Tag

Api Gateway and application security

Browsing

Online businesses have to be careful. It’s a dangerous world, full of anonymous people and services wearing digital skins. It sounds horrific because it is. On the other side of a transaction, could be anyone. Extra measures have to be made to secure web interfaces and API endpoints that online businesses depend on.

It is impossible to protect APIs unless you take a deep dive into the protocols implemented over the standard HTTP. Most security tools are not protecting data where it’s most vulnerable, inside the XML schema itself. These encoding attacks are going unflagged by many application platforms, despite topline security tools and techniques they believe protect APIs. The problem is in the code and the relative inability to notice what malicious attack may be hiding inside…

Thousands of companies from startups to Fortune 500 enterprises use Kong as their API gateway. With a blazingly fast performance, it comes with a perfect feature set for everyone who manages microservices, APIs or serverless stack. Today, we’re thrilled to be a launching partner of Kong Hub. Kong Hub is a marketplace of plugins and modules created by the open-source community and commercial partners that was launched and announced today at the very first Kong…

Every day, there are billions of API calls being executed. These include public APIs, private APIs, SaaS APIs, APIs performing mobile back-end functions and many more. Given the gravity of the threat and the sheer volume of what’s exposed, how do we develop systems that are both safe and robust? Here are some key things you need to know to protect your apps. APIs Need Defense-in-Depth With applications, we know that the external world accesses…

Wallarm has partnered with Mashape to provide the microservices community with API security. Mashape enterprise customers who use Kong API gateway can now quickly add API security protection without change in Kong user’s deployment. Read more about Kong and Wallarm partnership in this blog. Today Kong is used in mission critical deployments at small and large organizations. Scalable: Kong easily scales horizontally by simply adding more machines, meaning your platform can handle virtually any load…