Smoothly Migrate Legacy Systems to a Modern Security Concept__](/resources/videos/kong-as-a-strategic-initiative-to-smoothly-migrate-legacy-systems-to-a-modern-security-concept)__Kong as a Strategic Initiative to Smoothly Migrate Legacy Systems to a Modern Security Concept__[](/resources/videos/kong-as-a-strategic-initiative-to-smoothly-migrate-legacy-systems-to-a-modern-security-concept)
[Videos](/resources/videos)Videos[API Security](/resources/videos/api-security)API Security [__Running Secure IoT Services at the Edge__](/resources/videos/running-secure-iot-services-at-the-edge)__Running Secure IoT Services at the Edge__[](/resources/videos/running-secure-iot-services-at-the-edge)
[Videos](/resources/videos)Videos[Zero-Trust](/resources/videos/zero-trust)Zero-Trust [__Zero Trust Security with Service Mesh__](/resources/videos/zero-trust-security-with-service-mesh)__Zero Trust Security with Service Mesh__[](/resources/videos/zero-trust-security-with-service-mesh)