Four Effective Ways to Mitigate Unauthenticated API Threats — As an application security engineer, the most challenging applications to secure are those that want to provide an unauthenticated user a means to execute server-side logic. There are many threats to an unauthenticated application user flow such as denial-of-service attacks, injection attacks, spam, etc. However, with the proper security controls…