Recent blog posts

SOC Metrics for Finance: From Security Operations to Risk Insight and Business Impact
Catherine Southwick 28/04/2026

SOC Metrics for Finance: From Security Operations to Risk Insight and Business Impact

SOC metrics like alerts triaged and threats detected only tell part of the story, especially in financial services where performance is measured in risk, exposure, and business impact. This article explores how to reframe key metrics such as MTTR, containment time, and risk reduction to better align with financial outcomes,...

Locked Shield 26 | Supporting NATO on a multinational exercise
SBT Content Engineers 01/05/2026

Locked Shield 26 | Supporting NATO on a multinational exercise

Locked Shields is as close as it gets to a real-world cyber war without it actually happening. This post breaks down what it’s like to support NATO’s largest live-fire exercise, the scenarios we built, and what training at that scale really looks like when pressure, complexity, and realism all come...

All posts

How to Structure Your First 24 Hours in a Ransomware Attack
Duncan Whitley 14/10/2025

How to Structure Your First 24 Hours in a Ransomware Attack

The first 24 hours after a ransomware attack can determine how effectively your organization recovers. This guide walks through a structured hour-by-hour response plan, covering containment, negotiation preparation, first contact, and recovery. Learn how to maintain clarity, protect leverage, and minimize chaos when every decision counts.

The Human Side of Cybersecurity: Why Mental Health Matters
Reema Shah 10/10/2025

The Human Side of Cybersecurity: Why Mental Health Matters

Cybersecurity professionals face unique pressures: relentless threats, constant vigilance, and the emotional toll of protecting others. This blog explores how factors like burnout, alert fatigue, imposter syndrome, and isolation impact mental health, while offering strategies for resilience. It also introduces a free Security Blue Team course designed to help individuals...

Getting Your Data House in Order: Telemetry Strategy for Effective Detections | Part 1
SBT Content Engineers 08/10/2025

Getting Your Data House in Order: Telemetry Strategy for Effective Detections | Part 1

When a security incident hits, missing or messy telemetry can cripple detection and response. Many SOC teams either drown in irrelevant logs or lack the critical events that reveal attacker behavior. This blog outlines how to build a focused telemetry strategy, one that balances cost with coverage, ensures high-quality data,...

Recognition from Our Customers: New G2 Badges for Security Blue Team
Duncan Whitley 29/09/2025

Recognition from Our Customers: New G2 Badges for Security Blue Team

Security Blue Team has been recognised with three new G2 badges, earned directly through the feedback of our customers. From learners starting their cybersecurity journey to SOC leaders building stronger teams, these reviews reflect the practical, career-focused impact of our certifications and hands-on labs across the globe.

Meet Reema Shah: SBT’s Social Media Manager
Duncan Whitley 26/09/2025

Meet Reema Shah: SBT’s Social Media Manager

Get to know Reema Shah, Security Blue Team’s Social Media & Community Manager, who brings creativity and connection to our marketing team. From crafting engaging content to fostering an inclusive culture, Reema’s passion shines through in everything she does. Learn about her role, background, and ambitions in this spotlight, showcasing...