Recent blog posts

Getting Your Data House in Order: Telemetry Strategy for Effective Detections | Part 1
SBT Content Engineers 08/10/2025

Getting Your Data House in Order: Telemetry Strategy for Effective Detections | Part 1

When a security incident hits, missing or messy telemetry can cripple detection and response. Many SOC teams either drown in irrelevant logs or lack the critical events that reveal attacker behavior. This blog outlines how to build a focused telemetry strategy, one that balances cost with coverage, ensures high-quality data,...

The Human Side of Cybersecurity: Why Mental Health Matters
Reema Shah 10/10/2025

The Human Side of Cybersecurity: Why Mental Health Matters

Cybersecurity professionals face unique pressures: relentless threats, constant vigilance, and the emotional toll of protecting others. This blog explores how factors like burnout, alert fatigue, imposter syndrome, and isolation impact mental health, while offering strategies for resilience. It also introduces a free Security Blue Team course designed to help individuals...

All posts

Journey Through Time: Exploring the Evolution of CVSS Over the Years
Joshua Beaman 22/02/2024

Journey Through Time: Exploring the Evolution of CVSS Over the Years

CVSS, or Common Vulnerability Scoring System, is a standardized framework used to assess and communicate the severity of software vulnerabilities. It provides a numerical score representing the vulnerability’s potential impact, helping security professionals and organizations prioritize their responses to different security threats.

Cracking the Code: Exploring the Power of CVSS 4.0
Joshua Beaman 22/02/2024

Cracking the Code: Exploring the Power of CVSS 4.0

The Common Vulnerability Scoring System (CVSS) is a standardized framework used to assess and quantify the severity of security vulnerabilities in software or systems. Version 4.0 of CVSS was officially released on November 1, 2023, by FIRST.

ChatGPT for Offensive and Defensive Cybersecurity
Melissa Boyle 21/02/2024

ChatGPT for Offensive and Defensive Cybersecurity

There has been a lot of talk recently about ChatGPT and its implications for a wide range of industries. Potential applications are vast, including creative design, technical writing, and programming. In this article, we will explore some of the potential applications within the realm of cybersecurity — as well as...

Lace Tempest: SysAid On-Prem Software CVE-2023–47246 Vulnerability
Joshua Beaman 21/02/2024

Lace Tempest: SysAid On-Prem Software CVE-2023–47246 Vulnerability

In this blog post, we’ll investigate the fascinating details regarding CVE-2023–47246 SysAid On-Prem Software Vulnerability and uncover how attackers are compromising endpoints. This blog will also discuss how Lace Tempest weaponizes GraceWire Loader or Turtle Loader, and how to recognize the indicators of compromise (IOCs) from active exploitation.