Recent blog posts

Locked Shield 26 | Supporting NATO on a multinational exercise
Sabastian Hague 01/05/2026

Locked Shield 26 | Supporting NATO on a multinational exercise

Locked Shields is as close as it gets to a real-world cyber war without it actually happening. This post breaks down what it’s like to support NATO’s largest live-fire exercise, the scenarios we built, and what training at that scale really looks like when pressure, complexity, and realism all come...

Is the BTL1 Good for Beginners? What You Need to Know in 2026
Ben Gonsalves 18/05/2026

Is the BTL1 Good for Beginners? What You Need to Know in 2026

Breaking into cybersecurity can feel overwhelming when most certifications expect experience before you’ve even started. BTL1 takes a different approach, focusing on hands-on defensive security skills and real-world SOC scenarios designed for beginners. This post breaks down what BTL1 teaches, who it’s best suited for, and whether it’s the right...

All posts

Faces of SBT: Trevor, Director of Cloud Services
Melissa Boyle 22/01/2025

Faces of SBT: Trevor, Director of Cloud Services

Welcome to our first Faces of SBT blog post, where we’ll be showcasing a member of our team and giving you a behind-the-scenes look at what it’s like to work at SBT. First up is Trevor, our Director of Cloud Services.

SBT Wrapped: A Year in Stats
Melissa Boyle 18/12/2024

SBT Wrapped: A Year in Stats

Welcome to the very first SBT Wrapped, where we’ll be sharing some stats from the past year.

Forensics 101: Live Acquisition USB and Digital Triaging with Kape
Malik Girondin 09/12/2024

Forensics 101: Live Acquisition USB and Digital Triaging with Kape

Live acquisition is a computer forensics technique that involves collecting data from a running computer system, rather than one that is powered off or dormant. The goal is to capture volatile forensic data, such as that in the main memory (RAM) while minimizing any impact on the system’s integrity. This...