<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Security Operations on Microsoft 365 Security Insights</title><link>https://thecybersec.gr/tags/security-operations/</link><description>Recent content in Security Operations on Microsoft 365 Security Insights</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Fri, 22 May 2026 10:02:27 +0300</lastBuildDate><atom:link href="https://thecybersec.gr/tags/security-operations/index.xml" rel="self" type="application/rss+xml"/><item><title>Secure Score P3: Operations</title><link>https://thecybersec.gr/posts/secure-score-grc-part-3-operations/</link><pubDate>Fri, 22 May 2026 07:00:00 +0300</pubDate><guid>https://thecybersec.gr/posts/secure-score-grc-part-3-operations/</guid><description>Microsoft Secure Score in daily operations: prioritization framework, formal remediation workflow, ISO 27001 and NIS2 control mapping, continuous monitoring, and audit evidence collection.</description></item><item><title>Defender P1: How Many Exist?</title><link>https://thecybersec.gr/posts/defender-demystified-series/defender-demystified-part-1-what-is-microsoft-defender/</link><pubDate>Mon, 18 May 2026 10:00:00 +0300</pubDate><guid>https://thecybersec.gr/posts/defender-demystified-series/defender-demystified-part-1-what-is-microsoft-defender/</guid><description>How many Microsoft Defender products are there? Which one do you actually need? A practitioner&amp;#39;s guide to the Microsoft Defender family, Endpoint, Office 365, Identity, Cloud Apps, XDR, and more. Written by a CISO for CISOs, IT managers, and security professionals navigating Microsoft 365 E5 licensing.</description></item></channel></rss>