Systems | Development | Analytics | API | Testing

Top 10 API Security Threats Every API Team Should Know

As more and more data is exposed via APIs either as API-first companies or for the explosion of single page apps/JAMStack, API security can no longer be an afterthought. The hard part about APIs is that it provides direct access to large amounts of data while bypassing browser precautions. Instead of worrying about SQL injection and XSS issues, you should be concerned about the bad actor who was able to paginate through all your customer records and their data.

How an API-powered digital ecosystem can drive innovation and efficiency

Worldwide, businesses are adapting to the new market conditions by transforming their current operating models to meet the new consumer demands and improve productivity, all while still focusing on achieving growth. In this new era, taking an outside-in approach to digital business ecosystems can help organizations harness their existing resources and relationships to drive new innovations and efficiency.

Custom Authentication and Authorization Framework with Kong

Kong Enterprise provides many out-of-the-box plugins to support various access control solutions like basic authentication, key authentication, JWT, LDAP, OAuth 2.0, OpenID Connect, among others. Most of the time, you should be able to find a plugin to suit your needs to protect your private or public APIs using Kong Enterprise without the need of writing your own plugins.

Connecting to 3rd-party APIs - How to work with REST API connector

In this video, I’m working with our REST API connector to connect to our own elastic.io Integration Management API. We offer several ways to authenticate an API depending on its configuration. Here we take basic authentication with username and password. Now with the elastic.io API, the username is actually the email address you registered with. You can navigate to the Profile Information page to copy it from there.

How to Use Kong Gateway With K3s For IoT and Edge Computing on Kubernetes

Once upon a time, we had these giant structures where thousands of people would congregate to share ideas, pamphlets filled to the margins with buzz words and cheap, branded t-shirts. Yep, tech conferences – oh what a relic of the past that I miss. It used to be part of my job to attend these.

How to work with databases

To start working with a MySQL, PostgreSQL, Oracle or MSSQL database, all you need to do is to select our Database connector. We have already learned from the short video on credentials that there are quite a few fields to fill in when you need to connect to a database for the first time. The data you see me enter here is merely from our test database.

The New Urgency to Transform to a Platform Business Model

The current situation has precipitated an intense acceleration of digital transformation. The future was always uncertain, but is now ever more so. Companies that run platform business models are proving to be relatively resilient during this uncertain time, and are likely to emerge stronger than ever. APIs are critical to these companies, and many traditional businesses are starting to adopt a platform strategy not only to survive, but to thrive.

How to Extend Your ERP

ERP systems enable businesses to bring together and manage core processes and technologies under one system. But the truth is, an out-of-the-box ERP system rarely fits a business perfectly, and even if it does, it is only temporary. A business’s challenges, needs, and strategies change and grow over time, and its tools must too. When an ERP’s functionality does not fully meet your business’s needs, it’s time to think about extending it.