Recent blog posts

Meet David Elliott: SBT’s Principal Defensive Content Engineer Forging Cybersecurity Mastery
Duncan Whitley 29/10/2025

Meet David Elliott: SBT’s Principal Defensive Content Engineer Forging Cybersecurity Mastery

Step into the world of David Elliott, Security Blue Team’s Principal Defensive Content Engineer, whose creative flair and technical expertise shape cutting-edge cybersecurity training. From building realistic scenarios to mentoring talent, David’s work strengthens SBT’s technical team, helping clients master cyber defences. Dive into his story, from RAF roots to...

Meet Alaina & Dora: SBT’s Creative Powerhouse Duo
Duncan Whitley 26/11/2025

Meet Alaina & Dora: SBT’s Creative Powerhouse Duo

Say hello to Alaina and Dora, the brilliant creative duo behind Security Blue Team’s distinctive look and feel. As our design team, they craft everything from course interfaces to BTLO illustrations, blending deep cybersecurity knowledge with serious artistic flair. Discover how they keep SBT’s cybersecurity training visually stunning yet brilliantly...

All posts

Forensics 101: Live Acquisition USB and Digital Triaging with Kape
Malik Girondin 09/12/2024

Forensics 101: Live Acquisition USB and Digital Triaging with Kape

Live acquisition is a computer forensics technique that involves collecting data from a running computer system, rather than one that is powered off or dormant. The goal is to capture volatile forensic data, such as that in the main memory (RAM) while minimizing any impact on the system’s integrity. This...

Command and Control Chaos
Aditya Rai 13/11/2024

Command and Control Chaos

A Command and Control, also known as a C2 or C&C server, is an essential tool for cybercriminals and hackers, acting as the central hub for managing and coordinating malicious activities such as data breaches, malware distribution, and cyberattacks.

Logging Windows file tampering attempts
John Jonusauskas 30/10/2024

Logging Windows file tampering attempts

Imagine you’re working in a company, and an insider threat tampers with a critical file, like a financial document or a system configuration file. If you don’t know who, when, or what was modified, you may not even realize something is wrong until it’s too late. This can lead to...

Cloud Security: A Defender's Perspective
Aditya Rai 16/10/2024

Cloud Security: A Defender's Perspective

Cloud security involves a broad set of policies, technologies, applications, and controls utilized to protect virtualized IP, data, applications, services, and the associated infrastructure of cloud computing.