Articles
Clear, practical insight on the topics shaping secure and regulated environments – from day-to-day delivery challenges to the frameworks and requirements that underpin them.
-

Secure by Design vs. Security Control Sets
|
Read more: Secure by Design vs. Security Control SetsA Comparison through Simon Sinek’s ‘Start with Why’ Philosophy In cyber security, the concept of Secure by Design is often seen to clash with the traditional security approach of applying security control sets, such as NIST SP 800-53. Here we compare these two approaches using Simon Sinek’s influential idea of “Start with Why.” Sinek’s philosophy…
-

Rethinking Secure by Design: Key Questions to Enhance Cyber Security
|
Read more: Rethinking Secure by Design: Key Questions to Enhance Cyber SecurityA recent letter sent to all defence industry CEOs focused on driving cyber resilience in supply chains, is a stark reminder that in challenging times it is of upmost importance that the systems we rely on remain safe and secure. Within the letter, Ministry of Defence officials—the Second Permanent Secretary, DG Chief Information Officer and…
-

Understanding the MOD’s Cyber Security Model v4
|
Read more: Understanding the MOD’s Cyber Security Model v4Article first published 20/01/2025 and updated 18/07/2025 The Ministry of Defence (MOD) recently introduced version 4 of its Cyber Security Model (CSMv4), an update designed to enhance the cyber resilience of its supply chain. The Cyber Security Model v4 framework embeds a comprehensive approach to organisational resilience, requiring proportionate measures based on risk and reflects…
-

Optimisation and Transformation: The Path to Success
|
Read more: Optimisation and Transformation: The Path to SuccessOptimisation isn’t just about minor tweaks; it’s about driving continuous improvement through small, strategic changes that deliver true business value. By tackling real challenges incrementally, optimisation achieves transformative benefits whilst realising value early and delivering sustainable improvements. True value lies in a balanced approach: driving continuous optimisation to ensure operations keep improving and delivering impactful…
-

Bridging the Divide: The Convergence of IT and OT in Cyber Security
|
Read more: Bridging the Divide: The Convergence of IT and OT in Cyber SecurityBy Matthew Mackay, Security Practice Lead at Logiq. Written for and first published on techUK. Over the last decade, we have witnessed the convergence of Information Technology (IT) and Operational Technology (OT), a shift often linked to Industry 4.0 or the Fourth Industrial Revolution. This integration offers significant benefits, such as enhanced connectivity between systems, but…
-

What is Secure Application Hosting?
|
Read more: What is Secure Application Hosting?As organisations increasingly rely on complex applications to drive their operations, the need for secure and reliable hosting solutions has become paramount. This is especially true for industries handling sensitive data, such as government, defence, and civil nuclear sectors. Secure application hosting emerges as a crucial service, ensuring that critical applications run smoothly while maintaining…
-

DISX – Built for Security, Optimised for Productivity
|
Read more: DISX – Built for Security, Optimised for ProductivityDISX is a leading, accredited secure managed service specifically designed for public sector organisations and associated supply chain contractors that handle OFFICIAL-SENSITIVE data. Built on the robust infrastructure of Microsoft 365 (M365) applications, DISX seamlessly integrates top-tier security with industry-leading productivity tools and offers end-to-end encryption for data both at rest and in transit, ensuring…
-

Understanding Secure Managed Services
|
Read more: Understanding Secure Managed ServicesDriven in part by emerging technologies and automation, cyber threats are increasingly sophisticated and frequent, meaning organisations must prioritise security across all aspects of their operations. For regulated organisations such as government, defence, civil nuclear and finance—organisations in either public or private sectors—handling sensitive information requires not just secure practices but also reliable, efficient systems.…
-

The Future of Cyber Security – Continual Risk Management
|
Read more: The Future of Cyber Security – Continual Risk ManagementArticle by Rob Guegan, Principal Consultant and Logiq co-founder. Written for and first published in Network Security (March 2024, Issue 3) Increased digitisation and connectivity have led to a surge in the frequency and sophistication of cyber threats, and it has become a major concern for all organisations. This includes complex global businesses, supply chain…
-

Understanding the Secure by Design Principles
|
Read more: Understanding the Secure by Design PrinciplesTraditionally, “successful” cyber security approaches and implementation have been evidenced by attaining accreditation. This method, however, enables cyber security to be viewed as a bolt-on aspect or an afterthought in system design. Secure by Design, the MOD’s new approach to cyber risk management, advocates for a more holistic approach, integrating cyber security risk management into…
-

Delivering Government Information Assurance
|
Read more: Delivering Government Information AssuranceTo function efficiently and provide essential services to the population, governments rely heavily on technology, but as key public sector departments increasingly depend on digital systems to store, transmit, and process sensitive information, the importance of Information Assurance (IA) in government becomes ever greater. Here we examine the critical role information assurance plays in safeguarding…
-

DEFCON 658 – Securing the Defence Supply Chain
|
Read more: DEFCON 658 – Securing the Defence Supply ChainMuch more than a buzzword, cyber security is a huge concern for all corners of business and organisations, from SMEs to governments and beyond. The Ministry of Defence (MOD) is no exception. Recognising the importance of protecting sensitive information, particularly while communicating with partner companies outside of the military institution’s own boundaries – the vendors…
