Systems | Development | Analytics | API | Testing

Security

Protect APIs Against Injection Attacks with Content Inspection

APIs facilitate effortless communication and data exchange between applications and services. However, their inherent design, which codifies service capabilities within the API definition, makes them easily exploitable by malicious actors. API attacks in the US alone are projected to cost $506 billion this decade — and are expected to surge 996% by 2030. And API-related breaches lead to more leaked data than the average security breach, according to Gartner.

How to Use DevSecOps Automation for Safety-Critical Software Development

DevSecOps automation is key for safety-critical software development. Here we explain what is DevSecOps automation and why it is important for safety-critical software. Read along or jump ahead to the section that interests you the most.

API Security Checklist: Essential Controls for Enterprise APIs

APIs are the backbone of modern enterprise systems, but they also expose organizations to significant risks like data breaches and compliance failures. 85% of companies struggle to secure APIs, making robust API security essential. Here's a quick guide to protect your APIs effectively: Start by implementing basic safeguards like secure communication protocols, then move to advanced practices such as dynamic testing and centralized API management.

Understanding SOAP Security

Cybersecurity is one of the top concerns for businesses today. Vulnerabilities make the news when they turn into expensive breaches. With the cloud so prevalent in today's digital landscape, much attention has turned to API security. Network attacks aimed at APIs increased by an incredible 681% in 2022. Considering the continued popularity of SOAP (simple object access protocol) APIs, it is now a top priority for global IT leaders to learn SOAP's security best practices.

Cloudera Commits to CISA's "Secure by Design" Pledge, Strengthening Security for Our Customers

We’re proud to announce that Cloudera signed the Cybersecurity and Infrastructure Security Agency (CISA) “Secure by Design” pledge, joining a network of industry leaders dedicated to embedding security at every stage of the product lifecycle. To be good stewards of our customers’ data, it is critical for security to be a fundamental component of every product and service we offer–not just an afterthought.

Run and Secure LLM Traffic with Kong AI Gateway

Learn how to build and manage robust AI infrastructure using Kong AI Gateway for efficient GenAI application development and deployment. From AI Gateway essentials to advanced management techniques, you'll learn to optimize your applications, implement governance and security measures, and adapt to various deployment environments.

UK Data Concerns Soar as AI Surges - 42% of IT Leaders Identify Data Quality as Major Barrier to AI Success

Hitachi Vantara survey finds data demands to triple by 2026, highlighting critical role of data infrastructure in AI success and revealing gaps in data governance, security, and sustainability.

IT Leaders Share Cost of API Incidents, Concerns Over AI Threats

More than 80% of developers and business leaders say AI investments have already created the opportunity for new products or services, according to Kong’s 2024 API Impact Report. Clearly, AI has proven its value and place in the enterprise, but with new innovations come new potential vulnerabilities. But as organizations push forward into and navigate the rising risk of AI-enhanced threats and the adoption of AI tools and large language models (LLMs), what have tech leaders experienced?

Transforming B2B CIAM: Strategies for Effective Access Management in Digital Collaboration

raditional approaches to access management are being superseded by a holistic focus on customer experience, prompting businesses to reevaluate their CIAM strategies. Many enterprises have initiated collaborations with other organizations. Business customers and partners now routinely utilize more digital services, resulting in an increasing need for flexible, delegated lifecycle management for B2B users.

Securely Query Confluent Cloud from Amazon Redshift with mTLS

Querying databases comes with costs—wall clock time, CPU usage, memory consumption, and potentially actual dollars. As your application scales, optimizing these costs becomes crucial. Materialized views offer a powerful solution by creating a pre-computed, optimized data representation. Imagine a retail scenario with separate customer and product tables. Typically, retrieving product details for a customer's purchase requires cross-referencing both tables.