Quantcast
Channel: Magnet Forensics
Browsing all 1190 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Magnet AXIOM 6.3: Take Control of Evidence Processing

Magnet AXIOM 6.3 is now available, offering you more control over evidence processing, so you can apply the appropriate collection method for the case at hand. Introducing parsing-only processing and...

View Article


AXIOM Cyber 6.3: Building and Refining Incident Response Capabilities

In Magnet AXIOM 6.3, we’ve continued to expand the incident response capabilities of AXIOM Cyber—further developing recently introduced features and adding new ones along the way. This release also...

View Article


Standardizing Your Collections With Targeted Location Profiles in AXIOM Cyber

Across the board, businesses strive to establish repeatable processes so that they can replicate past successes and avoid repetitive tasks that eat up valuable time and effort. With the volume of...

View Article

Image may be NSFW.
Clik here to view.

Digital Forensics Tools: The Ultimate Guide (2022)

Digital forensics tools have improved a lot in the past several years. With these advances, the digital forensics community now has many tool options for each phase of an investigation. In fact, there...

View Article

Image may be NSFW.
Clik here to view.

Automating Legal Hold Requests With Remote Collections in Magnet AUTOMATE...

Sometimes, the simplest of digital forensic workflows net the most time savings, and legal hold requests are no exception. Workflows that use repeatable manual processes, require little to no human...

View Article


Image may be NSFW.
Clik here to view.

Regulatory Requirements for Reporting Data Breaches Just Got Tougher for Banks

This is a guest post by Magnet Forensics CEO Adam Belsher. In May 2021, the Biden administration issued several new cybersecurity directives and regulations in an executive order to improve the...

View Article

Image may be NSFW.
Clik here to view.

Meet Magnet Forensics’ Training Team: Danny Norris

Danny Norris comes to us from an extensive background in the US Secret Service and Colorado Law Enforcement. Read on below! MF: What made you want to be a Trainer? DN: I have found that there is...

View Article

Image may be NSFW.
Clik here to view.

Meet Magnet Forensics’ Training Team: Mason Miller

Mason Miller comes to us with an extensive digital forensics background, having served in Georgia Law Enforcement. Read on below! Want to learn more about what courses are offered? Visit our Training...

View Article


Image may be NSFW.
Clik here to view.

Meet Magnet Forensics’ Training Team: Preston McNair

Preston McNair comes to us from a digital forensics background in West Virginia State Government, focusing on narcotics and violent crimes. Read on below! Want to learn more about what courses are...

View Article


Image may be NSFW.
Clik here to view.

A New Paradigm in Digital Investigations

Modernizing your agency’s approach to get ahead of the digital evidence challenge The growing volume of data from digital devices challenges police agencies’ ability to keep their communities safe. A...

View Article

Image may be NSFW.
Clik here to view.

Introducing Workflow Plugins for AUTOMATE Enterprise

We’re thrilled to announce the availability of workflow plugins within Magnet AUTOMATE Enterprise!   We understand the importance of tech stack integration to reduce complexity and increase...

View Article

Image may be NSFW.
Clik here to view.

DFIR: What is Digital Forensics and Incident Response?

This is a guest post by Jessica Hyde. Jessica is the founder of Hexordia and Adjunct Professor at George Mason University. She is involved in community efforts including HTCIA, DFIR Review, Cyber...

View Article

Standardize Your Team’s Hash Sets Database With Hash Set Manager

Maintaining up-to-date hash sets can be a painful process, especially for those operating in offline labs. Hash Sets Manager (currently in beta) lets you easily manage a central database of hash sets...

View Article


AXIOM Cyber 6.4: New Email Evidence Sources and Faster Timelines

We are thrilled to announce the release of AXIOM Cyber 6.4. This release adds more filtering capabilities and evidence sources to Email Explorer, as well as performance improvements to key AXIOM Cyber...

View Article

Image may be NSFW.
Clik here to view.

Magnet AXIOM 6.4: Establish Your Timeline Faster Than Ever Before

Magnet AXIOM 6.4 is now available, offering you faster Timeline filtering than ever before, so you can reduce the time it takes to establish the timeline of events for your case. Timeline is not the...

View Article


Image may be NSFW.
Clik here to view.

Forensic Analysis of MUICache Files in Windows

As examiners, we often find ourselves wanting to know if a program was executed on a system, when it was executed on a system, or if a program or file ever existed on a system. While there are several...

View Article

Image may be NSFW.
Clik here to view.

Automating Root Cause Analysis With EDR Integration in Magnet AUTOMATE...

Root cause analysis is essential. Especially for critical and high-impact security incidents. By resolving only the symptoms of a security incident, instead of the actual core issue, organizations can...

View Article


How to Ingest Mobile Extractions from GrayKey, UFED, XRY, and Oxygen in...

Credible. Verifiable. Repeatable. At Magnet Forensics, we understand how fundamental these elements are to an investigation and that taking a tool-box approach to your DFIR investigations is the only...

View Article

Image may be NSFW.
Clik here to view.

Accelerate Your Digital Investigations With Timeline in Magnet AXIOM and...

When you need to quickly narrow the scope of your investigation to analyze the data related to a crime or activity that occurred at a specific time, the Timeline explorer in Magnet AXIOM & Magnet...

View Article

Image may be NSFW.
Clik here to view.

AXIOM Cyber 6.5: Decrypting DDPE Files and Continued Improvements for...

AXIOM Cyber 6.5 introduces several new and exciting features including: Support for Dell Data Protection Encryption (DDPE)New remote volatile artifactsAdded evidence sources and features for Email...

View Article
Browsing all 1190 articles
Browse latest View live