Connections in Magnet AXIOM Q&A Part 1

This is the first part in a two-part series. You can read Part 2 here. In our previous blog post, “Telling the Story of Digital Evidence,” we outlined how the Connections feature in Magnet AXIOM...

Read more >

Telling the Story of Digital Evidence

In digital forensics, demonstrating attribution—using operating system artifacts to prove that the suspect had knowledge of the document or image files found on a device—is one of the key elements of building a case. The...

Read more >

The Benefits of the Artifacts-Oriented Approach (Part 3)

Our previous two blogs covered the reasons why we think file system forensics’ marginal returns are rapidly diminishing, and the changes in consumer electronics that continue to drive the need for a focus on artifacts...

Read more >

Recorded Webinar: Mobile Trends, Tools, and Methods

Mobile forensic acquisition and analysis continue to challenge even the most experienced professionals in the industry. Encryption, various forms of device locks, and ever-new releases of devices, operating systems, apps, and versions constantly require forensic...

Read more >