Recent blog posts

How to Structure Your First 24 Hours in a Ransomware Attack
Duncan Whitley 14/10/2025

How to Structure Your First 24 Hours in a Ransomware Attack

The first 24 hours after a ransomware attack can determine how effectively your organization recovers. This guide walks through a structured hour-by-hour response plan, covering containment, negotiation preparation, first contact, and recovery. Learn how to maintain clarity, protect leverage, and minimize chaos when every decision counts.

The Human Side of Cybersecurity: Why Mental Health Matters
Reema Shah 10/10/2025

The Human Side of Cybersecurity: Why Mental Health Matters

Cybersecurity professionals face unique pressures: relentless threats, constant vigilance, and the emotional toll of protecting others. This blog explores how factors like burnout, alert fatigue, imposter syndrome, and isolation impact mental health, while offering strategies for resilience. It also introduces a free Security Blue Team course designed to help individuals...

All posts

Exploring Blue Team Roles & How to Get Started
Joshua Beaman 28/04/2025

Exploring Blue Team Roles & How to Get Started

There are a wide range of defensive cyber security, or "blue team", roles in our industry. In this blog post we'll introduce you to the following: SOC Analyst, Incident Responder, Malware Analyst, Threat Intelligence Analyst, Vulnerability Analyst, and Digital Forensics Analyst.

Faces of SBT: Meet Jake and Nathaniel, Our Sales Specialists
Duncan Whitley 01/04/2025

Faces of SBT: Meet Jake and Nathaniel, Our Sales Specialists

At Security Blue Team (SBT), our sales team connects prospective clients with top-tier cybersecurity training, and today we’re shining a light on two of our sales specialists, Jake Knight and Nathaniel Hutchinson.

The MacGyver Escape: How to Transfer Files from a Restricted Windows Computer
Luis Suastegui 26/03/2025

The MacGyver Escape: How to Transfer Files from a Restricted Windows Computer

Have you ever needed to transfer data from one computer to another but found yourself blocked by strict security policies? Perhaps you cannot connect any USB devices, most of your programs (including PowerShell and Command Prompt) are disabled, and internet access is heavily restricted.

Security Blue Team’s Global Connect: A Chilly Team Adventure in Lapland
Duncan Whitley 14/03/2025

Security Blue Team’s Global Connect: A Chilly Team Adventure in Lapland

Picture a team diving into a winter wonderland where snowmobiles hunt the Northern Lights, huskies charge through snowy trails, and drinks come in glasses chiseled from ice. That’s what SBT got up to during our annual Global Connect, a company get-together that took us from Stockholm to the icy wilds...