Systems | Development | Analytics | API | Testing

Latest Posts

Layered Security Strategy for Managing APIs

This post is part of a series on becoming a secure API-first company. For a deeper dive, check out the eBook Leading Digital Transformation: Best Practices for Becoming a Secure API-First Company. As APIs have become mission-critical, securing them against threats is crucial. APIs are an attractive target for attackers, and a single vulnerability can expose an organization's most sensitive information assets. To properly secure APIs, we have to move beyond basic perimeter defenses.

Announcing Standard Webhooks

We're pleased to announce the launch of Standard Webhooks! Kong has been part of the Technical Committee of this standard with other great companies like Svix (the initiator of the project), Ngrok, Zapier, Twillio, Lob, Mux, and Supabase. This was a year-long effort of gathering feedback, use cases, and debating about what and how to define what landed. Standard Webhooks is one initiative to standardize the way producers and consumers can have a contract to communicate.

Let's Go AWS! The Kong Konnect EKS Marketplace Add-on for Kong Gateway Dataplanes is Ready to Go

Today, we’re excited to release the Kong Konnect EKS Marketplace add-on as a means to deploy your Kong Gateway dataplanes in AWS. The add-ons are a step forward in providing fully managed Kubernetes clusters. It is here to simplify the post-procurement process of bootstrapping Kong Konnect gateway data planes, avoid context switching among tools during the installation process, and provide notifications when a new version of Kong Gateway is available, making upgrades seamless.

Fortify API Gateway Deployments with decK File Linting

API gateways serve as the final checkpoint for your APIs. As such, gateway configuration is critical to ensuring that your APIs remain secure, available, and responsive. Ensuring that all changes to these configurations are intentional and follow your organization's best practices is key to maintaining a robust API gateway deployment. decK 1.28 adds a brand new feature that allows you to natively validate your gateway configurations against custom rule sets.

Kong Mesh 2.5: Tailored Use Cases for an Elevated Experience

The latest release of Kong Mesh (version 2.5) brings many new features that push the envelope and make Kong Mesh the logical choice of a service mesh to meet your objectives. In this blog, we'll break down these new features and provide tailored use cases to illustrate how Kong Mesh 2.5 can elevate your service mesh experience. We'll focus on three main categories: flexibility, resiliency, and security.

Tightening Bearer Token Authentication with Proof-of-Possession Tokens Using Kong

In token-based architecture, tokens represent the client’s entitlement to access protected resources. Access tokens (or bearer tokens as they're commonly known) are issued by authorization servers after successful user authentication. The tokens are passed as credentials in the request to the target APIs which inform the API that the bearer of the token is authorized to access the API and perform certain actions.