Digital Forensic Survival Podcast public
[search 0]
More
Download the App!
show episodes
 
Are you an Orthodontist wondering how to grow your practice in this fast-paced, competitive marketplace that seems to be changing every day? The Golden Age of Orthodontics, formerly The Survival Guide for Orthodontists podcast, is dedicated to making you the authority in orthodontics to prospective new patients in your community. Dr. Leon Klempner and Amy Epstein, co-founders of People & Practice, know the business of orthodontics. They bring you insights, tips and guest interviews focused o ...
  continue reading
 
Loading …
show series
 
What if you could cut appointment times nearly in half and reduce total visits without sacrificing results? On this episode of The Golden Age of Orthodontics, Dr. Leon Klempner and Amy Epstein talk with Dr. Brandon Owen, founder of KLOwen Braces, about the power of digital customization, indirect bonding, and how to ease your practice into next-gen…
  continue reading
 
Welcome to The Golden Age of Orthodontics, hosted by Dr. Leon Klempner and Amy Epstein. As GP referral models shift and corporate dental groups expand, more pediatric dentists and orthodontists are joining forces to stay competitive. But is this model right for everyone? Today, we’re joined by Dr. Chris Teeters, an orthodontist who collaborates wit…
  continue reading
 
Ransomware attacks move quickly, making your initial response crucial in minimizing impact. This episode outlines critical first steps, from isolating infected machines to gathering key information and initiating containment. Whether you’re a SOC analyst, incident responder, or the first to notice an attack, this framework is designed to help you r…
  continue reading
 
BIN directories (short for binary) store command binaries like CD, PWD, LS, Vi, and CAT. Every platform has multiple BIN directories: two in the root directory and two in each user directory. This episode explains the types of files in these directories and the purpose of each BIN directory. I will also clarify which directories are typically used …
  continue reading
 
Modern Windows systems use a tightly coordinated sequence of core processes to establish secure system and user environments. DFIR investigators and incident responders must understand the interrelationships between processes such as Idle, SMSS, CSRSS, WININIT, and WINLOGON. Recognizing expected behaviors and anomalies in these steps is crucial for…
  continue reading
 
Welcome to The Golden Age of Orthodontics, the podcast that helps orthodontists compete on expertise and trust. Hosted by Dr. Leon Klempner and Amy Epstein, this show explores technology and strategies shaping modern orthodontics. In this episode, Dr. Adam Reynolds shares how Grin’s remote monitoring transformed his practice, improving efficiency, …
  continue reading
 
This week I'm talking about the three task hosts. These are Windows core files, and they share not only similar names, but similar functionality. Because of this, there is the potential for confusion, which may allow an attacker to leverage these similarities and mask they are malware. My goal in this episode is to demystify the three different tas…
  continue reading
 
Today I cover an evolving threat in the cybersecurity world: data brokers. From a computer forensics standpoint, this threats pose unique challenges. While breaches capture headlines, data brokers play a major (and sometimes overlooked) role in fueling cybercrime. In this session, we will explore how these threats operate, why they are dangerous, a…
  continue reading
 
Welcome to The Golden Age of Orthodontics, the podcast that keeps orthodontists ahead of the curve in innovation and patient care. Join hosts Dr. Leon Klempner and Amy Epstein as they explore groundbreaking advancements shaping the future of orthodontics. In today’s episode, they welcome Dr. Neil Warshawsky, founder of Get It Straight Orthodontics,…
  continue reading
 
The Common Vulnerability Scoring System (CVSS) is a powerful tool for assessing the severity and impact of security vulnerabilities. In digital forensics and incident response, CVSS scores can provide critical context to prioritize investigations and focus on the most significant risks. This episode I will explore how leveraging CVSS scoring enhanc…
  continue reading
 
Security risk assessments can be a tool for guiding and prioritizing incident response investigations. By evaluating the potential impact and likelihood of various threats, these assessments provide a structured framework to identify and mitigate risks effectively. This episode will explore how integrating security risk assessments into incident re…
  continue reading
 
Loading …

Quick Reference Guide

Listen to this show while you explore
Play