Technology blogs

Insights and guidance from our in-house experts and guest authors.

Resources banner technology
Power Bi Listing
Prism

Unlocking Value through Strategic Optimisation: A Trustmarque Perspective

13 December 2024
Barnet London Borough
Solutions

Optimise to Innovate – Streamline IT costs to drive innovation.

1 November 2024
Tm Blog Lisitpage Hybrid Cloud
Microsoft

How to control and manage hybrid cloud costs from day one

11 September 2024
Tm Blog Lisitpage
Microsoft

The true value of Copilot

29 August 2024
Trustmarque Navigating From VMWare To Microsoft Solutions
Microsoft

What are the benefits of CSP and what essential factors should be considered when selecting a CSP partner?

29 August 2024
Trustmarque Navigating A Move To The Public Cloud
Solutions

Navigating the Public Cloud in the Public Sector

7 August 2024
Trustmarque Navigating From VMWare To Microsoft Solutions
Microsoft

Navigating the transition from VMware or Hyper-V Solutions to Microsoft Cloud Solutions

30 July 2024
Trustmarque partners with Barracuda to deliver Prism
Microsoft

Trustmarque and Barracuda Join Forces to Optimise and Secure Microsoft 365 Investments

15 July 2024
Tm Blog Lisitpage Vmware
Solutions

VMware licensing is changing – What you need to know

28 January 2024
Tm Blog Lisitpage
Microsoft

Enabling businesses of all sizes to access the full potential of Copilot

17 January 2024
Iot For Uk Councils Listing
Data and analytics

Navigating challenges, embracing solutions: How IoT data paves the way for sustainable success

11 December 2023
Iot Listing Image
Data

How to unlock the Internet of Things’ potential for your business

7 December 2023
Adopting Microsoft Azure Listing
Azure

Adopting Microsoft Azure – Embracing Governance and Policy Practices for Effective Cloud Management

5 December 2023
Diversity Equality And Inclusion Listing
Customer Experience

Six tips for optimising license spend and avoiding audit risk

27 November 2023
Cyber security listing image
Cyber security

What is a Roast-in-the-Middle attack?

26 November 2023
Keberoasting
Cyber security

What is targeted Keberoasting?

24 November 2023
Azure Hybrid
Azure

Flexible datacentre infrastructure delivered as an Azure hybrid service

10 November 2023
On Time
Azure

Will you deliver what I’ve asked for on time, and on budget?

9 November 2023
Gantt Charts
Azure

Why Gantt charts are not beneficial in an Agile organisation

8 November 2023
Product Vision And Goals
Azure

Product vision and goals

7 November 2023
Power Bi Listing
Azure

Power Bi White Paper Adoption and Governance

16 October 2023
The three common concerns of cloud migration
Azure

The five common concerns of cloud migration

16 October 2023
The Anatomy Of An Infrastructure Penetration Test Listing
Cyber security

The anatomy of an Infrastructure Penetration Test

6 October 2023
Asreproasting Blog Social Card
Cyber security

ASREPRoasting

21 September 2023
Arden
Azure

ARDEN – The Perfect Platform to Leverage Cloud Innovation while Mitigating Risks

14 September 2023
Maximise The Value Of Your Hybrid Cloud Blog Listings
Azure

Managing hybrid cloud environments

8 September 2023
Data Warehouse Listing
Azure

The Data Warehouse is Dead, Long Live the Data Warehouse! – A Paradigm Shift in Modern Data Management

28 August 2023
Cloud Blog Listings Image
Azure

Six reasons to migrate to Microsoft Azure PaaS or SaaS in 2024

27 August 2023
Cyber Security
Cyber security

Vulnerability assessments: a must have for your cyber security

21 August 2023
Cyber Security Sase Social
Cyber security

Secure Access Service Edge (SASE)

17 August 2023
Data Warehouses
Azure

White Paper: Why Businesses Need to Look at Cloud-based Data Warehouses to Stay Competitive

20 July 2023
Cyber Listings Image 5
Cyber security

A guide to defending against Kerberoasting and what you can do

19 July 2023
Cyber Listings Image 4
Cyber security

Understanding Kerberos and cyber security

18 July 2023
Cyber Listings Image 3
Cyber security

Vulnerability assessments versus penetration testing

18 July 2023
Cyber Listings Image 2
Cyber security

Securing operational technology

17 July 2023
Cyber Listings Image 1
Cyber security

What is Ransomware protection?

17 July 2023
325x220px Acutest Banners
Acutest

Undetected bugs found in most software releases

17 July 2023
Integrated Agile
Azure

How we seamlessly integrated Agile into a former Waterfall team

4 June 2023
Hybrid Cloud
Azure

Single Pane of Glass – Maximising the Value of Your Hybrid Cloud

5 May 2023
Stream Mapping
Azure

Improve efficiency with Value Stream Mapping

2 April 2023
Ptsn Switch Off Blog Banner Thumbnail
Voice Network services

The big PSTN and ISDN switch off – what does it mean for you?

6 March 2023
Blog Webpage Banner 15 Thumbnail
Data

What is a data-driven NHS ‘war room’?

21 October 2022
How Can The Nhs Use Data And Ai Thumbnail
Data

How can the NHS use data and artificial intelligence (AI)?

26 September 2022
Proofpoint Blog Aug Thumbnail
Cyber security

Phishing: Stop spam emails and secure your cloud inbox

8 September 2022
Blog Webpage Banner 4 E1651238880210 Thumbnail
Cyber security

Cyber security for the public sector

6 April 2022

Subscribe to our newsletter