OWASP API security – Intro

This is the first in a series of blog posts which looks at the OWASP API Security top 10 threats in the context of API Management. Read our guide!

The Strangler Fig Pattern

The Strangler Fig pattern is a long-established approach for incrementally replacing legacy systems. How can it be applied to API Management?

OAuth2 Token Exchange RFC8693

Oauth token exchange – OAuth2 Token Exchange RFC8693 is a delegation protocol which allows an API Gateway to authenticate with an upstream.

Product delivery with a difference

Tyk is known for delivering products that are changing the way we think about API management. But it’s not just our API solutions that are different!

Net promoter score at Tyk

Net Promoter Score (NPS) is a widely used measure of customer satisfaction and experience. Here’s how we did!