Category: Article

  • Simplifying Secure Collaboration for MOD Contractors

    Simplifying Secure Collaboration for MOD Contractors

    At a glance, defence projects may appear seamless; multiple organisations working together, each contributing their expertise to deliver advanced capabilities for the Ministry of Defence (MOD). The reality, however, is that collaboration in the defence sector is anything but simple. Consider; a small defence contractor preparing a bid submission for a high-value MOD contract. The…

  • Why Defence Needs Secure ITSM

    Why Defence Needs Secure ITSM

    Managing IT services in the defence sector comes with a unique set of challenges. Unlike in commercial businesses, where IT failures might result in financial loss or reputational damage, in defence, the stakes are far higher. Worst case scenario: disruption that jeopardises operations and ultimately risks lives. To keep these services and systems running efficiently…

  • Cyber Security Risk Management in the Public Sector

    Cyber Security Risk Management in the Public Sector

    Cyber security within government organisations is fundamental to national resilience. The public sector handles vast amounts of highly sensitive information, ranging from personal data to classified intelligence, making it a prime target for cyber threats. Effectively managing cyber risks thus requires a socio-technical approach considering the people and processes, as well as the technology used.…

  • Why Defence Suppliers Need a Managed Security Service

    Why Defence Suppliers Need a Managed Security Service

    When a mid-sized defence supplier landed its first direct contract with the Ministry of Defence (MOD), the leadership team knew security was a priority. They had an IT team in place, firewalls installed, and a cyber awareness programme for employees. On paper, they believed they were covered. Then came the hard truth. As part of…

  • Secure by Design vs. Security Control Sets

    Secure by Design vs. Security Control Sets

    A Comparison through Simon Sinek’s ‘Start with Why’ Philosophy In cyber security, the concept of Secure by Design is often seen to clash with the traditional security approach of applying security control sets, such as NIST SP 800-53. Here we compare these two approaches using Simon Sinek’s influential idea of “Start with Why.” Sinek’s philosophy…

  • Rethinking Secure by Design: Key Questions to Enhance Cyber Security

    Rethinking Secure by Design: Key Questions to Enhance Cyber Security

    A recent letter sent to all defence industry CEOs focused on driving cyber resilience in supply chains, is a stark reminder that in challenging times it is of upmost importance that the systems we rely on remain safe and secure. Within the letter, Ministry of Defence officials—the Second Permanent Secretary, DG Chief Information Officer and…

  • Understanding the MOD’s Cyber Security Model v4

    Understanding the MOD’s Cyber Security Model v4

    Article first published 20/01/2025 and updated 18/07/2025 The Ministry of Defence (MOD) recently introduced version 4 of its Cyber Security Model (CSMv4), an update designed to enhance the cyber resilience of its supply chain. The Cyber Security Model v4 framework embeds a comprehensive approach to organisational resilience, requiring proportionate measures based on risk and reflects…

  • Optimisation and Transformation: The Path to Success

    Optimisation and Transformation: The Path to Success

    Optimisation isn’t just about minor tweaks; it’s about driving continuous improvement through small, strategic changes that deliver true business value. By tackling real challenges incrementally, optimisation achieves transformative benefits whilst realising value early and delivering sustainable improvements. True value lies in a balanced approach: driving continuous optimisation to ensure operations keep improving and delivering impactful…

  • Bridging the Divide: The Convergence of IT and OT in Cyber Security

    Bridging the Divide: The Convergence of IT and OT in Cyber Security

    By Matthew Mackay, Security Practice Lead at Logiq. Written for and first published on techUK. Over the last decade, we have witnessed the convergence of Information Technology (IT) and Operational Technology (OT), a shift often linked to Industry 4.0 or the Fourth Industrial Revolution. This integration offers significant benefits, such as enhanced connectivity between systems, but…

  • What is Secure Application Hosting?

    What is Secure Application Hosting?

    As organisations increasingly rely on complex applications to drive their operations, the need for secure and reliable hosting solutions has become paramount. This is especially true for industries handling sensitive data, such as government, defence, and civil nuclear sectors. Secure application hosting emerges as a crucial service, ensuring that critical applications run smoothly while maintaining…