
Episode 134: Preventing Data Breaches: Strategies to Mitigate Initial Compromise
The Cyber Threat Perspective
00:00
Which conditional access controls block common account attacks
Hosts recommend blocking legacy auth, geofencing, compliant devices, token protection, and other conditional policies.
Play episode from 41:08
Transcript


