Tyk 4.1 – faster time to value made easy with Open API Specification
Tyk 4.1 brings native support for Open API Specification enabling faster time to value, greater developer productivity and resilience.
Tyk Cloud: accessible API management without limits
The latest release of Tyk Cloud drops two new flexible ways for developers to play with and trial evaluate this API management system.
OWASP API security – 9: Improper assets management
Improper asset management leads to technical debt and reduce agility, making applications vulnerable to attacks. Read our guide!
OWASP API security – 8: Injection
Injection vulnerability is caused by not validating user input, where that input is later used verbatim without any protection mechanisms.
OWASP API security – 7: Security misconfiguration
The security misconfiguration vulnerabilities cover a range of common security mistakes made when exposing services over the internet.
OWASP API security – 6: Mass assignment
The API mass assignment vulnerability that allows an attacker to modify data or elevate privileges by manipulating payload data.
The Strangler Fig Pattern
The Strangler Fig pattern is a long-established approach for incrementally replacing legacy systems. How can it be applied to API Management?
OAuth2 Token Exchange RFC8693
Oauth token exchange – OAuth2 Token Exchange RFC8693 is a delegation protocol which allows an API Gateway to authenticate with an upstream.
Should your developers learn Kubernetes?
Should your developers learn Kubernetes? If you develop applications and want to launch them in the web, this is for you.
Gov Tech Catch Up: The next steps for government software
The public sector can take advantage of APIs to enhance citizen engagement and service functionality by pooling together software.