Telling the Story of Digital Evidence

In digital forensics, demonstrating attribution—using operating system artifacts to prove that the suspect had knowledge of the document or image files found on a device—is one of the key elements of building a case. The...

Read more >

The Benefits of the Artifacts-Oriented Approach (Part 3)

Our previous two blogs covered the reasons why we think file system forensics’ marginal returns are rapidly diminishing, and the changes in consumer electronics that continue to drive the need for a focus on artifacts...

Read more >

Recorded Webinar: Mobile Trends, Tools, and Methods

Mobile forensic acquisition and analysis continue to challenge even the most experienced professionals in the industry. Encryption, various forms of device locks, and ever-new releases of devices, operating systems, apps, and versions constantly require forensic...

Read more >

Magnet AXIOM Advanced Computer Forensics (AX250) Now Open!

We’re proud to introduce a new course for people who are looking to expand the capabilities of their computer forensics investigations: Magnet AXIOM Advanced Computer Forensics (AX250). This is an expert-level four-day training course. It...

Read more >