Recent blog posts

Meet Duncan: One of SBT’s Marketing Executives Bringing Stories to Life
Duncan Whitley 25/03/2026

Meet Duncan: One of SBT’s Marketing Executives Bringing Stories to Life

Get to know Duncan Whitley, one of Security Blue Team’s Marketing Executives, who creates blog posts, newsletters, emails, and ads to deliver genuinely useful cybersecurity content. From a background shaped by gaming and technology to a career in marketing, Duncan shares why he values clear, helpful communication and enjoys seeing...

5 Ways to Rethink the SOC Skills Gap
Joanne Morley 24/02/2026

5 Ways to Rethink the SOC Skills Gap

Many SOC teams invest heavily in certifications and training, yet still struggle with performance during real incidents. This article explores...

From a Garage to a G2 Leader: Building Security Blue Team From the Inside of a SOC
Joshua Beaman 24/03/2026

From a Garage to a G2 Leader: Building Security Blue Team From the Inside of a SOC

Security Blue Team started from a simple frustration: the gap between academic learning and real SOC work. What began as a personal project during a university placement grew into a globally recognised training platform used by organisations worldwide. This journey highlights how practical, hands-on learning can shape careers, strengthen teams,...

All posts

Command and Control Chaos
Aditya Rai 13/11/2024

Command and Control Chaos

A Command and Control, also known as a C2 or C&C server, is an essential tool for cybercriminals and hackers, acting as the central hub for managing and coordinating malicious activities such as data breaches, malware distribution, and cyberattacks.

Logging Windows file tampering attempts
John Jonusauskas 30/10/2024

Logging Windows file tampering attempts

Imagine you’re working in a company, and an insider threat tampers with a critical file, like a financial document or a system configuration file. If you don’t know who, when, or what was modified, you may not even realize something is wrong until it’s too late. This can lead to...

Cloud Security: A Defender's Perspective
Aditya Rai 16/10/2024

Cloud Security: A Defender's Perspective

Cloud security involves a broad set of policies, technologies, applications, and controls utilized to protect virtualized IP, data, applications, services, and the associated infrastructure of cloud computing.

Securing Our World: Celebrating Cybersecurity Awareness Month With SBT
Duncan Whitley 15/10/2024

Securing Our World: Celebrating Cybersecurity Awareness Month With SBT

It's currently Cybersecurity Awareness Month, which gives us a great opportunity to reflect on how fundamental cybersecurity has become in today's world. This year, the theme is "Secure Our World," which perfectly captures the growing urgency for individuals and organizations to take action to protect their digital environments. In this...