Automating Root Cause Analysis With EDR Integration in Magnet AUTOMATE
By resolving only the symptoms of a security incident, instead of the actual core issue, organizations can open themselves up to similar attacks in the future.
By resolving only the symptoms of a security incident, instead of the actual core issue, organizations can open themselves up to similar attacks in the future.
With a remote workforce that’s larger than ever, the need to collect data from endpoints not connected to the corporate network has never been greater. It’s critical to have the ability to collect and analyze off-network computers when you have an incident that needs to be investigated. Plus, you need to know what you can … Continued
This webinar will cover the latest threats the Healthcare and Public Health (HPH) sector faces, from Ransomware to Business Email Compromises, HIPPA and FTC notification requirements, incident response planning using both the NIST and ISO frameworks, and digital forensic solutions that help the HPH sector automate cybersecurity incident response and conduct a root cause analysis.
Here are a few mobile device forensics dos and don’ts that can help you and your agency ensure you are following best practices.
In this presentation we will cover the main current features of Comae, and how the platform can be used for memory analysis but also for threat hunting through our memory queries and playbooks.
Corporate investigators need quick actionable intelligence in cases ranging from data breaches to insider threats in environments spanning from associate endpoints to cloud sources. AXIOM Cyber’s network acquisition capabilities allow examiners to connect and acquire data from employee endpoints discreetly while collecting hard drive contents and memory. Join Chris Blight, Solutions Consultant at Magnet Forensics, … Continued
In this blog, we will provide best practices for examining mobile consent devices, so you are well equipped to process it.
In this presentation, we will demonstrate how you can collect data from Google Workspace, while also sharing best practices for collection and what data is included in this acquisition. From there, you’ll see how to bring these results into Magnet AXIOM for robust analysis.
As examiners, we often find ourselves wanting to know if a program was executed on a system, when it was executed on a system, or if a program or file ever existed on a system.
When performing a remote collection of a remote endpoint using AXIOM Cyber, sometimes you need to quickly triage the target by looking for a specific piece of evidence, perhaps a particular file for example. Join Lynita Hinsch, Magnet Forensics Solutions Consultant, as she shows off some tips and tricks about how you can use index … Continued