Recent blog posts

Meet David Elliott: SBT’s Principal Defensive Content Engineer Forging Cybersecurity Mastery
Duncan Whitley 29/10/2025

Meet David Elliott: SBT’s Principal Defensive Content Engineer Forging Cybersecurity Mastery

Step into the world of David Elliott, Security Blue Team’s Principal Defensive Content Engineer, whose creative flair and technical expertise shape cutting-edge cybersecurity training. From building realistic scenarios to mentoring talent, David’s work strengthens SBT’s technical team, helping clients master cyber defences. Dive into his story, from RAF roots to...

The Human Side of Cybersecurity: Why Mental Health Matters
Reema Shah 10/10/2025

The Human Side of Cybersecurity: Why Mental Health Matters

Cybersecurity professionals face unique pressures: relentless threats, constant vigilance, and the emotional toll of protecting others. This blog explores how factors like burnout, alert fatigue, imposter syndrome, and isolation impact mental health, while offering strategies for resilience. It also introduces a free Security Blue Team course designed to help individuals...

All posts

Faces of SBT: Trevor, Director of Cloud Services
Melissa Boyle 22/01/2025

Faces of SBT: Trevor, Director of Cloud Services

Welcome to our first Faces of SBT blog post, where we’ll be showcasing a member of our team and giving you a behind-the-scenes look at what it’s like to work at SBT. First up is Trevor, our Director of Cloud Services.

SBT Wrapped: A Year in Stats
Melissa Boyle 18/12/2024

SBT Wrapped: A Year in Stats

Welcome to the very first SBT Wrapped, where we’ll be sharing some stats from the past year.

Forensics 101: Live Acquisition USB and Digital Triaging with Kape
Malik Girondin 09/12/2024

Forensics 101: Live Acquisition USB and Digital Triaging with Kape

Live acquisition is a computer forensics technique that involves collecting data from a running computer system, rather than one that is powered off or dormant. The goal is to capture volatile forensic data, such as that in the main memory (RAM) while minimizing any impact on the system’s integrity. This...