


How Kong Gateway’s Rate Limiting Plugin Can Protect Your Organization from DDoS Attacks
By Nicky Carlisle Distributed Denial of Service (DDoS) attacks are a growing concern for organizations of all sizes with the average number of attacks per day more than tripling since the end ...
15 Practices to Shield APIs from Attack: #6 – OWASP Top 10, Cryptographic Failures
Every few years, the Open Worldwide Application Security Project (OWASP) updates its top attack vectors. To illustrate how our work and the practices we’ve discussed in this blog series truly help ...
15 Practices to Shield APIs from Attack: #5 – OWASP Top 10, Broken Access Control
Every few years, the Open Worldwide Application Security Project (OWASP) updates its top attack vectors. To illustrate how our work and the practices we’ve discussed in this blog series truly help ...
15 Practices for Shielding Your APIs from Attack: #4 – Tools & Systems
This post shares experiences from our multi-year journey working with a Canadian client to help them improve their API security and security management. This post discusses the tooling and technology our ...
15 Practices for Shielding Your APIs from Attack: #3 – Concepts, Cryptography, & Credentials
This post shares experiences from our multi-year journey working with a Canadian client to help them improve their API security and security management. In our API gateway project, there are several architectural ...
15 Practices for Shielding Your APIs from Attack: #2 – Teams & Tests
This post shares experiences from our multi-year journey working with a Canadian client to help them improve their API security and security management. This post in the series discusses the approaches ...
15 Practices for Shielding Your APIs from Attack: #1 – APIs at Risk
One of our customers, a leader in the Canadian Telecom Market, found that the need for a single business innovation service gateway was inhibiting business and imposing unrealistic business costs. Their ...
Observability & Security: The Benefits and Approaches to Better and Safer Applications and Services
Observability and Security are undoubtedly related. Security exposures and compromises happen in the dark, where no one is watching. An application with good Observability is inherently being watched, ...