An in-depth evaluation of the Microsoft 365 threat landscape Some areas of this posting are sourced from: www.itpro.co.uk