Systems | Development | Analytics | API | Testing

Latest Posts

Shaping the Future of Digital Transformation in Singapore

As AI technologies continue to revolutionize industries, organizations must balance innovation with responsibility. Kong understands that embracing AI involves not just adopting new tools but also ensuring they're secure, compliant, and sustainable. During a recent visit to Singapore, Kong's Co-Founder and CTO Marco Palladino highlighted the critical need for a robust governance framework to manage the rapid pace of AI innovation responsibly.

How to Implement Secure Access Control with OPA and Kong

Ensuring secure access to applications and APIs is critical. As organizations increasingly adopt microservices architectures and cloud native solutions, the need for robust, fine-grained access control mechanisms becomes paramount. This is where the combination of Open Policy Agent (OPA) and Kong Gateway shines.

Protect APIs Against Injection Attacks with Content Inspection

APIs facilitate effortless communication and data exchange between applications and services. However, their inherent design, which codifies service capabilities within the API definition, makes them easily exploitable by malicious actors. API attacks in the US alone are projected to cost $506 billion this decade — and are expected to surge 996% by 2030. And API-related breaches lead to more leaked data than the average security breach, according to Gartner.

Kong Gateway 3.9: Extended AI Support and Enhanced Security

Today we're excited to announce Kong Gateway 3.9! Since unveiling Kong Gateway 3.8 at API Summit 2024 just a few months ago, we’ve been busy making important updates and improvements to Kong Gateway. This release introduces new functionality around LLM support for AI governance and security and threat protection. Keep reading to learn more!

How We Built It: Managing Konnect Entities from K8s Clusters with KGO

We recently released Kong Gateway Operator 1.4 with support for managing Konnect entities from within the Kubernetes clusters. This means users can now manage their Konnect configurations declaratively, through Kubernetes resources powered by Kong’s Custom Resource Definitions. For example, here’s how you can use a KongConsumer resource in Kubernetes to configure a Consumer in Konnect.

On-Call Oasis: Creating a Peaceful Experience, Especially During the Holidays

Kong Konnect is Kong’s infrastructural SaaS solution. We run the control planes and API management applications for the data planes (API gateway and mesh) that are run by our customers to power their APIs. Some of the most critical traffic in the world goes through these data planes. The criticality of Konnect and therefore our customer’s uptime expectations of Konnect are very high.

Announcing Insomnia's New Teams RBAC and Domain Capture

Today — alongside the announcement of Kong Insomnia 10.2 — we're excited to introduce two new Kong Insomnia enterprise capabilities that will improve user management at scale across every organization. These new features are available to use for every existing enterprise customer, and they complement existing advanced user management capabilities like EE SSO and SCIM. Let’s take a look at each of the new capabilities.

What is Agentic AI? The Next Big Leap in Artificial Intelligence

You’ve probably heard of generative AI, which uses deep learning models to simulate human decision-making by processing large amounts of data, and then responding with pertinent new content. Since the arrival of ChatGPT in 2022, generative AI has come a long way — but now there’s another technology on the scene that could further revolutionize the capabilities of AI. Read on to learn more about agentic AI and how it could transform the business landscape.

IT Leaders Share Cost of API Incidents, Concerns Over AI Threats

More than 80% of developers and business leaders say AI investments have already created the opportunity for new products or services, according to Kong’s 2024 API Impact Report. Clearly, AI has proven its value and place in the enterprise, but with new innovations come new potential vulnerabilities. But as organizations push forward into and navigate the rising risk of AI-enhanced threats and the adoption of AI tools and large language models (LLMs), what have tech leaders experienced?