Systems | Development | Analytics | API | Testing

PII Sanitization with Kong

Using sensitive user data for analytics, development, or training AI models introduces significant security risks like data breaches and costly PII (Personally Identifiable Information) leakage. These incidents can lead to heavy fines and a critical loss of customer trust. Watch this demo to see how the Kong AI Gateway automatically finds and sanitizes PII in real-time before requests ever reach your upstream services or Large Language Models (LLMs).

How to Make Website Launching Effortless with the Right Tools

Launching a website used to be a complex, time-consuming process, requiring a deep understanding of code, design, and server management. But today, thanks to powerful tools, website creation has become incredibly simple and user-friendly. Whether you're a business owner, freelancer, or hobbyist, the right combination of hosting and website building tools can make the process smooth and effortless. For example, you use a modern AI website builder that creates a website for you. And that's not all.

Securely Connecting Internal Services to WSO2 Bijira with Tailscale

Enterprises often host their backend services within private internal networks, whether in on-premises data centers or restricted cloud environments. This setup is essential for protecting sensitive data, meeting compliance requirements, and reducing exposure to external threats. But it also introduces a major hurdle: how do you let external consumers and partners access the right APIs without opening unnecessary doors into your private infrastructure?

Strengthen Security With TLS 1.3 for Confluent Cloud Clusters

Security standards continue to evolve, and organizations need infrastructure that evolves along with them. TLS 1.3 brings stronger encryption to streaming infrastructure for data in transit while ensuring alignment with strict security and compliance requirements. We’re excited to announce that TLS 1.3 is currently available as an opt-in feature on Confluent Cloud Dedicated clusters and all other Confluent Cloud APIs, including Stream Governance, Metrics, and Control Plane.

Best Penetration Testing Companies in the U.S.(2025 Guide)

‍ Cyberattacks aren’t slowing down; they’re only getting smarter. With AI-driven cyber threats on the rise, organizations can no longer rely on reactive defenses. Proactive security measures like penetration testing have shifted from a “nice-to-have” to an absolute necessity for safeguarding business-critical applications, sensitive data, and brand reputation.

Static Data Masking for Snowflake Tutorial with Perforce Delphix

Learn how Delphix simplifies data masking for Snowflake to protect sensitive data while maintaining its usability for analytics and AI. This demo explains why masking is critical for security and compliance, especially when managing large-scale data in the cloud.

Simulating Multi-Agent Workflows to Find Hidden API Vulnerabilities

API gateways are often viewed as the centralized entry point for client HTTP requests in a distributed system. They act as intermediaries between clients and backend services, managing API request routing, load balancing, rate limiting, access control, and traffic shaping across multiple backend services. This API management is vital for many services and products, but many organizations can put too much stock in it.

Configuring Data Loss Prevention

Redacting PII (DLP): Speedscale can be configured to redact personally identifiable (PII) or other sensitive information (PII) from traffic via it's data loss prevention (DLP) features. This redaction happens before data leaves your network, preventing the Speedscale service from seeing the data at all. However, the overall shape or structure of the data is retained in order to facilitate useful testing against systems.

API Management as a Central Security Hub

While many organizations mistakenly believe a single tool can solve all their API security woes, the truth is far more complex. This blog post will dismantle the myth of the "silver bullet" and demonstrate how a comprehensive, defense-in-depth strategy, centered around a robust API management platform, is essential for truly securing your API ecosystem.

MCP Tutorial: Build a Secure REST API & Dashboard in 5 Minutes | DreamFactory + Claude

In this 5-minute demo, we use DreamFactory’s MCP server with Claude Code and Claude Desktop to: This isn’t AI writing SQL. This is AI orchestrating secure APIs—fast, safe, and auditable. DreamFactory MCP is the secure API gateway that turns databases into AI-ready endpoints—with RBAC, parameterization, and audit logging built-in.