Recorded Webinar: Fraud, IP Theft, and an Intrusion: A Case Study with...
When you’re faced with an intrusion — whether you were brought in as an outside consultant or are responsible for incident response for your organization — your stakeholders or management ask the same...
View ArticleWhite Paper: Successful Employee Misconduct Investigations
Download Today! New White Paper: Successful Employee Misconduct Investigations Employee misconduct—both subtle and egregious forms ranging from time-wasting online shopping, to bullying, sexual...
View ArticleAn In-Depth Look at Different Password Bypass Options
As mobile technology continues to mature, and the amount security and encryption continues to strengthen, it’s becoming more of a challenge to know how to access data on smartphones that are...
View ArticleNew Industry Insights Brief: Successful Employee Misconduct Investigations
This month we’re pleased to introduce the second of three in our Industry Insights Brief series. Successful Employee Misconduct Investigations follows last month’s Successful Insider Threat...
View ArticleMagnet AXIOM vs. Magnet IEF: Going Supersonic
By Jad Saliba, Founder & CTO of Magnet Forensics It’s been about five months since I did some performance profiling between Magnet IEF and Magnet AXIOM and published a blog documenting the results....
View ArticleMeet Magnet Forensics’ Training Team: Hoyt Harness
We’re continuing our “Meet the Forensic Trainer” series this summer with an introduction to Hoyt Harness, who joined the Magnet Forensics Training Team in August. Hoyt’s extensive instructional...
View ArticleStill Using IEF? Learn What You May Be Missing Out On
Have you ever asked, “What does Magnet AXIOM have that IEF doesn’t?” After two years, the answer is: More than you might think. Join us for a free one-hour webinar to learn exactly what you’re...
View ArticleNew Training Course: Magnet AXIOM Incident Response Examinations (AX310)
Magnet Forensics Training Offers Incident Response Techniques and All Courses Now Count Toward CPE Credits If you’re looking to dive deep into incident response techniques and expand your knowledge of...
View ArticleHow AXIOM Cloud Can Help Save Time Investigating Instagram
Instagram is so popular that it’s safe to say at some point, an investigation will lead you to uncovering potential evidence from it. In this blog, we’ll take a conventional investigation that I...
View ArticleEnhanced WhatsApp Support and Much More in Magnet AXIOM 2.6
Magnet AXIOM 2.6 is bringing big updates to Magnet AXIOM Cloud with WhatsApp backups, iCloud and Cloud Administrator account support. Together with improvements to Magnet.AI and to overall performance,...
View ArticleMagnet User Summit 2019 Coming to Nashville on April 2-3
We’re bringing Magnet User Summit 2019 to the Sheraton Grand Nashville Downtown in Nashville on April 2-3 — join us to learn the latest trends and best practices in digital forensics. MUS 2019 gives...
View ArticleAnalyzing GrayKey Images with AXIOM: New Artifact Parsing Capabilities
With the release of Magnet AXIOM 2.5 and 2.6, we’ve added new artifact parsing capabilities to support exams that utilize GrayKey. Again, GrayKey is a new forensic tool that unlocks iOS devices new and...
View ArticleUsando a tecnologia para encontrar informações de forma rápida e criar casos...
As evidências digitais estão chegando a um ritmo esmagador. Com isso as investigações exigem mais tempo para obter os dados, a tecnologia pode desempenhar um papel crucial para que as evidências...
View ArticleRecorded Webinar: Still Using IEF? Learn What You May Be Missing Out On
Have you ever asked, “What does Magnet AXIOM have that IEF doesn’t?” After two years, the answer is: More than you might think. Join us for a free one-hour webinar to learn exactly what you’re missing...
View ArticleApple’s Tween Years: iOS’ Maturation from 10 through 11 and into 12
At times over the past three years, Apple’s mobile operating system changes seemed so mercurial that the parallels to tweens’ rapid maturation couldn’t be missed. iOS 10 changed the backup structure,...
View ArticleWhite Paper: Successful Root Cause Analysis Investigations
Download a New Magnet Forensics Industry Insights Brief Today! When an organization is breached, determining whether data was exfiltrated is just the start. How intruders gained access is the basis...
View ArticleNew Industry Insights Brief: Successful Root Cause Analysis Investigations
This month brings the conclusion of our Industry Insights Brief series. Successful Root Cause Analysis Investigations follows on the heels of Successful Insider Threat Investigations and Successful...
View ArticleTake Advantage of Onsite Training at Magnet User Summit 2019
Have you been thinking about taking a Magnet Forensics Training course? Great news! We’re offering our Magnet AXIOM Examinations (AX200) and Magnet AXIOM Advanced Computer Forensics (AX250) before...
View ArticleGet Improved GrayKey Evidence and Windows 10 Mail Support in Magnet AXIOM 2.7
We’re continuing to make Magnet AXIOM faster and easier to use with each release. With Magnet AXIOM 2.7, we’ve incorporated acquisition, analysis, and reporting improvements, as well as improvements to...
View ArticleRecorded Webinar: An In-Depth Look at Different Password Bypass Options
As mobile technology continues to mature, and the amount security and encryption continues to strengthen, it’s becoming more of a challenge to know how to access data on smartphones that are...
View Article