-

|
Simplifying Secure Collaboration for MOD Contractors
Read more: Simplifying Secure Collaboration for MOD ContractorsAt a glance, defence projects may appear seamless; multiple organisations working together, each contributing their expertise to deliver advanced capabilities for the Ministry of Defence (MOD). The reality, however, is that collaboration in the defence sector is anything but simple. Consider; a small defence contractor preparing a bid submission for a high-value MOD contract. The…
-

|
Why Defence Needs Secure ITSM
Read more: Why Defence Needs Secure ITSMManaging IT services in the defence sector comes with a unique set of challenges. Unlike in commercial businesses, where IT failures might result in financial loss or reputational damage, in defence, the stakes are far higher. Worst case scenario: disruption that jeopardises operations and ultimately risks lives. To keep these services and systems running efficiently…
-

|
Cyber Security Risk Management in the Public Sector
Read more: Cyber Security Risk Management in the Public SectorCyber security within government organisations is fundamental to national resilience. The public sector handles vast amounts of highly sensitive information, ranging from personal data to classified intelligence, making it a prime target for cyber threats. Effectively managing cyber risks thus requires a socio-technical approach considering the people and processes, as well as the technology used.…
-

|
Why Defence Suppliers Need a Managed Security Service
Read more: Why Defence Suppliers Need a Managed Security ServiceWhen a mid-sized defence supplier landed its first direct contract with the Ministry of Defence (MOD), the leadership team knew security was a priority. They had an IT team in place, firewalls installed, and a cyber awareness programme for employees. On paper, they believed they were covered. Then came the hard truth. As part of…
-

|
Secure by Design vs. Security Control Sets
Read more: Secure by Design vs. Security Control SetsA Comparison through Simon Sinek’s ‘Start with Why’ Philosophy In cyber security, the concept of Secure by Design is often seen to clash with the traditional security approach of applying security control sets, such as NIST SP 800-53. Here we compare these two approaches using Simon Sinek’s influential idea of “Start with Why.” Sinek’s philosophy…
-

|
Rethinking Secure by Design: Key Questions to Enhance Cyber Security
Read more: Rethinking Secure by Design: Key Questions to Enhance Cyber SecurityA recent letter sent to all defence industry CEOs focused on driving cyber resilience in supply chains, is a stark reminder that in challenging times it is of upmost importance that the systems we rely on remain safe and secure. Within the letter, Ministry of Defence officials—the Second Permanent Secretary, DG Chief Information Officer and…
-

|
Understanding the MOD’s Cyber Security Model v4
Read more: Understanding the MOD’s Cyber Security Model v4Article first published 20/01/2025 and updated 18/07/2025 The Ministry of Defence (MOD) recently introduced version 4 of its Cyber Security Model (CSMv4), an update designed to enhance the cyber resilience of its supply chain. The Cyber Security Model v4 framework embeds a comprehensive approach to organisational resilience, requiring proportionate measures based on risk and reflects…
-

|
Optimisation and Transformation: The Path to Success
Read more: Optimisation and Transformation: The Path to SuccessOptimisation isn’t just about minor tweaks; it’s about driving continuous improvement through small, strategic changes that deliver true business value. By tackling real challenges incrementally, optimisation achieves transformative benefits whilst realising value early and delivering sustainable improvements. True value lies in a balanced approach: driving continuous optimisation to ensure operations keep improving and delivering impactful…
-

|
Logiq Awarded MoD Secure by Design Contract
Read more: Logiq Awarded MoD Secure by Design ContractBristol, UK – 12 November 2024 – Logiq, a leading UK information and cyber security consultancy has announced it has successfully secured the contract as the Secure by Design (SbD) implementation partner with the Ministry of Defence (MoD) Cyber Resilience Programme (CRP) for the next 12 months. This contract award allows for a continuation of…
-

|
Bridging the Divide: The Convergence of IT and OT in Cyber Security
Read more: Bridging the Divide: The Convergence of IT and OT in Cyber SecurityGuest blog by Matthew Mackay, Security Practice Lead at Logiq. Written for and first published on techUK. Over the last decade, we have witnessed the convergence of Information Technology (IT) and Operational Technology (OT), a shift often linked to Industry 4.0 or the Fourth Industrial Revolution. This integration offers significant benefits, such as enhanced connectivity between…
