
Episode 134: Preventing Data Breaches: Strategies to Mitigate Initial Compromise
The Cyber Threat Perspective
 00:00 
Which conditional access controls block common account attacks
Hosts recommend blocking legacy auth, geofencing, compliant devices, token protection, and other conditional policies.
 Play episode from 41:08 
 Transcript 


