Systems | Development | Analytics | API | Testing

Kong

The Most Prevalent Code Flaws in API Development and How Hackers Exploit Them

- The wide adoption of cloud-native and microservice-based applications to connect applications, data, and devices across the enterprise has led to an exponential growth in APIs. But as the API ecosystem grows, so does the risk of exposing sensitive data. APIs get directly to critical and sensitive data, making them a valuable target for hackers. How can you ensure your APIs are protected from malicious attacks and unauthorized access?

What is Istio Service Mesh?

As a developer working with microservices architectures, you may find yourself facing numerous challenges. Managing multiple services, each with its own potential points of failure, can be complex. Issues such as communication difficulties, security concerns, and lack of visibility are common in these environments. These challenges are not unique. As microservices architectures expand, they often introduce complexities that can be demanding for development teams to handle.

Deep Dive into Kong Gateway's New Rust-Based Router

The router component in the Kong Gateway is a crucial element for traffic handling, allowing the definition of specific matching rules to identify and process client requests. As a core component of the gateway, the router plays a vital role in ensuring the functionality, flexibility, security as well as performance of the gateway.

API Productization Simplified with Multiple Portals in Kong Konnect

Efficiently managing your developer portal is critical in productizing your APIs quickly and reliably. A streamlined developer portal ensures that your APIs are easily accessible, well-documented, and secure — driving higher adoption and easier integration. With the increasing demand for APIs across business units, brands, partners, and more, a single developer portal often falls short for both the API owner and the consumers by introducing complexity and slowing productization efforts.

Demonstrating Proof-of-Possession (DPoP): Preventing Illegal Access of APIs

In a previous blog post, we discussed the prevalence of bearer tokens (or access tokens) to restrict access to protected resources, the challenges the sheer nature of bearer tokens present, and available mitigations. To recap, presenting a bearer token is proof enough of an authorization grant to avail the service and access resources protected by the token. This poses many security risks such as using stolen or leaked tokens to gain unauthorized access.

Kong Konnect Demo: Revolutionize Your API Management with a Unified Cloud-Native Platform

Kong Konnect Demo: Revolutionize Your API Management with a Unified Cloud-Native Platform In this video, Vice President Product Management, Ross Kukulinski showcases how Kong Konnect addresses the challenges of API security, multi-cloud deployments, and AI workload governance. Kong Konnect is one platform to manage them all in one unified control plane: API gateways, AI gateways, ingress, and service meshes.

How to Quickly Deploy Kong Gateways in Konnect Docker, Serverless, and Kubernetes

How to Quickly Deploy Kong Gateways in Konnect Docker, Serverless, and Kubernetes In this video, Senior Director, Developer Relations, Michael Heap, walks through three efficient ways to deploy Kong Gateway with Konnect. Learn how to get started with Kong Gateway using Docker on your local machine, how to make your gateway publicly accessible using a Serverless Gateway, and how to set up a production deployment on Kubernetes (Amazon EKS).

Enhancing Resilience: Introducing Fallback Configurations in Kong Ingress Controller 3.2

As Kong Ingress Controller is used widely in the field, ensuring its reliable and resilient error handling is crucial to us. Kong Ingress Controller 3.2 introduces a Fallback Configuration feature, designed to make sure a single mistake made in your manifests doesn't halt the whole configuration update pipeline. In this User Call, we'll cover: The Need for the Feature: Understand the critical scenarios that highlighted the necessity for improved error-handling mechanisms.