DFIR in Zero-Trust Environments: Utilizing AXIOM Cyber for Remote Collection with Zscaler
work environments. This means that every instance of communication must be validated upon request, and then routed accordingly.
work environments. This means that every instance of communication must be validated upon request, and then routed accordingly.
We’re proud to announce the availability of Magnet AXIOM 5.10! You can upgrade to the latest version within AXIOM or over at the Customer Portal.
Stephen Boyce, who served agencies of the U.S. State Department as well as the FBI, on the Magnet Digital Investigation Suite.
In a previous blog post, we discussed why it is advantageous to utilize DD forensic images as opposed to E01 when analyzing hard drives from DVRs. In this post, we’ll look at another option – cloned hard drives. Cloned hard drives of the original DVR hard drive are often connected to the DVR in an … Continued
There are some new reporting features in DVR Examiner 3.1. In this post, we’ll take a close look at forensic reports from DVR recovery.
Evidence management software has never played such a significant role in digital investigations as it does today. The explosion of data means examiners have massive amounts of information to comb through from a variety of sources. Now they must also do so in a remote environment that can pose huge challenges to collaboration. A recent … Continued
Digital investigators and examiners creating forensic images for DVR analysis utilize two main file formats to store bit-for-bit copies of hard drives used in their examinations. E01 forensic image file format is the default imaging option for many computer forensics tools and has become a de-facto standard of sorts. While somewhat lesser known, the raw … Continued
With Magnet AXIOM, you can acquire and analyze iCloud backups up to and including iOS 15. Gaining access to Apple user data for forensic examiners has been a challenge and the relationship between Apple and the law enforcement community could be described as ‘contentious’ to say the least — with Apple refusing to unlock iPhones … Continued
Learn more about how Magnet AXIOM Cyber supports the remote collection of data from Linux operating systems.
Swiftly get a sense of where a photo was taken, a phone call was made, or a chat was sent, and how that location relates to your crime scene.