Systems | Development | Analytics | API | Testing

Simulating Multi-Agent Workflows to Find Hidden API Vulnerabilities

API gateways are often viewed as the centralized entry point for client HTTP requests in a distributed system. They act as intermediaries between clients and backend services, managing API request routing, load balancing, rate limiting, access control, and traffic shaping across multiple backend services. This API management is vital for many services and products, but many organizations can put too much stock in it.

UI automation: Why "try, try again" is your mantra

Over the weekend, I was looking to book flights for holidays. All excited, I was able to find a decent price for my family to head for some sunshine later this summer. I reached the payment stage, and that’s where the excitement and smile stopped. I was waiting for confirmation that my payment was finalizing, but then the system took a turn, and I was back on the booking page. Even more, I now had a higher price to pay for the flights. Did I continue with booking, NOOOOOO.

Your API's Biggest Customer Isn't Human: Preparing for the Agent Economy

The shift is already happening. Over the past few years, you’ve invested resources in optimizing your APIs for human developers. Meanwhile, a new class of customers has quietly emerged – one that never takes coffee breaks, never sleeps, and processes information at superhuman speeds. AI agents are rapidly becoming the primary consumers of APIs, and this fundamental change demands a complete rethinking of how we design, deploy, and maintain our digital interfaces.

Configuring Data Loss Prevention

Redacting PII (DLP): Speedscale can be configured to redact personally identifiable (PII) or other sensitive information (PII) from traffic via it's data loss prevention (DLP) features. This redaction happens before data leaves your network, preventing the Speedscale service from seeing the data at all. However, the overall shape or structure of the data is retained in order to facilitate useful testing against systems.

Kong Plugins 101 | API Governance, Security & Rate Limiting Explained

Welcome to Kong Plugins 101 – your introduction to applying governance, security, and control to every API call using Kong Konnect. In this session, we cover: What Kong plugins are and how they work Applying authentication, authorization, throttling, and rate limiting Securing services with advanced governance rules Real-world demo: setting a 5 calls per minute rate limit on an HTTPBin service route How plugins can be applied at different levels – global, service, route, or consumer.

MCP Tutorial: Build a Secure REST API & Dashboard in 5 Minutes | DreamFactory + Claude

In this 5-minute demo, we use DreamFactory’s MCP server with Claude Code and Claude Desktop to: This isn’t AI writing SQL. This is AI orchestrating secure APIs—fast, safe, and auditable. DreamFactory MCP is the secure API gateway that turns databases into AI-ready endpoints—with RBAC, parameterization, and audit logging built-in.

Kong Named Across Eight Categories in 2025 Gartner Hype Cycle Reports

Third-party recognition is always a significant milestone, but being included across multiple categories by a leading research firm like Gartner? That's definitely worth celebrating. Kong has been featured in eight different categories across six Gartner hype cycles for 2025*— our most comprehensive inclusion to date. This recognition spans the entire gamut of API platform capabilities: from API observability to vertical-specific healthcare solutions.

API Management as a Central Security Hub

While many organizations mistakenly believe a single tool can solve all their API security woes, the truth is far more complex. This blog post will dismantle the myth of the "silver bullet" and demonstrate how a comprehensive, defense-in-depth strategy, centered around a robust API management platform, is essential for truly securing your API ecosystem.