[Videos](/resources/videos)Videos[API Security](/resources/videos/api-security)API Security [__Secure and Govern APIs__](/resources/videos/secure-and-govern-apis)__Secure and Govern APIs__[](/resources/videos/secure-and-govern-apis)
[Videos](/resources/videos)Videos[API Security](/resources/videos/api-security)API Security [__Serverless Security With Kong's AWS Lambda Plugin__](/resources/videos/serverless-security-with-kongs-aws-lambda-plugin)__Serverless Security With Kong's AWS Lambda Plugin__[](/resources/videos/serverless-security-with-kongs-aws-lambda-plugin)
[Videos](/resources/videos)Videos[API Security](/resources/videos/api-security)API Security [__The Need for Automation in API Security__](/resources/videos/the-need-for-automation-in-api-security)__The Need for Automation in API Security__[](/resources/videos/the-need-for-automation-in-api-security)
[Videos](/resources/videos)Videos[Cloud](/resources/videos/cloud)Cloud [__Security Observability: Securing Your Cloud Native Apps and APIs__](/resources/videos/security-observability-securing-your-cloud-native-apps-and-apis)__Security Observability: Securing Your Cloud Native Apps and APIs__[](/resources/videos/security-observability-securing-your-cloud-native-apps-and-apis)
[Videos](/resources/videos)Videos[Automation](/resources/videos/automation)Automation [__Balancing Innovation and Security With Automation__](/resources/videos/balancing-innovation-and-security-with-automation)__Balancing Innovation and Security With Automation__[](/resources/videos/balancing-innovation-and-security-with-automation)
[Videos](/resources/videos)Videos[API Security](/resources/videos/api-security)API Security [__Securing Cloud Connectivity at Scale__](/resources/videos/securing-cloud-connectivity-at-scale-2)__Securing Cloud Connectivity at Scale__[](/resources/videos/securing-cloud-connectivity-at-scale-2)
[Videos](/resources/videos)Videos[API Security](/resources/videos/api-security)API Security [__Scaling Applications Without Baselines = Headache <br> Scaling Without Secure Baselines = Migraines__](/resources/videos/scaling-applications-without-baselines-headache-scaling-without-secure-baselines-migraines)__Scaling Applications Without Baselines = Headache <br> Scaling Without Secure Baselines = Migraines__[](/resources/videos/scaling-applications-without-baselines-headache-scaling-without-secure-baselines-migraines)
[Videos](/resources/videos)Videos[Kubernetes](/resources/videos/kubernetes)Kubernetes [__Zero-Downtime Deployment on Kubernetes__](/resources/videos/zero-downtime-deployment-on-kubernetes)__Zero-Downtime Deployment on Kubernetes__[](/resources/videos/zero-downtime-deployment-on-kubernetes)
[Videos](/resources/videos)Videos[API Security](/resources/videos/api-security)API Security [__Securing Cloud Connectivity at Scale__](/resources/videos/securing-cloud-connectivity-at-scale)__Securing Cloud Connectivity at Scale__[](/resources/videos/securing-cloud-connectivity-at-scale)
[Videos](/resources/videos)Videos[API Security](/resources/videos/api-security)API Security [__Top API Security Threats Every API Team Should Know__](/resources/videos/top-api-security-threats-every-api-team-should-know)__Top API Security Threats Every API Team Should Know__[](/resources/videos/top-api-security-threats-every-api-team-should-know)
[Videos](/resources/videos)Videos[API Security](/resources/videos/api-security)API Security [__Securing APIs with OpenID Connect__](/resources/videos/securing-apis-with-openid-connect)__Securing APIs with OpenID Connect__[](/resources/videos/securing-apis-with-openid-connect)
[Videos](/resources/videos)Videos[Kubernetes](/resources/videos/kubernetes)Kubernetes [__How To Do Kubernetes Security When You Don’t Know Anything About Kubernetes Security__](/resources/videos/how-to-do-kubernetes-security-when-you-dont-know-anything-about-kubernetes-security)__How To Do Kubernetes Security When You Don’t Know Anything About Kubernetes Security__[](/resources/videos/how-to-do-kubernetes-security-when-you-dont-know-anything-about-kubernetes-security)