Enterprise Turns To AI For Speed And Accuracy In DFIR

Hero Image

Magnet Forensics explores how AI is revolutionizing speed and accuracy in DFIR....

Breaking Digital Barriers: Galaxy S25 & Z Flip Fully Supported

Breaking Digital Barriers: Galaxy S25 & Z Flip Fully Supported

Gain full filesystem access to the latest Samsung Galaxy devices with MD-NEXT....read more

Digital Forensics Round-Up, August 13 2025

Digital Forensics Round-Up, August 13 2025

Read the latest DFIR news – evidence of Kohberger’s detailed murder preparations, an alarming rise in child sextortion cases, Brian Carrier’s new mini-course on automation and AI in forensics, and more....read more

Well-Being In Digital Forensics And Policing: Insights From Hannah Bailey

Well-Being In Digital Forensics And Policing: Insights From Hannah Bailey

Hannah Bailey shares her journey from frontline policing to founding Blue Light Wellbeing, explaining why culturally-aware mental health support is crucial for DFIs and frontline workers....read more

YouDetect – for classifying illegally acquired multimedia files

by Jonathan Murphy, 7Safe "Whilst all instances of the illegal acquisition of multimedia are not known, it is not possible to gain a complete loss value, but a loss of $12.5 billion has been suggested by the IPI. Continued response

Advice for Digital Forensics Job Seekers

by Joe Alonzo "You see the job advertisements posted on the web everyday, Digital Forensics Analyst, Internet Investigator, Computer Forensic Associate. You hit the Apply Now button, often never hearing back from said company. Your background may consist of computer

Advice for Digital Forensics Job Seekers

by Joe Alonzo joe.alonzo@glenmontgroup.com You see the job advertisements posted on the web everyday, Digital Forensics Analyst, Internet Investigator, Computer Forensic Associate.  You hit the Apply Now button, often never hearing back from said company. Your background may consist of

AccessData Announces Computer Forensics Software Replacement Program

AccessData Group has announced a new program to allow current users of other computer forensics solutions to replace their tools with AccessData’s Forensic Toolkit (FTK) by just paying the cost of software maintenance – $840. Those who choose to take

Forensic Toolkit v3 Tips and Tricks – Re-indexing a case

by Brian K. Glass "So you’ve created a case in FTK 3.X / Oracle and added 20 forensic images of seized computers and assorted media which previously had been successfully processed and indexed. You’ve worked on this case for weeks,

Forensic Toolkit v3 Tips and Tricks – Re-indexing a case

This is the first in a series of articles that will cover topics concerning AccessData Forensic Toolkit (FTK) version 3. So you’ve created a case in FTK 3.X / Oracle and added 20 forensic images of seized computers and assorted

Cyber warfare defended through forensics

Cyber warfare is considered by many to be the most serious homeland security threat of our time and solutions seem intractable. Many experts believe scrapping the Internet altogether and rebuilding with draconian safeguards is the only answer. If not to

Law enforcement needs to get smart about collecting digital evidence

The time has come to empower frontline law enforcement officers to make better decisions when seizing digital evidence, says forensic analyst Andrew Sheldon. The number of computer forensic specialists is growing, but there will never be enough to cope with

Forensics in the Cloud: 5 Hot Skills

When it comes to collecting forensic evidence from cloud providers and determining whether a data breach has occurred, what used to take two weeks now takes a month for Greg Thompson, vice president of enterprise security services at Scotia Bank.

Publishing articles at Forensic Focus

Forensic Focus is always keen to publish articles, papers or blog posts of interest to the digital forensics community. Articles are published not only online but also included in the monthly newsletter (sent to over 12,00 subscribers) and promoted via

New CESG initiative builds on IISP Skills Framework

As part of the UK Government’s investment in cyber security, a consortium comprising the IISP (Institute of Information Security Professionals), CREST (Council for Registered Ethical Security Testers) and Royal Holloway’s Information Security Group (ISG) has been appointed by CESG to

What is “good enough” information security?

by Simon Biles "I have, occasionally in the past, mentored people in (on?) Information Security – once for money (this is not a revenue stream that I’ve mastered by any stretch of the imagination!), but more often than not, informally

What is “good enough” information security?

by Simon Biles I have, occasionally in the past, mentored people in (on?) Information Security – once for money (this is not a revenue stream that I’ve mastered by any stretch of the imagination!), but more often than not, informally