Recent blog posts

Meet Alaina & Dora: SBT’s Creative Powerhouse Duo
Duncan Whitley 26/11/2025

Meet Alaina & Dora: SBT’s Creative Powerhouse Duo

Say hello to Alaina and Dora, the brilliant creative duo behind Security Blue Team’s distinctive look and feel. As our design team, they craft everything from course interfaces to BTLO illustrations, blending deep cybersecurity knowledge with serious artistic flair. Discover how they keep SBT’s cybersecurity training visually stunning yet brilliantly...

Celebrating Two Years of Impact: CyberGirls Fellowship Success Stories with Security Blue Team and CyberSafe Foundation
Duncan Whitley 27/11/2025

Celebrating Two Years of Impact: CyberGirls Fellowship Success Stories with Security Blue Team and CyberSafe Foundation

Two years after Security Blue Team partnered with CyberSafe Foundation’s CyberGirls Fellowship, the program’s impact shines through inspiring graduate stories and global recognition. Empowering young women with tuition-free cybersecurity training, mentorship, and internships, CyberGirls is transforming lives and promoting gender diversity in tech. Celebrated by the World Bank as a...

All posts

Celebrating Two Years of Impact: CyberGirls Fellowship Success Stories with Security Blue Team and CyberSafe Foundation
Duncan Whitley 27/11/2025

Celebrating Two Years of Impact: CyberGirls Fellowship Success Stories with Security Blue Team and CyberSafe Foundation

Two years after Security Blue Team partnered with CyberSafe Foundation’s CyberGirls Fellowship, the program’s impact shines through inspiring graduate stories and global recognition. Empowering young women with tuition-free cybersecurity training, mentorship, and internships, CyberGirls is transforming lives and promoting gender diversity in tech. Celebrated by the World Bank as a...

Meet Alaina & Dora: SBT’s Creative Powerhouse Duo
Duncan Whitley 26/11/2025

Meet Alaina & Dora: SBT’s Creative Powerhouse Duo

Say hello to Alaina and Dora, the brilliant creative duo behind Security Blue Team’s distinctive look and feel. As our design team, they craft everything from course interfaces to BTLO illustrations, blending deep cybersecurity knowledge with serious artistic flair. Discover how they keep SBT’s cybersecurity training visually stunning yet brilliantly...

Meet David Elliott: SBT’s Principal Defensive Content Engineer Forging Cybersecurity Mastery
Duncan Whitley 29/10/2025

Meet David Elliott: SBT’s Principal Defensive Content Engineer Forging Cybersecurity Mastery

Step into the world of David Elliott, Security Blue Team’s Principal Defensive Content Engineer, whose creative flair and technical expertise shape cutting-edge cybersecurity training. From building realistic scenarios to mentoring talent, David’s work strengthens SBT’s technical team, helping clients master cyber defences. Dive into his story, from RAF roots to...

How to Structure Your First 24 Hours in a Ransomware Attack
Duncan Whitley 14/10/2025

How to Structure Your First 24 Hours in a Ransomware Attack

The first 24 hours after a ransomware attack can determine how effectively your organization recovers. This guide walks through a structured hour-by-hour response plan, covering containment, negotiation preparation, first contact, and recovery. Learn how to maintain clarity, protect leverage, and minimize chaos when every decision counts.

The Human Side of Cybersecurity: Why Mental Health Matters
Reema Shah 10/10/2025

The Human Side of Cybersecurity: Why Mental Health Matters

Cybersecurity professionals face unique pressures: relentless threats, constant vigilance, and the emotional toll of protecting others. This blog explores how factors like burnout, alert fatigue, imposter syndrome, and isolation impact mental health, while offering strategies for resilience. It also introduces a free Security Blue Team course designed to help individuals...

Getting Your Data House in Order: Telemetry Strategy for Effective Detections | Part 1
SBT Content Engineers 08/10/2025

Getting Your Data House in Order: Telemetry Strategy for Effective Detections | Part 1

When a security incident hits, missing or messy telemetry can cripple detection and response. Many SOC teams either drown in irrelevant logs or lack the critical events that reveal attacker behavior. This blog outlines how to build a focused telemetry strategy, one that balances cost with coverage, ensures high-quality data,...