Systems | Development | Analytics | API | Testing

4 Tips for Better API Security in 2019

Whether in the tech press or analyst reports, it became more common in 2018 to see the words “API” and “security”—or worse, “API” and “breach”—together in the same headline. APIs are not only the connective tissue between applications, systems, and data, but also the mechanisms that allow developers to leverage and reuse these digital assets for new purposes.

Steps to Deploying Kong as a Service Mesh

In a previous post, we explained how the team at Kong thinks of the term “service mesh.” In this post, we’ll start digging into the workings of Kong deployed as a mesh. We’ll talk about a hypothetical example of the smallest possible deployment of a mesh, with two services talking to each other via two Kong instances – one local to each service.

Creating Your First Database API with DreamFactory

In this introductory video you'll learn how to generate a fully functional, documented, and secure database API using the DreamFactory platform. After generating the API, we'll interact with it using the generated Swagger documentation. As a final example, we will query the API from outside of DreamFactory using the popular Insomnia HTTP client.