DFIRL Episode 02: Digital Footprints
Detective Chad Gish uses digital evidence to uncover a case in this episode of Digital Forensics In Real Life (DFIRL) podcast.
Detective Chad Gish uses digital evidence to uncover a case in this episode of Digital Forensics In Real Life (DFIRL) podcast.
This episode of Digital Forensics In Real Life Podcast Detective Larry McClain tells the story of how digital evidence uncovered the truth in his case.
While ransomware and phishing attacks seem to dominate cybersecurity headlines and mindshare, there is another threat, one that is arguably stealthier and more dangerous: business email compromise (BEC) or also sometimes called CEO fraud. A business email compromise attack uses the principles of social engineering where a threat actor will send a well-crafted email that’s tailored to an individual or a … Continued
Join Trey Amick and Curtis Mutter from Magnet Forensics and learn how to expedite your forensic cloud workflow with AXIOM Cyber. Curtis and Trey will save time at the end of the webinar to answer questions and provide input as to what’s next for AXIOM Cyber’s features.
Join Solutions Consultant, Lynita Hinsch and Sr. Product Manager, Dean Carlson as they demonstrate the added power that AXIOM Cyber has to support you with your corporate investigations and why now might be the right time to make the move to AXIOM Cyber.
Join Dallas Jordan and Craig Guymon from Magnet Forensics and learn how to leverage an AWS EC2 instance with AXIOM Cyber installed on it to remotely collect data from off-network endpoints.
Join Rick Whittington, Sr. Cloud Security Engineer and Trey Amick, Director of Forensic Consultants in this webinar where we’ll discuss several recent cloud data breaches, how they happened, how they could have been prevented, and how examiners can investigate sources like AWS and Azure with Magnet AXIOM Cyber.
Learn how to conduct an eDiscovery digital forensic investigation in 4 steps, with real examples from the DFIR experts at Magnet Forensics.
XFS parsing is now in AXIOM Cyber along with greater control for remotely acquiring data from proxy servers to segment networks.
Christopher joins us from a background in law enforcement running a digital forensics lab in South Carolina.