Magnet AXIOM 6.3: Take Control of Evidence Processing
Magnet AXIOM 6.3 is now available, offering you more control over evidence processing, so you can apply the appropriate collection method for the case at hand. Introducing parsing-only processing and...
View ArticleAXIOM Cyber 6.3: Building and Refining Incident Response Capabilities
In Magnet AXIOM 6.3, we’ve continued to expand the incident response capabilities of AXIOM Cyber—further developing recently introduced features and adding new ones along the way. This release also...
View ArticleStandardizing Your Collections With Targeted Location Profiles in AXIOM Cyber
Across the board, businesses strive to establish repeatable processes so that they can replicate past successes and avoid repetitive tasks that eat up valuable time and effort. With the volume of...
View ArticleDigital Forensics Tools: The Ultimate Guide (2022)
Digital forensics tools have improved a lot in the past several years. With these advances, the digital forensics community now has many tool options for each phase of an investigation. In fact, there...
View ArticleAutomating Legal Hold Requests With Remote Collections in Magnet AUTOMATE...
Sometimes, the simplest of digital forensic workflows net the most time savings, and legal hold requests are no exception. Workflows that use repeatable manual processes, require little to no human...
View ArticleRegulatory Requirements for Reporting Data Breaches Just Got Tougher for Banks
This is a guest post by Magnet Forensics CEO Adam Belsher. In May 2021, the Biden administration issued several new cybersecurity directives and regulations in an executive order to improve the...
View ArticleMeet Magnet Forensics’ Training Team: Danny Norris
Danny Norris comes to us from an extensive background in the US Secret Service and Colorado Law Enforcement. Read on below! MF: What made you want to be a Trainer? DN: I have found that there is...
View ArticleMeet Magnet Forensics’ Training Team: Mason Miller
Mason Miller comes to us with an extensive digital forensics background, having served in Georgia Law Enforcement. Read on below! Want to learn more about what courses are offered? Visit our Training...
View ArticleMeet Magnet Forensics’ Training Team: Preston McNair
Preston McNair comes to us from a digital forensics background in West Virginia State Government, focusing on narcotics and violent crimes. Read on below! Want to learn more about what courses are...
View ArticleA New Paradigm in Digital Investigations
Modernizing your agency’s approach to get ahead of the digital evidence challenge The growing volume of data from digital devices challenges police agencies’ ability to keep their communities safe. A...
View ArticleIntroducing Workflow Plugins for AUTOMATE Enterprise
We’re thrilled to announce the availability of workflow plugins within Magnet AUTOMATE Enterprise! We understand the importance of tech stack integration to reduce complexity and increase...
View ArticleDFIR: What is Digital Forensics and Incident Response?
This is a guest post by Jessica Hyde. Jessica is the founder of Hexordia and Adjunct Professor at George Mason University. She is involved in community efforts including HTCIA, DFIR Review, Cyber...
View ArticleStandardize Your Team’s Hash Sets Database With Hash Set Manager
Maintaining up-to-date hash sets can be a painful process, especially for those operating in offline labs. Hash Sets Manager (currently in beta) lets you easily manage a central database of hash sets...
View ArticleAXIOM Cyber 6.4: New Email Evidence Sources and Faster Timelines
We are thrilled to announce the release of AXIOM Cyber 6.4. This release adds more filtering capabilities and evidence sources to Email Explorer, as well as performance improvements to key AXIOM Cyber...
View ArticleMagnet AXIOM 6.4: Establish Your Timeline Faster Than Ever Before
Magnet AXIOM 6.4 is now available, offering you faster Timeline filtering than ever before, so you can reduce the time it takes to establish the timeline of events for your case. Timeline is not the...
View ArticleForensic Analysis of MUICache Files in Windows
As examiners, we often find ourselves wanting to know if a program was executed on a system, when it was executed on a system, or if a program or file ever existed on a system. While there are several...
View ArticleAutomating Root Cause Analysis With EDR Integration in Magnet AUTOMATE...
Root cause analysis is essential. Especially for critical and high-impact security incidents. By resolving only the symptoms of a security incident, instead of the actual core issue, organizations can...
View ArticleHow to Ingest Mobile Extractions from GrayKey, UFED, XRY, and Oxygen in...
Credible. Verifiable. Repeatable. At Magnet Forensics, we understand how fundamental these elements are to an investigation and that taking a tool-box approach to your DFIR investigations is the only...
View ArticleAccelerate Your Digital Investigations With Timeline in Magnet AXIOM and...
When you need to quickly narrow the scope of your investigation to analyze the data related to a crime or activity that occurred at a specific time, the Timeline explorer in Magnet AXIOM & Magnet...
View ArticleAXIOM Cyber 6.5: Decrypting DDPE Files and Continued Improvements for...
AXIOM Cyber 6.5 introduces several new and exciting features including: Support for Dell Data Protection Encryption (DDPE)New remote volatile artifactsAdded evidence sources and features for Email...
View Article