Systems | Development | Analytics | API | Testing

Kong

Using Service Mesh Within Your Kubernetes Environment

Container technologies are always evolving — and we're not talking Tupperware here. Over the past years, service mesh has emerged as a crucial component for managing complex, distributed systems. As organizations increasingly adopt Kubernetes for orchestrating their containerized applications, understanding how to effectively implement and utilize a service mesh within this environment becomes paramount.

OWASP AI Security Project: Top 10 LLM Vulnerabilities Guide

Artificial intelligence (AI) is kind of a big deal. And when things are a big deal, they're ripe to be exploited. Fortunately, mounting concerns about AI security and privacy are met by plenty of guidance on best practices from the good folks in the open source world. The OWASP AI Security Project has emerged as a crucial initiative, offering developers clear, actionable guidance on designing, creating, testing, and procuring secure and privacy-preserving AI systems.

The Critical Role of API Security in the Internet of Things (IoT)

From smart homes to wearable devices to connected cars, the Internet of Things (IoT) is bringing about a new era of hyper-connectivity. Experts expect investments in the IoT ecosystem to rise above $1 trillion in 2026 — with no signs of slowing down. Application programming interfaces (APIs) are the backbone of IoT, ensuring scalability and security across billions of connected devices.

Unlock Faster Insights and Issue Resolution with Kong Konnect Advanced Analytics

APIs are the backbone of the modern enterprise. However, troubleshooting API errors and resolving issues quickly can be challenging given their role in application operational continuity and customer experience. Time-sensitive resolution demands monitoring and deep analytical insights into API performance and usage. Combining both these capabilities in one tool accelerates real-time resolution and empowers stakeholders to surface business-critical API performance metrics through a self-service motion.

Announcing Insomnia 9.3.3 GA with 20x Better Performance, Remembering Last Open Files, and Improved Sidebar

We're pleased to announce the general availability of Kong Insomnia 9.3.3. This release ships with numerous improvements, particularly around performance. We strongly recommend updating to this latest version to get the best user experience in your daily workflow with Insomnia.

Building Success in the Manufacturing Industry with API Management

Manufacturing has been one of the most prominent industries worldwide since the Industrial Revolution. Since then, from producing textiles to computer chips, manufacturers have always looked for ways to innovate. In the age of AI and APIs (or application programming interfaces), tech companies are looking for technological breakthroughs to gain an edge over the competition.

The Most Prevalent Code Flaws in API Development and How Hackers Exploit Them

- The wide adoption of cloud-native and microservice-based applications to connect applications, data, and devices across the enterprise has led to an exponential growth in APIs. But as the API ecosystem grows, so does the risk of exposing sensitive data. APIs get directly to critical and sensitive data, making them a valuable target for hackers. How can you ensure your APIs are protected from malicious attacks and unauthorized access?