Systems | Development | Analytics | API | Testing

In the Driver's Seat with Konnect - Uplevel Your API Management Strategy

Join Manjiri Tapaswi (Senior Software Engineer, Konnect at Kong) for a ride around your Konnect organization’s administrative management! Learn how to secure and govern your environment by setting up Teams and Roles, or enable SSO through an external authenticator. We’ll go over how to leverage System Accounts for hardening your automation and integrations. Tune up your security risks monitoring, compliance maintenance, and responding to potential security incidents when they occur, by setting up and tracking Audit Logs.

Automate Virtual Production with Perforce: APIs, Server Extensions, & More

There are a lot of moving parts in a virtual production pipeline that Perforce Helix Core can help you automate. In this blog, we cover how to use the Helix Core (Perforce) APIs (including the Perforce Python API) to automate some of the manual processes in yourvirtual production pipeline.

Zero Trust Security: The What, Why and How

If you’ve been researching API security, you’ve likely seen the term “Zero Trust.” And you may already know that organizations can use Zero Trust to help protect their APIs from attacks. What you may not know is that Zero Trust is one of the best models for API security. According to Microsoft, “96 percent of security decision-makers state that Zero Trust is critical to their organization’s success.” But what is Zero Trust exactly?

Understand the Differences: API Authentication vs API Authorization

If you landed on this blog post, chances are that you care about keeping your API secure. It’s an important topic to discuss: API exploits are on the rise, and you don’t want unauthorized users accessing your data. A big part of that security is implementing API authentication and API authorization. These API access control measures are a foundational aspect of API security.