Recent blog posts

SOC Metrics for Finance: From Security Operations to Risk Insight and Business Impact
Catherine Southwick 28/04/2026

SOC Metrics for Finance: From Security Operations to Risk Insight and Business Impact

SOC metrics like alerts triaged and threats detected only tell part of the story, especially in financial services where performance is measured in risk, exposure, and business impact. This article explores how to reframe key metrics such as MTTR, containment time, and risk reduction to better align with financial outcomes,...

Locked Shield 26 | Supporting NATO on a multinational exercise
Sabastian Hague 01/05/2026

Locked Shield 26 | Supporting NATO on a multinational exercise

Locked Shields is as close as it gets to a real-world cyber war without it actually happening. This post breaks down what it’s like to support NATO’s largest live-fire exercise, the scenarios we built, and what training at that scale really looks like when pressure, complexity, and realism all come...

All posts

Exploring Blue Team Roles & How to Get Started
Joshua Beaman 28/04/2025

Exploring Blue Team Roles & How to Get Started

There are a wide range of defensive cyber security, or "blue team", roles in our industry. In this blog post we'll introduce you to the following: SOC Analyst, Incident Responder, Malware Analyst, Threat Intelligence Analyst, Vulnerability Analyst, and Digital Forensics Analyst.

Faces of SBT: Meet Jake and Nathaniel, Our Sales Specialists
Duncan Whitley 01/04/2025

Faces of SBT: Meet Jake and Nathaniel, Our Sales Specialists

At Security Blue Team (SBT), our sales team connects prospective clients with top-tier cybersecurity training, and today we’re shining a light on two of our sales specialists, Jake Knight and Nathaniel Hutchinson.

The MacGyver Escape: How to Transfer Files from a Restricted Windows Computer
Luis Suastegui 26/03/2025

The MacGyver Escape: How to Transfer Files from a Restricted Windows Computer

Have you ever needed to transfer data from one computer to another but found yourself blocked by strict security policies? Perhaps you cannot connect any USB devices, most of your programs (including PowerShell and Command Prompt) are disabled, and internet access is heavily restricted.

Security Blue Team’s Global Connect: A Chilly Team Adventure in Lapland
Duncan Whitley 14/03/2025

Security Blue Team’s Global Connect: A Chilly Team Adventure in Lapland

Picture a team diving into a winter wonderland where snowmobiles hunt the Northern Lights, huskies charge through snowy trails, and drinks come in glasses chiseled from ice. That’s what SBT got up to during our annual Global Connect, a company get-together that took us from Stockholm to the icy wilds...