Recent blog posts

Meet Duncan: One of SBT’s Marketing Executives Bringing Stories to Life
Duncan Whitley 25/03/2026

Meet Duncan: One of SBT’s Marketing Executives Bringing Stories to Life

Get to know Duncan Whitley, one of Security Blue Team’s Marketing Executives, who creates blog posts, newsletters, emails, and ads to deliver genuinely useful cybersecurity content. From a background shaped by gaming and technology to a career in marketing, Duncan shares why he values clear, helpful communication and enjoys seeing...

5 Ways to Rethink the SOC Skills Gap
Joanne Morley 24/02/2026

5 Ways to Rethink the SOC Skills Gap

Many SOC teams invest heavily in certifications and training, yet still struggle with performance during real incidents. This article explores...

From a Garage to a G2 Leader: Building Security Blue Team From the Inside of a SOC
Joshua Beaman 24/03/2026

From a Garage to a G2 Leader: Building Security Blue Team From the Inside of a SOC

Security Blue Team started from a simple frustration: the gap between academic learning and real SOC work. What began as a personal project during a university placement grew into a globally recognised training platform used by organisations worldwide. This journey highlights how practical, hands-on learning can shape careers, strengthen teams,...

All posts

Faces of SBT: Trevor, Director of Cloud Services
Melissa Boyle 22/01/2025

Faces of SBT: Trevor, Director of Cloud Services

Welcome to our first Faces of SBT blog post, where we’ll be showcasing a member of our team and giving you a behind-the-scenes look at what it’s like to work at SBT. First up is Trevor, our Director of Cloud Services.

SBT Wrapped: A Year in Stats
Melissa Boyle 18/12/2024

SBT Wrapped: A Year in Stats

Welcome to the very first SBT Wrapped, where we’ll be sharing some stats from the past year.

Forensics 101: Live Acquisition USB and Digital Triaging with Kape
Malik Girondin 09/12/2024

Forensics 101: Live Acquisition USB and Digital Triaging with Kape

Live acquisition is a computer forensics technique that involves collecting data from a running computer system, rather than one that is powered off or dormant. The goal is to capture volatile forensic data, such as that in the main memory (RAM) while minimizing any impact on the system’s integrity. This...