Articles

Clear, practical insight on the topics shaping secure and regulated environments – from day-to-day delivery challenges to the frameworks and requirements that underpin them.

  • The AI Cyber Security Challenge

    The AI Cyber Security Challenge

    In all forms, function and application, technology has always been an ever-evolving landscape, but recent, more rapid advancements can only be described as groundbreaking. Emerging technologies like Artificial Intelligence (AI) have the potential to reshape industries and revolutionise our daily lives. However, the implications for cyber security cannot be overstated as these technologies present new…

    Read more: The AI Cyber Security Challenge
  • Getting Started with Secure by Design

    Getting Started with Secure by Design

    Secure by Design has been launched by the UK Government and is already creating a lot of noise by challenging existing security norms, especially in the Ministry of Defence (MOD) and more recently, the Central Digital and Data Office (CDDO).    Previously, we have explored what Secure by Design is and why it’s important to…

    Read more: Getting Started with Secure by Design
  • Supply chain security: Risky foundations!

    Supply chain security: Risky foundations!

    By Chris Giles, Principal Security Architect at Logiq. Written for and first published as part of techUK’s National Security Week 2024 Why is Supply Chain Security Important? Why is ‘Supply Chain Security’ important and is it really that difficult to deal with? When you break it down, it’s just about who supplies you with what, and the…

    Read more: Supply chain security: Risky foundations!
  • Cyber Security in Highly Regulated Sectors

    Cyber Security in Highly Regulated Sectors

    In the modern, digital age, where information and data are more critical to organisations than ever, the importance of cyber security cannot be overstated. Cyber threats have become a daily concern for businesses, governments, and individuals alike with the global average cost of a data breach in 2023 sat at $4.45 million. To safeguard sensitive…

    Read more: Cyber Security in Highly Regulated Sectors
  • Secure by Design – Continual Risk Management

    Secure by Design – Continual Risk Management

    Secure by Design is changing the way the Ministry of Defence (MOD), UK Government and its departments implement cyber security, in a move away from traditional accreditation-based compliance. This new approach aims to deliver better systems that are more secure, trustworthy, and resilient to cyber-attack. Here, we look why organisations should seek to go beyond…

    Read more: Secure by Design – Continual Risk Management
  • MOD Secure by Design – Cyber Risk Management

    MOD Secure by Design – Cyber Risk Management

    The launch of the Ministry of Defence’s (MOD) Secure by Design initiative, and the soon to be launched Cabinet Office initiative of the same name, should give rise to significant discussion, and pause for thought for everyone who works in these areas. This is not yet another new approach to security accreditation; it is a fundamental…

    Read more: MOD Secure by Design – Cyber Risk Management
  • What is Secure by Design?

    What is Secure by Design?

    Secure by Design – Managing Cyber Risk Secure by Design (SbD) is the UK Government approach to Cyber Security. Led by the Cabinet Office along with the Ministry of Defence (MOD), Secure by Design fundamentally changes the traditional accreditation model to one based on continual risk management and security design principles. Not just for security…

    Read more: What is Secure by Design?
  • Microsoft 365 Cyber Security

    Microsoft 365 Cyber Security

    As highlighted in a previous blog post, DISX® was created by Logiq Consulting to overcome the challenges of working at OFFICIAL-SENSITIVE as a defence supplier. At Logiq we believe that you can build better and more secure systems in the cloud. Therefore, we assessed the market and selected Microsoft 365 as the Software as a…

    Read more: Microsoft 365 Cyber Security
  • DISX – MOD RLI Secure Communications

    DISX – MOD RLI Secure Communications

    When Logiq Consulting was established in 2018 the team had an initial problem to overcome: How can we work at the OFFICIAL-SENSITIVE level without relying on Ministry of Defence (MOD)-Furnished ICT? The team drew together significant experience in designing secure networks specifically to meet the security standard required to hold HMG sensitive information. This set…

    Read more: DISX – MOD RLI Secure Communications
  • Cyber Tabletop

    Cyber Tabletop

    In a world where the cyber threat is constantly changing and evolving there is a need for organisations to monitor and assess how their systems can remain resilient. A very useful exercise that many organisations fail to conduct is a Cyber Tabletop workshop, a walkthrough exercise of their cyber security posture and response capability. What…

    Read more: Cyber Tabletop
  • What is Ransomware?

    What is Ransomware?

    The term ‘Ransomware’ has been in the News again recently following several high-profile cyber-attacks. This article introduces what Ransomware is, why it can be so devastating for those affected, and what can be done to reduce its impact. To reflect the devastating impact that ransomware can have, the National Cyber Security Centre (NCSC), as reported…

    Read more: What is Ransomware?
  • Secure Communications with MOD – An SME’s Solution

    Secure Communications with MOD – An SME’s Solution

    Understanding that collaborating with, communicating securely, and supplying deliverables into the MOD would be a key output, the challenge of utilising secure IT, accredited by the MOD for use at OFFICIAL-SENSITIVE, would be vital. How do you communicate and work at OFFICIAL-SENSITIVE without reliance on MOD equipment and infrastructure? As a company, we were keen…

    Read more: Secure Communications with MOD – An SME’s Solution