Blog

Thought leadership pieces from knowledgeable members of Team Transparity.

How leading awarding organisation Lantra have transformed their remote working and strengthened their security posture with Microsoft and Transparity.

Operational Technology (OT) when left unsecured can create the perfect back door for hackers to gain access to your environment.

This blog post explores the benefits of moving to Azure AD B2C as your identity platform and how it can streamline your identity management processes.

BYOD or Bring Your Own Device can leave significant gaps and vulnerabilities in your security, here's how to stay secure.

What is Azure Virtual Desktop? Previously known as Windows Virtual Desktop, Azure Virtual Desktop (AVD) is a Desktop and App

Recent research brought to light a security risk within Azure Functions storage accounts with key-based access, so here we explore how to configure Azure Functions with managed identity for storage access.

MFA push bombing is on the rise, using social engineering to attack and infiltrate systems. Here's how it works and what you can do about it.

Multifactor Authentication is essential to your cybersecurity. Here are three reasons you should start using MFA to protect your business.

Transparity has guided a number of projects successfully through the GDS service assessment pathway - taking services from proposal, through alpha and beta assessments, and on towards delivery and production. We have much knowledge, experience and expertise to share.

Ready to get started? Book a free consultation

Book a complimentary, 60-minute consultation with a Transparity expert

Simply fill in your details below and one of our technical experts will be in touch to arrange your consultation.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Skip to content