Recent blog posts

What I Wish I’d Known Before My First SOC Role
Tati Laskivska 16/01/2026

What I Wish I’d Known Before My First SOC Role

Starting your first SOC role can feel overwhelming, even with prior training and labs behind you. This blog breaks down the realities of day-to-day SOC work, from alerts that arrive with little context to investigations that rarely end with clean answers. It highlights why judgement, documentation, and communication matter as...

5 Ways Ransomware Training Boosts Your Career
Tati Laskivska 05/01/2026

5 Ways Ransomware Training Boosts Your Career

Ransomware training helps cybersecurity professionals move beyond technical response to become trusted contributors during high-pressure incidents. By understanding attacker behavior, business impact, negotiation dynamics, and the full incident lifecycle, practitioners gain credibility across technical, legal, and executive teams. This practical, real-world knowledge builds confidence, expands career options across multiple security...

All posts

SBT Wrapped: A Year in Stats
Melissa Boyle 18/12/2024

SBT Wrapped: A Year in Stats

Welcome to the very first SBT Wrapped, where we’ll be sharing some stats from the past year.

Forensics 101: Live Acquisition USB and Digital Triaging with Kape
Malik Girondin 09/12/2024

Forensics 101: Live Acquisition USB and Digital Triaging with Kape

Live acquisition is a computer forensics technique that involves collecting data from a running computer system, rather than one that is powered off or dormant. The goal is to capture volatile forensic data, such as that in the main memory (RAM) while minimizing any impact on the system’s integrity. This...

Command and Control Chaos
Aditya Rai 13/11/2024

Command and Control Chaos

A Command and Control, also known as a C2 or C&C server, is an essential tool for cybercriminals and hackers, acting as the central hub for managing and coordinating malicious activities such as data breaches, malware distribution, and cyberattacks.