• Training
  • Support
  • English
Explore Products
  • Products
    • Public safety
      • Magnet OneYour Investigative Edge
      • Magnet AxiomRecover and analyze all your evidence in one case
      • Magnet GraykeyLawfully access and extract data from mobile devices
      • Magnet Graykey FastrakExtract data from multiple mobile devices simultaneously
      • Magnet AutomateClose cases faster by automating your workflow
      • Magnet ReviewAnalyze digital evidence from your browser
      • Magnet WitnessStreamline Your DVR Video Recovery and Analysis
      • Magnet OutriderQuickly preview devices for CSAM and illicit apps
      • Magnet GriffeyeSwiftly process and analyze vast volumes of digital media
      • Magnet VerifyDiscover the truth behind media evidence
      • Your Investigative Edge

        Learn More
        • Magnet AxiomRecover and analyze all your evidence in one case
        • Magnet GraykeyLawfully access and extract data from mobile devices
        • Magnet Graykey FastrakExtract data from multiple mobile devices simultaneously
        • Magnet AutomateClose cases faster by automating your workflow
        • Magnet ReviewAnalyze digital evidence from your browser
        • Magnet WitnessStreamline Your DVR Video Recovery and Analysis
        • Magnet OutriderQuickly preview devices for CSAM and illicit apps
        • Magnet GriffeyeSwiftly process and analyze vast volumes of digital media
        • Magnet VerifyDiscover the truth behind media evidence
    • Federal agencies
      • Magnet OneYour Investigative Edge
      • Magnet AxiomRecover and analyze all your evidence in one case
      • Magnet Axiom CyberSimplify your corporate investigations
      • Magnet GraykeyLawfully access and extract data from mobile devices
      • Magnet Graykey FastrakExtract data from multiple mobile devices simultaneously
      • Magnet AutomateClose cases faster by automating your workflow
      • Magnet ReviewAnalyze digital evidence from your browser
      • Magnet WitnessStreamline Your DVR Video Recovery and Analysis
      • Magnet OutriderQuickly preview devices for CSAM and illicit apps
      • Magnet GriffeyeSwiftly process and analyze vast volumes of digital media
      • Magnet VerifyDiscover the truth behind media evidence
      • Your Investigative Edge

        Learn More
        • Magnet AxiomRecover and analyze all your evidence in one case
        • Magnet Axiom CyberSimplify your corporate investigations
        • Magnet GraykeyLawfully access and extract data from mobile devices
        • Magnet Graykey FastrakExtract data from multiple mobile devices simultaneously
        • Magnet AutomateClose cases faster by automating your workflow
        • Magnet ReviewAnalyze digital evidence from your browser
        • Magnet WitnessStreamline Your DVR Video Recovery and Analysis
        • Magnet OutriderQuickly preview devices for CSAM and illicit apps
        • Magnet GriffeyeSwiftly process and analyze vast volumes of digital media
        • Magnet VerifyDiscover the truth behind media evidence
    • Military & intelligence
      • Magnet OneYour Investigative Edge
      • Magnet AxiomRecover and analyze all your evidence in one case
      • Magnet Axiom CyberSimplify your corporate investigations
      • Magnet GraykeyLawfully access and extract data from mobile devices
      • Magnet Graykey FastrakExtract data from multiple mobile devices simultaneously
      • Magnet AutomateClose cases faster by automating your workflow
      • Magnet ReviewAnalyze digital evidence from your browser
      • Magnet WitnessStreamline Your DVR Video Recovery and Analysis
      • Magnet OutriderQuickly preview devices for CSAM and illicit apps
      • Magnet GriffeyeSwiftly process and analyze vast volumes of digital media
      • Magnet VerifyDiscover the truth behind media evidence
      • Your Investigative Edge

        Learn More
        • Magnet AxiomRecover and analyze all your evidence in one case
        • Magnet Axiom CyberSimplify your corporate investigations
        • Magnet GraykeyLawfully access and extract data from mobile devices
        • Magnet Graykey FastrakExtract data from multiple mobile devices simultaneously
        • Magnet AutomateClose cases faster by automating your workflow
        • Magnet ReviewAnalyze digital evidence from your browser
        • Magnet WitnessStreamline Your DVR Video Recovery and Analysis
        • Magnet OutriderQuickly preview devices for CSAM and illicit apps
        • Magnet GriffeyeSwiftly process and analyze vast volumes of digital media
        • Magnet VerifyDiscover the truth behind media evidence
    • Enterprise
      • Magnet Axiom CyberSimplify your corporate investigations
      • Magnet NexusLarge-scale investigations, made easy
      • Magnet VerakeyAdvanced consent-based mobile data extraction
      • Magnet AutomateAutomate tools and tasks across your DFIR lab
      • Magnet ReviewAnalyze digital evidence from your browser
      • Magnet Verakey FastrakExtract data from multiple mobile devices simultaneously
    • Service providers
      • Magnet Axiom CyberSimplify your corporate investigations
      • Magnet NexusLarge-scale investigations, made easy
      • Magnet VerakeyAdvanced consent-based mobile data extraction
      • Magnet AutomateAutomate tools and tasks across your DFIR lab
      • Magnet ReviewAnalyze digital evidence from your browser
      • Magnet GriffeyeSwiftly process and analyze vast volumes of digital media
      • Magnet Verakey FastrakExtract data from multiple mobile devices simultaneously
  • Resources
    • All resources
          • All Resources

            Check out the latest resources and thought leadership for all resources.

            Explore All Resources

            Content Types

            • Blogs
            • Case studies
            • White papers
            • Videos
            • Webinars
            • How-tos
            • Events
            • Customer stories
            • Efficiency Calculator
            • Free tools
            • Grants for law enforcement
            • Artifact exchange
            • Mobile Unpacked with Chris Vance
            • Cyber Unpacked
            • AI Unpacked
            • Legal Unpacked
            • Investigators' Corner
            • Trust & Security
    • Resources By Industry

    • Enterprise
          • Enterprise Resources

            Check out the latest resources and thought leadership for enterprises and corporate digital investigations.

            Explore All Enterprise Resources

            Content Types

            • Blogs
            • Case studies
            • White papers
            • Videos
            • Webinars
            • How-tos
            • Events
            • Customer stories
            • Free tools
            • Artifact exchange
            • Mobile Unpacked with Chris Vance
            • Cyber Unpacked
            • AI Unpacked
            • Legal Unpacked
            • Trust & Security
    • Public safety
          • Public Safety Resources

            Check out the latest resources and thought leadership for public safety.

            Explore All Public Safety Resources

            Content Types

            • Blogs
            • Case studies
            • White papers
            • Videos
            • Webinars
            • How-tos
            • Events
            • Customer stories
            • Efficiency Calculator
            • Free tools
            • Grants for law enforcement
            • Artifact exchange
            • Mobile Unpacked with Chris Vance
            • AI Unpacked
            • Legal Unpacked
            • Investigators' Corner
            • Trust & Security
    • Service providers
          • Service Providers Resources

            Check out the latest resources and thought leadership for forensic service providers.

            Explore All Service Provider Resources

            Content Types

            • Blogs
            • Case studies
            • White papers
            • Videos
            • Webinars
            • How-tos
            • Events
            • Customer stories
            • Free tools
            • Artifact exchange
            • Mobile Unpacked with Chris Vance
            • Cyber Unpacked
            • AI Unpacked
            • Legal Unpacked
            • Trust & Security
    • Federal agencies
          • Federal Agencies Resources

            Check out the latest resources and thought leadership for federal agencies and government.

            Explore All Federal Agencies Resources

            Content Types

            • Blogs
            • Case studies
            • White papers
            • Videos
            • Webinars
            • How-tos
            • Events
            • Customer stories
            • Efficiency Calculator
            • Free tools
            • Artifact exchange
            • Mobile Unpacked with Chris Vance
            • Cyber Unpacked
            • AI Unpacked
            • Legal Unpacked
            • Trust & Security
    • Military & intelligence
          • Military & Intelligence Resources

            Check out the latest resources and thought leadership for military, defense, and intelligence.

            Explore All Military & Intelligence Resources

            Content Types

            • Blogs
            • Case studies
            • White papers
            • Videos
            • Webinars
            • How-tos
            • Events
            • Customer stories
            • Efficiency Calculator
            • Free tools
            • Artifact exchange
            • Mobile Unpacked with Chris Vance
            • AI Unpacked
            • Legal Unpacked
            • Trust & Security
  • Our community
    • Officer wellness
    • Magnet Voices Program
    • Scholarship program
    • Agency Impact Award
  • Partners
    • Why partner with Magnet Forensics?
    • Strategic partners
    • Channel partners
    • Training partners
  • Why Magnet
  • Company
    • Our team
    • Careers
    • Press
  • Training
  • Support
    • English
  • English

Topic: Cloud

Learnings from Real World Cloud Data Breaches

December 13, 2022

By David Camargo

Cloud-based cyberthreats can come in many different forms: whether from misconfigured firewalls, disgruntled employees, or unsecured cloud storage, each of which pose very serious and significant risk.

Enhancing Your Incident Response Playbook With Magnet AXIOM Cyber

December 8, 2022

By Phil Froklage

Cybersecurity teams need to prioritize developing, implementing, and updating their incident response playbooks.

Digital Evidence from Social Networking Sites & Smartphone Apps

September 13, 2022

By Alison Werezak

According to Statista.com in 2022, the global social penetration rate reached 58.4% percent, with Northern Europe and Western Europe having g the highest penetration rate at 85 percent and 84 percent, respectively. As of July 2022, 9 in 10 Internet users have social media accounts per Datareportal. Many technology thought leaders believe social networking will displace traditional email as the leading communication medium.

This presentation will provide a practical walkthrough of preservation of top social media sites and how to effectively utilize tools for evidentiary collection across the Web, PCs/desktops and smart devices. We will look at social media apps on smartphones and what digital evidence exists compared to what can be found on the cloud. We will also explore innovations in emoji/avatar Apps such as Bitmoji.

Introduction to Comae Memory Queries

August 23, 2022

By Phil Froklage

In this presentation we will cover the main current features of Comae, and how the platform can be used for memory analysis but also for threat hunting through our memory queries and playbooks.

Tips & Tricks // Acquiring Data from the Cloud

August 9, 2022

By Phil Froklage

Join Kim Bradley, forensic consultant, as she shows you how to acquire data from cloud sources using different methods, such as user credentials and login tokens from mobile extractions. Each login method will allow you to acquire different types of data, so you’ll learn what data is available and how to quickly process acquired data … Continued

DFIR: What is Digital Forensics and Incident Response?

July 20, 2022

By Phil Froklage

Digital Forensics and Incident Response (DFIR), is often used to speak about both the digital forensics and incident response fields—related but separate areas. Let’s delve into what both digital forensics and incident response are and why they are often grouped together.

Digital Transformation

April 27, 2022

By Phil Froklage

Moving to the Cloud provides advantages in speed, scale, and security, reduces total cost of ownership, and increases investigative speed. Augmenting investigators and analysts with machine learning and artificial intelligence reduces backlog through automated data tagging, filtering, deduplication, and intelligent search.

Enhancing Digital Investigations with Cloud-based Evidence

April 27, 2022

By Phil Froklage

The cloud can be your best friend in conducting digital investigations. Increasing volumes of digital evidence, budget constraints and talent shortages can make it difficult for your lab to keep up with demand.

IoT Forensics – Apple Airtag and Crowd Sourced Tracking

April 27, 2022

By Phil Froklage

Since the release of the device, Apple’s latest IoT (or Internet of Things) product, the Airtag, has been a resounding success both commercially and technologically, but not without its share of issues.

Deploying Forensic Solutions in the Cloud

April 27, 2022

By Phil Froklage

When deploying cloud solutions in a LEO or consultative organization, we often keep the discussion focused on the legality of acquired data and storing it in the Cloud. This is important, but there are other things to consider such as how you will setup, deploy, secure and run the day-to-day when you’re in the Cloud.

Posts navigation

Older posts
Newer posts
We use cookies on our website.

To learn more about cookies, which ones we use on our site, and how to change your cookie settings, please view our Privacy Policy*. By continuing to use this site without changing your settings, you consent to our use of cookies in accordance with the Privacy Policy.*

View Privacy Policy Accept
Magnet Forensics Logo
Products
  • Magnet One
  • Magnet Axiom
  • Magnet Axiom Cyber
  • Magnet Graykey
  • Magnet Graykey Fastrak
  • Magnet Nexus
  • Magnet Verakey
  • Magnet Verakey Fastrak
  • Magnet Witness
  • Magnet Automate
  • Magnet Review
  • Magnet Outrider
  • Magnet Griffeye
  • Magnet Griffeye Operations
  • Magnet Griffeye Enterprise
  • Magnet Verify
Partners
  • Strategic partners
  • Channel partners
  • Training partners
Community
  • The Auxtera Project
  • Magnet Forensics Scholarship Program
  • Agency Impact Award
  • Merchandise store
  • Magnet Idea Lab
Company
  • Careers
  • Our team
  • Magnet Idea Lab
  • Press
Resources
  • Resource center
  • Events
  • Blog
  • Free tools
  • Artifact exchange
  • Officer wellness
  • Customer stories
  • Grants for law enforcement
Support
  • Investigators’ Corner
  • Customer portal
  • Contact us
  • Subscribe to our emails
Training
  • Training overview
  • Courses and certifications
1 (844) 638-7884 sales@magnetforensics.com
  • Accessibility
  • Legal
  • Cookie Policy
  • Export approach
  • Trust & Security
  • Privacy Policy
  • California Collection Notice
  • Terms of Use
  • Email Preferences

Copyright© 2025 Magnet Forensics

Start modernizing your digital investigations today.

Complete the company & contact information form below and sales will be in touch with you shortly.