Prioritization At Binalyze

Here at Binalyze, as in any product team, one of our biggest challenges in product development is prioritization. The decisions about where to focus our energies and the general order of our work impact a large number of our teams.

How To Scan A Mobile Device With Mobile Device Investigator

In today’s digital age, mobile devices have become an integral part of our lives. They store a wealth of personal information, making them an attractive target for malicious actors. Whether you’re an investigator, a digital forensics expert, or simply concerned

Automated Compromise Assessment With DRONE

DRONE is AIR’s built-in automated compromise assessment technology which dramatically reduces the time required to identify IOCs in a DFIR investigation and begin containment and remediation. DRONE flies above your live systems and data acquisitions to deliver an unparalleled decision

How To Use Rapid Hash Matching In The Battle Against CSAM

Technology has fast become a double-edged sword: the same advancements that allow for a more connected and more enjoyable life also put child safety at terrible risk. Child sexual abuse materials (CSAM) can nowadays be found in virtually any online

How AI Is Helping Law Enforcement Combat Human Trafficking

Artificial intelligence is the simulation of human intelligence processes by computer systems. AI systems are given vast amounts of training data that will be analyzed for correlations and patterns. Once the AI system analyzes these patterns it can make predictions

Combating Cyberterrorism: How Crypto Forensics Can Help

As cyber threats and online criminal activities continue to become more sophisticated, it is essential to understand the complexities of the digital world and how the latest advancements in crypto forensics can help combat cyberterrorism. Cyberterrorism is unlawful attacks and

Offline Collection With Binalyze AIR

The reality of modern incident response is that it’s not always possible to remotely connect with every one of your endpoints. Some assets are required to be standalone and others, such as laptops, may have become faulty, and others may

How To Combat The UK’s Growing Forensics Backlog

Forensic backlogs are an increasing concern for many law enforcement agencies. Agencies must shift from simply collecting digital evidence to effectively analyzing the digital evidence collected. Media analysis is time-intensive and requires training to ensure that all pieces of evidentiary

Types Of Devices Examined In Digital Forensics Investigations

Today, digital forensic investigators must be adept at extracting evidence from an array of devices, each with unique structures, operating systems, storage capabilities, and security features. A case involving a desktop computer, for example, may require an understanding of operating

The Power Of Auto Asset Tagging In DFIR

When a breach occurs one of the first questions the investigating team leader will want answered is, ‘how many of our assets could this potentially impact or has it already impacted?’ To best answer that question you’ll need to know