Recent blog posts

How Cybersecurity Affects Customer Trust (And What Companies Can Do About It)
Duncan Whitley 17/04/2025

How Cybersecurity Affects Customer Trust (And What Companies Can Do About It)

Let’s be real: nobody likes thinking about cybersecurity until something goes sideways. But here’s the kicker: when it does, it’s not just your IT crew sweating bullets. Your customers feel it too, and how you handle it can make or break their trust in you. So, let’s unpack why cybersecurity...

Faces of SBT: Meet Jake and Nathaniel, Our Sales Specialists
Duncan Whitley 01/04/2025

Faces of SBT: Meet Jake and Nathaniel, Our Sales Specialists

At Security Blue Team (SBT), our sales team connects prospective clients with top-tier cybersecurity training, and today we’re shining a light on two of our sales specialists, Jake Knight and Nathaniel Hutchinson.

All posts

SBT Wrapped: A Year in Stats
Melissa Boyle 18/12/2024

SBT Wrapped: A Year in Stats

Welcome to the very first SBT Wrapped, where we’ll be sharing some stats from the past year.

Forensics 101: Live Acquisition USB and Digital Triaging with Kape
Malik Girondin 09/12/2024

Forensics 101: Live Acquisition USB and Digital Triaging with Kape

Live acquisition is a computer forensics technique that involves collecting data from a running computer system, rather than one that is powered off or dormant. The goal is to capture volatile forensic data, such as that in the main memory (RAM) while minimizing any impact on the system’s integrity. This...

Command and Control Chaos
Aditya Rai 13/11/2024

Command and Control Chaos

A Command and Control, also known as a C2 or C&C server, is an essential tool for cybercriminals and hackers, acting as the central hub for managing and coordinating malicious activities such as data breaches, malware distribution, and cyberattacks.