Regulatory Requirements for Reporting Data Breaches Just Got Tougher for Banks
In May 2021, the Biden administration issued several new cybersecurity directives and regulations in an executive order to improve the nation’s cybersecurity.
In May 2021, the Biden administration issued several new cybersecurity directives and regulations in an executive order to improve the nation’s cybersecurity.
Magnet GRAYKEY has entered the fight to provide lawful access to mobile devices so examiners and investigators can extract the critical evidence they need to solve CSAM cases.
Sometimes, the simplest of digital forensic workflows net the most time savings, and legal hold requests are no exception. Workflows that use repeatable manual processes, require little to no human input or advanced decision making, and often include batch processing, result in significant time savings.
Today’s criminal investigations often rely on digital evidence residing on mobile devices. During investigations, it’s the mobile forensics investigator’s responsibility to extract and collect that digital evidence. There’s no one “right path” to becoming a mobile forensics investigator.
The June 2022 Magnet Forensics CTF was another exciting competition, and we’re happy to announce the winners!
When analyzing malware and exploits (or troubleshooting issues), you’ll find it in memory—even if it can’t be found on disk. Memory will give you a look at the exact state of a device at a specific time; this is why memory analysis, or memory forensics, is important to DFIR (Digital Forensics and Incident Response).
Hi! This is Jessica Hyde and I am so excited to revisit the Magnet Summit 2022 Capture the Flag contests.
One of the many exciting things we unveiled at Magnet Summit 2022 was the introduction of three brand new free certification programs—giving you an opportunity to showcase your expert-level competence with Magnet Forensics products to peers, internal stakeholders and external audiences, including legal teams or clients.
Introducing our newest member of the Training Team, Thad Winkelman. Learn more about Thad’s varied and interesting background and what he’s hoping to bring to his role at Magnet Forensics.
Law Enforcement agencies perform logical acquisitions of unlocked iOS devices when they do not have access to Magnet GRAYKEY. The logical acquisition has been an industry-leading iOS acquisition method used by investigators and forensic examiners because of its simplicity and level of support. However, device security is one of the biggest roadblocks to completing logical acquisitions. For a logical acquisition to take place, device access needs to be granted using a passcode, and a trusted connection is required in most instances.