Systems | Development | Analytics | API | Testing

Secure your MCP servers with Kong AI Gateway

Managing AI infrastructure isn’t enough—you need to protect it. In this demo, learn how to secure, observe, and govern your MCP servers using Kong AI Gateway. If you’re integrating MCP into your stack, Kong’s AI Gateway acts as the trust layer—keeping your costs down, your innovation moving, and your risks in check. Subscribe for more demos on AI infrastructure, API management, and platform engineering.

Ensuring Tenant Scoping in Kong Konnect Using Row-Level Security

In the SaaS world, providers must offer tenant isolations for their customers and their data. This is a key requirement when offering services at scale. At Kong, we've invested a lot of time to provide a scalable and seamless approach for developers to avoid introducing breaches in our systems. In this article, we'll explore the challenges of tenant scoping and how we address them effectively.

GDPR Compliance in Headless CMS Environments: What You Need to Know

Headless Content Management Systems (CMS) have taken the digital world by storm, providing developers and marketers with amazing flexibility and scalability options. But when it comes to GDPR compliance in a headless CMS, the extended complexities are troubling. This information is useful for any company concerned with GDPR or companies of intent that do business in Europe, as failure to comply with GDPR can lead to severe penalties and adverse consumer relationships.
Sponsored Post

Modernize Test Data Management with Traffic Replay

In software testing or platform engineering, having realistic data is crucial. For years, teams have relied on Test Data Management (TDM) to copy entire production databases, scrub any sensitive information, and then spin up test environments from these sanitized data sets. While TDM gets the job done, it can be costly, time-consuming, and can quickly become outdated. The issue of outdated data becomes more pronounced as deployment velocity increases and back end dependencies become more diverse (think: microservices).

What is RBAC? The Basics of Role-Based Access Control

As cybersecurity takes the main stage, organizations face a significant challenge: how do you strike a balance between maintaining a high level of security and ensuring employees have enough data access to perform their jobs properly? Role-based access control (RBAC) is a solution that can support both of these goals, even as organizations are quickly scaling.

Key Extraction By Uprobe Attachment On Openssl For Ssl Inspection

Man-in-the-middle attacks are elegantly mitigated in TLS, with TLS1.3 introducing more robust encryption protocols and a streamlined handshake process that significantly reduces the vulnerability to these types of attacks. By employing stricter encryption standards and eliminating outdated cipher suites, TLS 1.3 enhances security measures to effectively counter potential interception and unauthorised data decryption.

The Best Approach to Databricks Data Masking for Enterprise-Scale Compliance

Databricks helps companies process large-scale data, and Databricks data masking ensures high-quality, compliant data. If your organization relies on data for AI/ML or analytics, it’s essential to ensure you are implementing a robust, compliant data masking strategy. Let’s explore how data masking works natively in Databricks. Then, we’ll go over challenges teams might run into in using native masking capabilities.

Simplifying Cyber Resilience for Modern Enterprise Infrastructure - at Any Scale

Achieving cyber resilience is a constant challenge for even the largest and most experienced organizations and IT leadership teams. Studies, including one from our partner Veeam, show +75% of organizations experienced a ransomware attack in the past year. Those that didn’t are well-aware they may be next.

Cloud Security Testing: Best Practices for AWS, Azure & GCP

Cloud computing has reshaped the digital landscape, offering unparalleled scalability, flexibility, and cost-effectiveness to businesses worldwide. Imagine entrusting your most valuable possessions to a high-tech, automated storage facility—accessible anytime, anywhere, but also potentially vulnerable if not adequately protected. This analogy perfectly encapsulates cloud computing: convenient, yet requiring robust security measures to guard against threats.