Black Hat USA 2025 recap
This year at Black Hat USA, the conversation focused on model context protocol (MCP), agentic workflows, and how security fundamentals still matter.
This year at Black Hat USA, the conversation focused on model context protocol (MCP), agentic workflows, and how security fundamentals still matter.
AWS re:Invent 2024 has officially wrapped up, but not everything that happens in Vegas stays in Vegas. Here are some key takeaways from our five days spent with AWS and app delivery enthusiasts.
Though KubeCon North America 2024 has officially come to a close, the CNCF's flagship event has left us buzzing with residual excitement. Here's what we've learned throughout those four days.
The introduction of ChatGPT caused sharply increased interest in large language models (LLMs). These AI apps also have unique deliverability concerns. Here's how an HAProxy AI gateway can help.
While there are core differences between web apps and APIs, a unified security strategy is crucial. In this blog, we'll discuss why both types of security appear different yet are inherently linked.
The G2 Fall 2023 Reports are in! HAProxy's acclaim across multiple categories, market levels, and global segments has risen. Here's what users are saying about their HAProxy use cases.
In this blog post, we’ll see how placing your servers behind HAProxy and using it as an API gateway lets you narrow the point of entry for attackers.
In this post, you will learn how to leverage tokens to grant some users more access than others and then charge for the service. It's called API monetization.
In this blog post, you'll learn about the metrics which HAProxy compiles, how to extract them with Prometheus, and visualize them with Grafana or Kibana.
In the blog post, you'll learn various ways to health check your servers so that your APIs maintain a high level of reliability. This includes...
In the blog post, you'll learn more about using HAProxy as an API gateway, leveraging it to secure your API endpoints using OAuth 2.
An API gateway routes client requests intelligently and handles functions such as load balancing, security, and rate limiting.