Recent blog posts

Meet Duncan: One of SBT’s Marketing Executives Bringing Stories to Life
Duncan Whitley 25/03/2026

Meet Duncan: One of SBT’s Marketing Executives Bringing Stories to Life

Get to know Duncan Whitley, one of Security Blue Team’s Marketing Executives, who creates blog posts, newsletters, emails, and ads to deliver genuinely useful cybersecurity content. From a background shaped by gaming and technology to a career in marketing, Duncan shares why he values clear, helpful communication and enjoys seeing...

5 Ways to Rethink the SOC Skills Gap
Joanne Morley 24/02/2026

5 Ways to Rethink the SOC Skills Gap

Many SOC teams invest heavily in certifications and training, yet still struggle with performance during real incidents. This article explores...

From a Garage to a G2 Leader: Building Security Blue Team From the Inside of a SOC
Joshua Beaman 24/03/2026

From a Garage to a G2 Leader: Building Security Blue Team From the Inside of a SOC

Security Blue Team started from a simple frustration: the gap between academic learning and real SOC work. What began as a personal project during a university placement grew into a globally recognised training platform used by organisations worldwide. This journey highlights how practical, hands-on learning can shape careers, strengthen teams,...

All posts

Meet David Elliott: SBT’s Principal Defensive Content Engineer Forging Cybersecurity Mastery
Duncan Whitley 29/10/2025

Meet David Elliott: SBT’s Principal Defensive Content Engineer Forging Cybersecurity Mastery

Step into the world of David Elliott, Security Blue Team’s Principal Defensive Content Engineer, whose creative flair and technical expertise shape cutting-edge cybersecurity training. From building realistic scenarios to mentoring talent, David’s work strengthens SBT’s technical team, helping clients master cyber defences. Dive into his story, from RAF roots to...

How to Structure Your First 24 Hours in a Ransomware Attack
Duncan Whitley 14/10/2025

How to Structure Your First 24 Hours in a Ransomware Attack

The first 24 hours after a ransomware attack can determine how effectively your organization recovers. This guide walks through a structured hour-by-hour response plan, covering containment, negotiation preparation, first contact, and recovery. Learn how to maintain clarity, protect leverage, and minimize chaos when every decision counts.

The Human Side of Cybersecurity: Why Mental Health Matters
Reema Shah 10/10/2025

The Human Side of Cybersecurity: Why Mental Health Matters

Cybersecurity professionals face unique pressures: relentless threats, constant vigilance, and the emotional toll of protecting others. This blog explores how factors like burnout, alert fatigue, imposter syndrome, and isolation impact mental health, while offering strategies for resilience. It also introduces a free Security Blue Team course designed to help individuals...

Getting Your Data House in Order: Telemetry Strategy for Effective Detections | Part 1
SBT Content Engineers 08/10/2025

Getting Your Data House in Order: Telemetry Strategy for Effective Detections | Part 1

When a security incident hits, missing or messy telemetry can cripple detection and response. Many SOC teams either drown in irrelevant logs or lack the critical events that reveal attacker behavior. This blog outlines how to build a focused telemetry strategy, one that balances cost with coverage, ensures high-quality data,...

Recognition from Our Customers: New G2 Badges for Security Blue Team
Duncan Whitley 29/09/2025

Recognition from Our Customers: New G2 Badges for Security Blue Team

Security Blue Team has been recognised with three new G2 badges, earned directly through the feedback of our customers. From learners starting their cybersecurity journey to SOC leaders building stronger teams, these reviews reflect the practical, career-focused impact of our certifications and hands-on labs across the globe.