Recent blog posts

Understanding the Ransomware Lifecycle
Ben Gonsalves 14/04/2026

Understanding the Ransomware Lifecycle

Ransomware attacks rarely happen all at once. They follow a series of stages that unfold over time, from initial access to data exfiltration and encryption. Understanding this lifecycle helps analysts spot threats earlier, respond more effectively, and focus on the stages where intervention makes the biggest difference.

What Actually Causes SOC Churn (Beyond Salary)
Joshua Beaman 22/04/2026

What Actually Causes SOC Churn (Beyond Salary)

Often, salary is blamed for SOC churn, but in reality it often is not the primary reason SOC analysts leave. There can be multiple frustrations from unclear expectations to limited progression that may play a bigger role. Lets break down what some of the underlining reasons for churn are and...

All posts

What Actually Causes SOC Churn (Beyond Salary)
Joshua Beaman 22/04/2026

What Actually Causes SOC Churn (Beyond Salary)

Often, salary is blamed for SOC churn, but in reality it often is not the primary reason SOC analysts leave. There can be multiple frustrations from unclear expectations to limited progression that may play a bigger role. Lets break down what some of the underlining reasons for churn are and...

Understanding the Ransomware Lifecycle
Ben Gonsalves 14/04/2026

Understanding the Ransomware Lifecycle

Ransomware attacks rarely happen all at once. They follow a series of stages that unfold over time, from initial access to data exfiltration and encryption. Understanding this lifecycle helps analysts spot threats earlier, respond more effectively, and focus on the stages where intervention makes the biggest difference.

Meet Duncan: One of SBT’s Marketing Executives Bringing Stories to Life
Duncan Whitley 25/03/2026

Meet Duncan: One of SBT’s Marketing Executives Bringing Stories to Life

Get to know Duncan Whitley, one of Security Blue Team’s Marketing Executives, who creates blog posts, newsletters, emails, and ads to deliver genuinely useful cybersecurity content. From a background shaped by gaming and technology to a career in marketing, Duncan shares why he values clear, helpful communication and enjoys seeing...

From a Garage to a G2 Leader: Building Security Blue Team From the Inside of a SOC
Joshua Beaman 24/03/2026

From a Garage to a G2 Leader: Building Security Blue Team From the Inside of a SOC

Security Blue Team started from a simple frustration: the gap between academic learning and real SOC work. What began as a personal project during a university placement grew into a globally recognised training platform used by organisations worldwide. This journey highlights how practical, hands-on learning can shape careers, strengthen teams,...

5 Ways to Rethink the SOC Skills Gap
Joanne Morley 24/02/2026

5 Ways to Rethink the SOC Skills Gap

Many SOC teams invest heavily in certifications and training, yet still struggle with performance during real incidents. This article explores five practical shifts SOC managers can make to move from measuring skills to building true operational readiness. From defining what “good” looks like to protecting training time and reinforcing learning...