Systems | Development | Analytics | API | Testing

New in Kong Konnect: Support for Okta + More Portal Customization

In February 2021, we announced the GA of Kong Konnect, the first cloud native service connectivity platform that gives organizations the flexibility of protecting their API and service traffic while simultaneously taking advantage of 10x ops improvements via the cloud control plane.

Simplifying Authentication for Microservices Security | Jeff Taylor | Okta | Episode 10

Still trying to add auth to each microservice's code? According to Jeff Taylor, Senior Product Manager at @OktaDev there’s an easier way! In this Kongcast, Jeff tells and shows us how to speed up microservices security and take the burden off developers by managing auth with an API gateway.

Security Reference Architecture Summary for Cloudera Data Platform

This blog will summarise the security architecture of a CDP Private Cloud Base cluster. The architecture reflects the four pillars of security engineering best practice, Perimeter, Data, Access and Visibility. The release of CDP Private Cloud Base has seen a number of significant enhancements to the security architecture including: Before diving into the technologies it is worth becoming familiar with the key security principle of a layered approach that facilitates defense in depth.

Why PII Pseudonymization is Crucial for Data Security

Data security is an important priority for every organization that handles customer or user data, especially those that fall under data privacy and protection laws such as the EU’s General Data Protection Regulation (GDPR). Large volumes of personal data flow in and out of companies and their systems every day, and the threat of data breaches looms over these operations. How can organizations use their data to power critical operations without running afoul of regulations or privacy concerns?

Monitoring Appian with Appian: Orchestrating the Security Toolbox

In our previous blog post covering our in-house Security Orchestration, Automation & Response (SOAR) application, we described the data model for the system and basic features allowing security analysts to review events and trends across Appian’s many security monitoring systems.

Securing your Applications in Node.js - Part 2/3

If you haven’t checked out the first part of Securing your Applications in Node.js, click here. This is a 3-part blog series on Node.js. This article aims to establish a Node.js security roadmap by addressing security challenges comprehensively and consistently for large infrastructures. Let’s begin! 🚀

How to Choose the Best API Management Platform

An API or Application Programming Interface is how two applications communicate with one another; it is also the way users access an application. All websites and applications use some form of API through an API gateway, which serves as an entry point to a service. Unfortunately, over 90% of businesses have suffered from a security problem related to their APIs, making API security a top concern. For this reason and more, many businesses require a dedicated API management platform.