Anatomy of A Data Breach Investigation
Delve into a data breach investigation with a step-by-step walkthrough of what you may expect and how to perform your examination.
Delve into a data breach investigation with a step-by-step walkthrough of what you may expect and how to perform your examination.
Extractions from Berla’s iVe software can be processed and examined in AXIOM. The data is parsed into easy to review categories for analysis.
We’ve introduced a new Agent Status Dashboard that now enables you to create a single agent, and deploy it multiple endpoints.
AXIOM Cyber 5.5 introduces an Agent Status Dashboard that unlocks the ability to deploy an agent to multiple endpoints for 1-1 collection.
We’re following a realistic, yet hypothetical ransomware investigation picking up where the forensics lab would begin and end its work.
Learn more about how Magnet AXIOM cyber performs remote collections of target endpoints with no advanced configuration needed.
Ransomware attacks are being experienced by corporations large and small. Here’s how you can use AXIOM Cyber to investigate an attack.
The latest version of Magnet AXIOM Cyber, 5.3, is now available! You can upgrade to AXIOM Cyber 5.3 in-product or over at the Customer Portal. If the investigations that you’re working are email-heavy, this is the update for you! An update that we made to the way we handle EML(X) files will save a considerable amount of time for examiners who … Continued
With AXIOM Cyber 5. 2, we’ve introduced new features and released new beta functionality, called Project Prague™.
AXIOM Cyber enables remote investigations by adding index searching and filtering capabilities to remote system previews.