-

SaaS or Self-Hosted: What’s the right ServiceNow strategy for your organisation?
|
Read more: SaaS or Self-Hosted: What’s the right ServiceNow strategy for your organisation?ServiceNow has become the go-to platform for organisations seeking to streamline workflows, automate service delivery and drive digital transformation. With its extensive capabilities, the platform presents huge value opportunities but also requires a key consideration – the deployment strategy. Does the organisation and associated infrastructure require a conventional, vendor-hosted SaaS solution or a self-hosted instance?…
-

Defence Cyber Certification: Aligning Risk Profiles with Real Assurance
|
Read more: Defence Cyber Certification: Aligning Risk Profiles with Real AssuranceIn a previous article, we explored the MOD’s Cyber Security Model version 4 (CSMv4), the framework that introduced structured risk profiles to assess the cyber requirements of defence contracts. Now, we turn our attention to what comes next: Defence Cyber Certification (DCC), the formal mechanism that ensures Defence Suppliers meet the resilience standards required across…
-

Logiq Achieves Silver Award in Defence Employer Recognition Scheme
|
Read more: Logiq Achieves Silver Award in Defence Employer Recognition SchemeWe’re proud to announce that Logiq has been awarded the Silver Award under the Ministry of Defence’s Employer Recognition Scheme (ERS), marking another significant milestone in our ongoing commitment to supporting the UK’s Armed Forces community. This achievement comes just months after we were recognised with the Bronze Award in Q1 2025, demonstrating our continued…
-

The True Cost of a Cyber Attack on the Defence Supply Chain
|
Read more: The True Cost of a Cyber Attack on the Defence Supply ChainIn early 2022, a well-regarded UK defence contractor found itself at the centre of a cyber security storm. The company, an SME and key supplier of engineering components for Ministry of Defence (MOD) projects, had built its reputation on precision, reliability, and discretion. But that reputation was shattered almost overnight when a cyber-attack exposed confidential…
-

How ServiceNow ITSM Transforms Defence Services
|
Read more: How ServiceNow ITSM Transforms Defence ServicesManaging IT services in the defence sector is an unique and often highly complex challenge. Unlike commercial enterprises, where IT disruptions might cause financial setbacks or inconvenience, in defence, an inefficient IT service can compromise national security and expose sensitive data to cyber threats. The ability to maintain seamless, secure and highly responsive IT services…
-

Simplifying Secure Collaboration for MOD Contractors
|
Read more: Simplifying Secure Collaboration for MOD ContractorsAt a glance, defence projects may appear seamless; multiple organisations working together, each contributing their expertise to deliver advanced capabilities for the Ministry of Defence (MOD). The reality, however, is that collaboration in the defence sector is anything but simple. Consider; a small defence contractor preparing a bid submission for a high-value MOD contract. The…
-

Why Defence Needs Secure ITSM
|
Read more: Why Defence Needs Secure ITSMManaging IT services in the defence sector comes with a unique set of challenges. Unlike in commercial businesses, where IT failures might result in financial loss or reputational damage, in defence, the stakes are far higher. Worst case scenario: disruption that jeopardises operations and ultimately risks lives. To keep these services and systems running efficiently…
-

Cyber Security Risk Management in the Public Sector
|
Read more: Cyber Security Risk Management in the Public SectorCyber security within government organisations is fundamental to national resilience. The public sector handles vast amounts of highly sensitive information, ranging from personal data to classified intelligence, making it a prime target for cyber threats. Effectively managing cyber risks thus requires a socio-technical approach considering the people and processes, as well as the technology used.…
-

Why Defence Suppliers Need a Managed Security Service
|
Read more: Why Defence Suppliers Need a Managed Security ServiceWhen a mid-sized defence supplier landed its first direct contract with the Ministry of Defence (MOD), the leadership team knew security was a priority. They had an IT team in place, firewalls installed, and a cyber awareness programme for employees. On paper, they believed they were covered. Then came the hard truth. As part of…
-

Secure by Design vs. Security Control Sets
|
Read more: Secure by Design vs. Security Control SetsA Comparison through Simon Sinek’s ‘Start with Why’ Philosophy In cyber security, the concept of Secure by Design is often seen to clash with the traditional security approach of applying security control sets, such as NIST SP 800-53. Here we compare these two approaches using Simon Sinek’s influential idea of “Start with Why.” Sinek’s philosophy…
-

Rethinking Secure by Design: Key Questions to Enhance Cyber Security
|
Read more: Rethinking Secure by Design: Key Questions to Enhance Cyber SecurityA recent letter sent to all defence industry CEOs focused on driving cyber resilience in supply chains, is a stark reminder that in challenging times it is of upmost importance that the systems we rely on remain safe and secure. Within the letter, Ministry of Defence officials—the Second Permanent Secretary, DG Chief Information Officer and…
-

Understanding the MOD’s Cyber Security Model v4
|
Read more: Understanding the MOD’s Cyber Security Model v4Article first published 20/01/2025 and updated 18/07/2025 The Ministry of Defence (MOD) recently introduced version 4 of its Cyber Security Model (CSMv4), an update designed to enhance the cyber resilience of its supply chain. The Cyber Security Model v4 framework embeds a comprehensive approach to organisational resilience, requiring proportionate measures based on risk and reflects…
