Systems | Development | Analytics | API | Testing

GraphQL Authorization at the API Gateway with Kong Konnect and OPA

In this blog we are going to learn about the technical challenges behind solving GraphQL authorization and how many organizations resolve it today. Then discuss how a Kong / OPA integration can help drive security standards in this space and bring some parity with REST API solutions. Last, we will end with a quick tutorial.

Secure APIs Hosted in Amazon Gateway With Asgardeo

Amazon API Gateway is a service offered by AWS that enables users to create, publish, and maintain secure APIs on any scale. It supports both RESTful APIs and WebSocket APIs. However, It's crucial to secure these APIs before allowing applications to access them. The use of OAuth2 tokens and JWTs is the standard method of securing APIs.

Appian Protect: Security Monitoring, End-to-End Encryption, and More

Data is the heart of business operations. And much of that data is sensitive or regulated. Cyber threat actors know they can benefit financially from your data by holding it for ransom or selling it on the dark web. The most recent Cost of a Data Breach Report 2022 from Ponemon Institute and IBM clocks the average data breach cost at $4.35 million USD (that’s $164 USD per data record). The stakes are high. Your security must be too.

How to Prevent Authorized Push Payment Fraud with Mobile App Testing

This recent article from Finextra regarding the UK payments watchdog consulting on new authorized push payment (APP) fraud reporting rules has me thinking. How can we prevent fraud and protect consumers – and ourselves from scams? APP fraud happens when fraudsters deceive consumers or individuals into sending a payment under false pretenses to a bank account controlled by the fraudster. Real-time payment schemes are irrevocable, so victims cannot reverse a payment once sent.

API Secrets Management: Integrating Kong Gateway with Your Favorite Identity Manager

What is Kong Secrets Management? Kong Secrets Management is a new feature that allows you to safely store and retrieve secrets used throughout the Kong Gateway deployment, improving the fundamental security of your applications. Securing your entire Kong deployment with centralized secrets makes it easier to manage and build governance around your Kong deployments.