Systems | Development | Analytics | API | Testing

Security

Zero-trust security with Kong Mesh

Zero-trust security with Kong Mesh Brought to you by @KongInc Senior Solutions Engineer Ahmed Koshok. In this video, Ahmed explains the core concepts of zero-trust security and demonstrates how Kong Mesh enables you to implement zero-trust security for your microservices. Kong Mesh is a service mesh built on top of the Envoy proxy that provides secure communication between microservices. With Kong Mesh, you can encrypt traffic between services, implement fine-grained access controls, and enforce security policies at the network layer.

CIAM Beyond Access Management - Is Your CIAM Program There Yet?

How mature is your CIAM program today, and how do you aspire to evolve it? We talk with many existing and prospective CIAM customers and have found a fairly rapid evolution in maturity over the last year. In fact, we’ve developed the WSO2 CIAM Maturity Model to discuss the various levels of maturity we see across the market. So what level do you think your organization is at currently, and how can you strive for an optimized level of maturity?

Trusted Data: Alchemy For Misinformation

The best description of untrusted data I’ve ever heard is, “We all attend the QBR – Sales, Marketing, Finance – and present quarterly results, except the Sales reports and numbers don’t match Marketing numbers and neither match Finance reports. We argue about where the numbers came from, then after 45 minutes of digging for common ground, we chuck our shovels and abandon the call in disgust.” How would you go about fixing that situation?

Overview of Cloud Hardware Security Module for Payment Applications

A hardware security module (HSM) is a tamper-resistant physical computing device that safeguards and manages digital keys, performs encryption and decryption functions for digital signatures, and provides strong authentication and other cryptographic functions. HSM has mature technology, with high availability, scalability, and usability. These modules traditionally come in the form of a plug-in card or an external device that attaches directly to a computer or a network server.

GraphQL Authorization at the API Gateway with Kong Konnect and OPA

In this blog we are going to learn about the technical challenges behind solving GraphQL authorization and how many organizations resolve it today. Then discuss how a Kong / OPA integration can help drive security standards in this space and bring some parity with REST API solutions. Last, we will end with a quick tutorial.