Recent blog posts

Security Blue Team’s Global Connect: A Chilly Team Adventure in Lapland
Duncan Whitley 14/03/2025

Security Blue Team’s Global Connect: A Chilly Team Adventure in Lapland

Picture a team diving into a winter wonderland where snowmobiles hunt the Northern Lights, huskies charge through snowy trails, and drinks come in glasses chiseled from ice. That’s what SBT got up to during our annual Global Connect, a company get-together that took us from Stockholm to the icy wilds...

All posts

Harness the Power of Scripting: Why PowerShell is a MUST in Cybersecurity!
Malik Girondin 17/07/2024

Harness the Power of Scripting: Why PowerShell is a MUST in Cybersecurity!

In this article, we will explore the thought of utilizing PowerShell in cybersecurity. Is it a MUST or a bust? Before you jump to a conclusion, please, read the information provided in this blog. Then, truly, you can determine if this is for you or not. Let’s dive right into...

Splunk-tacular: Your Guide to Easy Log Analysis
Joshua Beaman 27/06/2024

Splunk-tacular: Your Guide to Easy Log Analysis

Are you seeking resources to understand and make the best use of Splunk? Well, you are at the right place. This blog aims to guide you through the essentials of Splunk, including the practical use of Search Processing Language (SPL queries).

Google Casts a New Spell: Introducing Magik(a)
Renmarc Andrada 07/06/2024

Google Casts a New Spell: Introducing Magik(a)

How often do we witness the blend of innovation and generosity in the tech world? Google's latest contribution to the open-source community, Magika, serves as a fascinating case study in this regard.