Uncovering insider threats with remote endpoint forensics: a case study
Discover how remote endpoint forensics tools like Magnet Nexus and Axiom Cyber helped detect and investigate an insider threat involving IP theft.
Discover how remote endpoint forensics tools like Magnet Nexus and Axiom Cyber helped detect and investigate an insider threat involving IP theft.
As part of our support of Linux artifacts, we’ve focused on some foundational OS artifacts that will help move your investigations along.
In the realm of digital forensics, mac forensics (the investigation of macOS systems) present a unique landscape filled with crucial artifacts that can provide deep insights into user activities, system events, and potential security breaches. Whether you’re investigating a criminal case, responding to an insider threat, or managing a cybersecurity incident, understanding these key forensic … Continued
Handling cloud data effectively and securely has become a critical priority for organizations managing human resource investigations, potential litigation, and other sensitive matters. That’s because much of today’s business-critical data like communications and sensitive documents may be stored in the cloud. According to the Flexera 2024 State of the Cloud Report, more organizations are adopting … Continued
We’re excited to announce the release of Magnet Axiom Cyber 8.5, which includes new features and improvements such as: We’ve also updated and added to our artifact support (additional details are at the end of this blog.) Upgrade to Axiom Cyber 8.5 within the Axiom Cyber interface or through the Customer Portal. Haven’t tried Axiom … Continued
Digital forensics tools have improved a lot in the past several years. With these advances, the digital forensics community now has many tool options for each phase of an investigation.
We’re excited to announce the release of Magnet Axiom Cyber 8.3.
We’re excited to announce the release of Magnet Axiom Cyber 8.2, which includes new features and improvements.
With the wide array of languages that can show up in case data—for both local and larger geographically focused investigations—determining the relevance of the available evidence can be a challenging process.
In today’s digital landscape, cyber threats are ever evolving, making cybersecurity measures a non-negotiable for businesses of all sizes. However, even the most comprehensive defenses can be breached, either through unpatched exploits, or by an insider who inadvertently causes one.