Working With Dell Data Protection Encryption (DDPE) in AXIOM Cyber
Sometimes the tools that have been put in place to protect our data can actually become roadblocks in our forensic investigations.
Sometimes the tools that have been put in place to protect our data can actually become roadblocks in our forensic investigations.
The latest release of AXIOM Cyber – version 6.5 introduces several new and exciting features including: support for Dell Data Protection Encryption (DDPE), new remote volatile artifacts, added evidence sources and features for Email Explorer, and additional artifact details in Timeline view.
When you need to quickly narrow the scope of your investigation to analyze the data related to a crime or activity that occurred at a specific time, the Timeline explorer in Magnet AXIOM & Magnet AXIOM Cyber offers you an intuitive interface that surfaces time relevant evidence in a visual manner.
In this series, we walk through how to ingest images from a variety of third party sources into Magnet AXIOM.
By resolving only the symptoms of a security incident, instead of the actual core issue, organizations can open themselves up to similar attacks in the future.
With a remote workforce that’s larger than ever, the need to collect data from endpoints not connected to the corporate network has never been greater. It’s critical to have the ability to collect and analyze off-network computers when you have an incident that needs to be investigated. Plus, you need to know what you can … Continued
This webinar will cover the latest threats the Healthcare and Public Health (HPH) sector faces, from Ransomware to Business Email Compromises, HIPPA and FTC notification requirements, incident response planning using both the NIST and ISO frameworks, and digital forensic solutions that help the HPH sector automate cybersecurity incident response and conduct a root cause analysis.
Here are a few mobile device forensics dos and don’ts that can help you and your agency ensure you are following best practices.
In this presentation we will cover the main current features of Comae, and how the platform can be used for memory analysis but also for threat hunting through our memory queries and playbooks.
Corporate investigators need quick actionable intelligence in cases ranging from data breaches to insider threats in environments spanning from associate endpoints to cloud sources. AXIOM Cyber’s network acquisition capabilities allow examiners to connect and acquire data from employee endpoints discreetly while collecting hard drive contents and memory. Join Chris Blight, Solutions Consultant at Magnet Forensics, … Continued