Security

Top 5 API Security Best Practices for Protection, Resilience, Reliability and Scalability

Top 5 API Security Best Practices for Protection, Resilience, Reliability and Scalability

Kate Mikula
·
Security
·
July, 2022

In this article, we explore how to keep your APIs secure across your distributed system, to create reliable and scalable infrastructure.

Traefik Proxy 2.6 and HTTP: Trust, Verification, and the Future

Traefik Proxy 2.6 and HTTP: Trust, Verification, and the Future

Adrian Goins
·
Kubernetes
·
February, 2022

Let's explore how Traefik Proxy 2.6, makes it possible to configure the advertised UDP port of an HTTP/3-enabled entrypoint.

How Traefik Plugins Protect Your Apps Against the Log4j Vulnerability

How Traefik Plugins Protect Your Apps Against the Log4j Vulnerability

Manuel Zapf
·
Security
·
December, 2021

The recently-published Log4j vulnerability introduces a critical security risk. In this article, we’ll show you how Traefik helps mitigate the issue using our plugin system.

Traefik Labs uses cookies to improve your experience. By continuing to browse the site you are agreeing to our use of cookies. Find out more in the Cookie Policy.