DFIR in Zero-Trust Environments: Utilizing AXIOM Cyber for Remote Collection with Zscaler
work environments. This means that every instance of communication must be validated upon request, and then routed accordingly.
work environments. This means that every instance of communication must be validated upon request, and then routed accordingly.
Introducing our newest member of the Training Team, Nick Bria. Learn more about Nick’s varied and interesting background and what he’s hoping to bring to his role at Magnet Forensics. Let’s get to know Nick! Want to learn more about what courses are offered? Visit our Training & Certification page for more information. MF: Tell … Continued
One ongoing debate within the traditional computer forensics community has been how to respond to a running computer in the field. When you arrive on scene to a running computer, do you go straight to pulling the plug, or do you conduct an orderly shutdown of the computer?
We’re proud to announce the availability of Magnet AXIOM 5.10! You can upgrade to the latest version within AXIOM or over at the Customer Portal.
We’re happy to announce the availability of Magnet AXIOM Cyber 5.10! You can upgrade to the latest version within AXIOM Cyber or over at the Customer Portal.
Do you have a response plan for dealing with data stored in the cloud? Do you have the necessary accounts, access, logging, and knowledge on what to do if you need to collect evidence stored in AWS, Azure, or other provider or service? Maybe your organization has fully shifted to a cloud first approach or … Continued
Stephen Boyce, who served agencies of the U.S. State Department as well as the FBI, on the Magnet Digital Investigation Suite.
The complexity of digital investigations and the increasing volume of data requires you to need an enhanced approach to your digital investigations, so that you can better serve your customers without increasing headcount or requiring drastic investments in new digital forensic equipment.
In a previous blog post, we discussed why it is advantageous to utilize DD forensic images as opposed to E01 when analyzing hard drives from DVRs. In this post, we’ll look at another option – cloned hard drives. Cloned hard drives of the original DVR hard drive are often connected to the DVR in an … Continued
We’re excited that Magnet Summit 2022 registration is now open! Save your spot in-person in Nashville or our additional virtual event.