AI Unpacked #3 : Digital crossroads — the intersection of AI and the law
A key consideration in any digital forensic examination in the public safety sector is ensuring that the evidence would be court-ready.
A key consideration in any digital forensic examination in the public safety sector is ensuring that the evidence would be court-ready.
With the recent Magnet Axiom and Axiom Cyber 9.0 releases we added several new and exciting capabilities. In the short time since that release, we’ve continued to roll out updates refining and iterating on those features. In addition to continually expanding and updating the artifact support to help provide insights from the latest apps and … Continued
Did you hear the news? Magnet User Summit and Magnet Virtual Summit are coming back in 2026 to help redefine and rediscover what’s possible in DFIR in 2026! Magnet Virtual Summit will take place February 23-27 while Magnet User Summit returns to Nashville April 20-22—and we’re opening submissions for speaking spots at both events. Magnet … Continued
Digital forensic consultants are constantly faced with unfamiliar hardware, technologies, data structures, and problems. While this makes our work exciting, it also makes it challenging. How do you approach solving a problem you haven’t faced before? How do you navigate roadblocks that seem insurmountable? How do you know when a promising lead becomes a rabbit hole that you need to stop following?
This is the fourth blog post in a series of five about recovering Business Applications & OS Artifacts for your digital forensics investigations. What are prefetch files? Prefetch files are great artifacts for forensic investigators trying to analyze applications that have been run on a system. Windows creates a prefetch file when an application is … Continued
This is the third blog post in a series of five about recovering Business Applications & OS Artifacts for your digital forensics investigations. What are LNK files? LNK files are a relatively simple but valuable artifact for the forensics investigator. Shortcut files link to an application or file commonly found on a user’s desktop or … Continued
In this episode of Mobile Unpacked, we’ll explore mobile operating system’s file and photo timestamps with special guest Brandon Epstein.
Insider threats, particularly those involving intellectual property theft, pose a substantial financial risk to organizations.
Digital evidence can play an important part in achieving justice for victims and solving cases. But backlogs can often grow faster than budgets, making a modern digital forensics program feel out of reach.
Magnet Griffeyeソフトウェアは、デジタル・フォレンジック、特に児童搾取のような機密性の高いコンテンツが関する事件で重要な役割を果たします。その高度な機能のおかげで、検査官が画像を手作業で確認する必要性が減り、トラウマになるコンテンツに触れる機会が制限されます。Griffeyeは、無関係なデータの分類やフィルタリングなどの作業を自動化することで捜査官のメンタルヘルスを保護し、捜査の効率を維持しながらも心理的負担を軽減します。
本ウェビナーで、Magnet Griffeyeについて詳しくご説明します。
ウェビナーは英語で行われますが、日本語の字幕が入ります。ウェビナーを視聴する際は、ビデオ・コンソールの「CC」タブで言語を選択してください。