Catching Up with the Magnet User Summit CTF Winners
This week, DFIR and infosec professionals converge on Las Vegas this week for the Black Hat and DEFCON conferences, each of which has its own Capture the Flag (CTF) competition. We thought we’d take a...
View ArticleGrabación del webinar: Usando la tecnología para encontrar información más...
La evidencia digital está llegando a un ritmo abrumador. Como las investigaciones requieren más tiempo para pasar los datos, la tecnología puede jugar un papel crucial para obtener la evidencia...
View ArticleSaving Valuable Time on Child Exploitation Investigations with Magnet...
One of the most common challenges of any child exploitation investigation is the time it takes to review, categorize and report on child sexual abuse material (CSAM) that hasn’t yet been...
View ArticleIntroducing a New Corporate Industry Insights Series
Whether you’re an in-house forensic examiner or a consultant, your ability to support Human Resources, Legal, Compliance, and related investigative teams is only as good as the software you use to find...
View ArticleWorking Cases Faster Than Ever in Magnet AXIOM 2.4
Get the latest version of Magnet AXIOM in-app or at the Customer Portal today! Magnet AXIOM 2.4 will make it faster to open cases and process media, recover more evidence from GrayKey images and Office...
View ArticleMeet Magnet Forensics’ Training Team: Doug Estes
We’re continuing our “Meet the Forensic Trainer” series this summer with an introduction to Doug Estes, another of the newer faces on our Training team. Doug also came to us directly from law...
View ArticleFraud, IP Theft, and an Intrusion: A Case Study with Gillware Digital Forensics
When you’re faced with an intrusion — whether you were brought in as an outside consultant or are responsible for incident response for your organization — your stakeholders or management ask the same...
View ArticleRecorded Webinar: Saving Valuable Time on Child Exploitation Investigations...
One of the most common challenges of any child exploitation investigation is the time it takes to review, categorize and report on child sexual abuse material (CSAM) that hasn’t yet been...
View ArticleWhite Paper: Successful Insider Threat Investigations
Download Today! Successful Insider Threat Investigations A Magnet Forensics Industry Insights Brief No two insider threat investigations are ever the same—but a standardized process can help them run...
View ArticleNew Industry Insights Brief: Successful Insider Threat Investigations
Last week we introduced a new three-part series that focuses on corporate investigations. This week, we’re very pleased to offer the first of our Industry Insights Briefs for download: Successful...
View Article10 Ways to Stay Current in DFIR
By Jessica Hyde, Director, Forensics I was asked recently what resources I think are most useful to helping a digital forensics and incident response professional stay current in DFIR, because there is...
View ArticleMeet Magnet Forensics’ Training Team: Lyn Goh
We’re continuing our “Meet the Forensic Trainer” series this summer with an introduction to Lyn Goh, another of the newer faces on our Training team. Lyn is based in the United Kingdom, where she...
View ArticleQ&A with Nathan Little from Gillware Digital Forensics
In this Q&A, we talk with Nathan Little, a partner at Gillware Digital Forensics who leads incident response and data breach investigations. Nathan will be presenting his expertise when he co-hosts...
View ArticleAndroid Messaging Forensics – SMS/MMS and Beyond
There are a lot of third-party chat apps available for iOS and Android. Just look at the Google Play Store and iTunes Store and you’ll see more chat applications than you’ll ever be able to use and...
View Article5 Ways to Identify a Candidate for the Magnet Forensics Community Award
Who do you know in the digital forensics community who’s doing amazing work worthy of the Magnet Forensics Community Award? A lot of times it’s hard to tell, because many forensics examiners choose to...
View ArticleHow to Put a Qualcomm Phone into EDL Mode
Emergency Download (EDL) mode is a Qualcomm feature that can allow you to recover data from a device and perform tasks like unbricking or flashing the device. On supported devices, Magnet AXIOM can use...
View ArticlePerformance Improvements in Magnet AXIOM 2.5: By the Numbers
With the release of Magnet AXIOM 2.5, we’ve really focused on how we can make AXIOM work better. We’ve gone through every step of the examination process to find ways to make it faster and smoother...
View ArticleBig Improvements Make Magnet AXIOM 2.5 the Fastest Version Yet
We’re working hard to make sure that that the day-to-day experience of using Magnet AXIOM is improving all the time. With the latest version of Magnet AXIOM, Magnet AXIOM 2.5, we’re continuing to build...
View ArticleMeet Magnet Forensics’ Training Team: Larry McClain
We’re continuing our “Meet the Forensic Trainer” series this summer with an introduction to Larry McClain, who joined the Magnet Forensics Training Team in July. Larry comes to us with many years of...
View ArticleKeyboard Shortcuts to Help Your AXIOM Examinations Run More Efficiently
Few people can work in technology without eventually learning that keyboard shortcuts can make your work just that little bit more efficient. The seconds you can save in using your keyboard—rather than...
View Article