Recent blog posts

Faces of SBT: Meet Millie, Head of Product
Duncan Whitley 29/08/2025

Faces of SBT: Meet Millie, Head of Product

Get to know Millie Gilham, Security Blue Team’s Head of Product, who drives innovation in cybersecurity training with empathy and strategy. From shaping intuitive platforms to championing neurodiversity, Millie’s leadership ensures impactful learning experiences. Learn about her role, passion for SBT’s mission, and what fuels her outside the office in...

Announcing Security Blue Team's New Junior Detection Engineering Certification
Melissa Boyle 09/09/2025

Announcing Security Blue Team's New Junior Detection Engineering Certification

We're excited to share that we have just released our fourth certification. With very few detection-specific certifications available, the Certified Junior Detection Engineer (CJDE) fills a critical gap, offering practical, industry-aligned training that teaches students the art of modern detection and threat response.

All posts

Faces of SBT: Trevor, Director of Cloud Services
Melissa Boyle 22/01/2025

Faces of SBT: Trevor, Director of Cloud Services

Welcome to our first Faces of SBT blog post, where we’ll be showcasing a member of our team and giving you a behind-the-scenes look at what it’s like to work at SBT. First up is Trevor, our Director of Cloud Services.

SBT Wrapped: A Year in Stats
Melissa Boyle 18/12/2024

SBT Wrapped: A Year in Stats

Welcome to the very first SBT Wrapped, where we’ll be sharing some stats from the past year.

Forensics 101: Live Acquisition USB and Digital Triaging with Kape
Malik Girondin 09/12/2024

Forensics 101: Live Acquisition USB and Digital Triaging with Kape

Live acquisition is a computer forensics technique that involves collecting data from a running computer system, rather than one that is powered off or dormant. The goal is to capture volatile forensic data, such as that in the main memory (RAM) while minimizing any impact on the system’s integrity. This...

Command and Control Chaos
Aditya Rai 13/11/2024

Command and Control Chaos

A Command and Control, also known as a C2 or C&C server, is an essential tool for cybercriminals and hackers, acting as the central hub for managing and coordinating malicious activities such as data breaches, malware distribution, and cyberattacks.