Emerging Protocols and Security
In his latest blog, Bill takes a look at a few of the emerging API protocols and their impact on enterprise security models – with a few pointers for mitigating those concerns.
In his latest blog, Bill takes a look at a few of the emerging API protocols and their impact on enterprise security models – with a few pointers for mitigating those concerns.
This blog reviews the OWASP, the Top Ten and API Security Top Ten, and opens the door for an upcoming series on the latter two.
This 3rd in a 3 part series furthers the discussion on OpenTelemetry and API Gateways can leverage Otel for new levels of observability for APIs.
In this second of a three part series, Gary discusses OpenTelemetry and it’s business benefits and advantages.
This blog takes a look at medieval methods to secure the castle – and how those methods actually translate directly to how modern enterprises protect their resources.
This article discusses adoption challenges with OAuth mTLS, steps one can take to mitigate those challenges.
This blog introduces mTLS and discusses the advantages of combining it with OAuth 2.0 for additional security.
Adam’s latest blog discusses API Change management and how it allows us to create a process or a set of rules that shapes the way the API grows as more endpoints are added and as existing functionality changes. He then discusses the three factors to consider whenever making changes to an API.
Microservices are a popular approach to software architecture that aim to break up monolithic code into maintainable chunks. These discrete chunks allow for continuous delivery of a service while developing on top of what is in production. That flexibility is exciting in an agile environment, but rushing into deploying your code as a suite of microservices can put you at risk of incorporating anti-patterns that may cause significant problems down the line. In this blog, Adam discusses four common pitfalls as you start building your own microservices.