Recent blog posts

Meet David Elliott: SBT’s Principal Defensive Content Engineer Forging Cybersecurity Mastery
Duncan Whitley 29/10/2025

Meet David Elliott: SBT’s Principal Defensive Content Engineer Forging Cybersecurity Mastery

Step into the world of David Elliott, Security Blue Team’s Principal Defensive Content Engineer, whose creative flair and technical expertise shape cutting-edge cybersecurity training. From building realistic scenarios to mentoring talent, David’s work strengthens SBT’s technical team, helping clients master cyber defences. Dive into his story, from RAF roots to...

Meet Alaina & Dora: SBT’s Creative Powerhouse Duo
Duncan Whitley 26/11/2025

Meet Alaina & Dora: SBT’s Creative Powerhouse Duo

Say hello to Alaina and Dora, the brilliant creative duo behind Security Blue Team’s distinctive look and feel. As our design team, they craft everything from course interfaces to BTLO illustrations, blending deep cybersecurity knowledge with serious artistic flair. Discover how they keep SBT’s cybersecurity training visually stunning yet brilliantly...

All posts

Google Casts a New Spell: Introducing Magik(a)
Renmarc Andrada 07/06/2024

Google Casts a New Spell: Introducing Magik(a)

How often do we witness the blend of innovation and generosity in the tech world? Google's latest contribution to the open-source community, Magika, serves as a fascinating case study in this regard.

Forwarding Windows Logs to Syslog using NXLog Tool
John Jonusauskas 29/05/2024

Forwarding Windows Logs to Syslog using NXLog Tool

NXLog is an open-source, multi-platform log management tool designed to collect, process, and forward log messages. It can gather logs from various sources across the network, including systems, applications, and devices.

Unveiling Intelligence through Honeypots' Cyber Deception
Luis Suastegui 10/05/2024

Unveiling Intelligence through Honeypots' Cyber Deception

Honeypots are intriguing tools in cybersecurity, designed to attract cyber attackers and analyze their methods. We explore the two main types, as well as the pros and cons of using them as part of your security strategy.

Cloud Surfing: Riding the Waves of Google Drive Forensics
Renmarc Andrada 18/04/2024

Cloud Surfing: Riding the Waves of Google Drive Forensics

Given the complexity of obtaining and evaluating data from cloud services, cloud storage forensics is now recognized as a key component of digital investigations in today's digitally-dependent environment. Among them, Google Drive is an excellent choice for forensic investigation because of its extensive usage and the variety of data it...