Recent Blog ArticlesNewest TopicsMost LikesTagged:TagAddressing data exfiltration: Token theft talk Explorer mitigations for theft-n-replay for various authentication scenarios and artifacts. How Tenant Restrictions v2 Can be Used to Prevent Data Exfiltration Cross-tenant security protections to restrict access and prevent data exfiltration without inhibiting collaboration. Apply Zero Trust Principles to Authentication Session Management with Continuous Access Evaluation Continuous Access Evaluation is our first step in building Session Management based on Zero Trust principles.