Recent blog posts

SOC Metrics for Finance: From Security Operations to Risk Insight and Business Impact
Catherine Southwick 28/04/2026

SOC Metrics for Finance: From Security Operations to Risk Insight and Business Impact

SOC metrics like alerts triaged and threats detected only tell part of the story, especially in financial services where performance is measured in risk, exposure, and business impact. This article explores how to reframe key metrics such as MTTR, containment time, and risk reduction to better align with financial outcomes,...

Locked Shield 26 | Supporting NATO on a multinational exercise
SBT Content Engineers 01/05/2026

Locked Shield 26 | Supporting NATO on a multinational exercise

Locked Shields is as close as it gets to a real-world cyber war without it actually happening. This post breaks down what it’s like to support NATO’s largest live-fire exercise, the scenarios we built, and what training at that scale really looks like when pressure, complexity, and realism all come...

All posts

Faces of SBT: Trevor, Director of Cloud Services
Melissa Boyle 22/01/2025

Faces of SBT: Trevor, Director of Cloud Services

Welcome to our first Faces of SBT blog post, where we’ll be showcasing a member of our team and giving you a behind-the-scenes look at what it’s like to work at SBT. First up is Trevor, our Director of Cloud Services.

SBT Wrapped: A Year in Stats
Melissa Boyle 18/12/2024

SBT Wrapped: A Year in Stats

Welcome to the very first SBT Wrapped, where we’ll be sharing some stats from the past year.

Forensics 101: Live Acquisition USB and Digital Triaging with Kape
Malik Girondin 09/12/2024

Forensics 101: Live Acquisition USB and Digital Triaging with Kape

Live acquisition is a computer forensics technique that involves collecting data from a running computer system, rather than one that is powered off or dormant. The goal is to capture volatile forensic data, such as that in the main memory (RAM) while minimizing any impact on the system’s integrity. This...

Command and Control Chaos
Aditya Rai 13/11/2024

Command and Control Chaos

A Command and Control, also known as a C2 or C&C server, is an essential tool for cybercriminals and hackers, acting as the central hub for managing and coordinating malicious activities such as data breaches, malware distribution, and cyberattacks.