Magnet Forensics Acquires Cybersecurity Software Firm Comae Technologies
Magnet Forensics has acquired the strategic IP assets of Comae Technologies, a company that specializes in cloud-based memory analysis.
Magnet Forensics has acquired the strategic IP assets of Comae Technologies, a company that specializes in cloud-based memory analysis.
This presentation will address the similarities and difference between cyber hygiene and cyber security frame
In the United States, 62% of Insider Threats are data exfiltration. This is, by far, the most common type of Insider Threat, with three times more frequency than the second most common Insider Threat: privileged misuse. Data exfiltration or IP theft, is simply when data walks out the door of your business. These types of … Continued
While ransomware and phishing attacks seem to dominate cybersecurity headlines and mindshare, there is another threat, one that is arguably stealthier and more dangerous: business email compromise (BEC) or also sometimes called CEO fraud. A business email compromise attack uses the principles of social engineering where a threat actor will send a well-crafted email that’s tailored to an individual or a … Continued
Learn how to conduct an eDiscovery digital forensic investigation in 4 steps, with real examples from the DFIR experts at Magnet Forensics.
As part of National Cyber Security Awareness Month, Jessica Hyde takes a moment to recap the Magnet Virtual Summit 2021 Career Day.
Elan Wright, aka DFIR Diva, dives into some ways you may be interested in getting started in the DFIR field in this guest blog.
Every October, organizations everywhere bring the importance of cybersecurity to light through Cybersecurity Awareness Month.
Learn how digital forensics can strengthen your cybersecurity posture and improve your Incident Response plan.
Delve into a data breach investigation with a step-by-step walkthrough of what you may expect and how to perform your examination.