Listen to talk about computer forensic analysis, techniques, methodology, tool reviews and more.
…
continue reading
Are you an Orthodontist wondering how to grow your practice in this fast-paced, competitive marketplace that seems to be changing every day? The Golden Age of Orthodontics, formerly The Survival Guide for Orthodontists podcast, is dedicated to making you the authority in orthodontics to prospective new patients in your community. Dr. Leon Klempner and Amy Epstein, co-founders of People & Practice, know the business of orthodontics. They bring you insights, tips and guest interviews focused o ...
…
continue reading
One of the essential skill sets for a DFIR analyst is the ability to understand the impact of vulnerabilities quickly. In many IR scenarios, you may find a newly discovered vulnerability or receive a scan that flags multiple potential weaknesses. To stay efficient, you must...
…
continue reading

1
Ep. 71 - Scaling Smart with KLOwen: Digital Bonding That Reduces Doctor Time with Dr. Brandon Owen
44:05
44:05
Play later
Play later
Lists
Like
Liked
44:05What if you could cut appointment times nearly in half and reduce total visits without sacrificing results? On this episode of The Golden Age of Orthodontics, Dr. Leon Klempner and Amy Epstein talk with Dr. Brandon Owen, founder of KLOwen Braces, about the power of digital customization, indirect bonding, and how to ease your practice into next-gen…
…
continue reading
This week, we’re exploring the System Resource Usage Monitor (SRUM) – a powerful source of forensic data within Windows operating systems. First introduced...
…
continue reading
In this episode, our focus is on understanding how attackers achieve lateral movement and persistence through Secure Shell (SSH)—and more importantly, how to spot the forensic traces...
…
continue reading
In this episode, we’ll take a focused look at how to triage one of the most commonly targeted Windows processes: svchost.exe. While the methods in this series generally apply to all Windows core processes, svchost is an especially important case because attackers...
…
continue reading

1
Ep. 70 - The Power of Pedo-Ortho Partnerships with Dr. Chris Teeters
23:39
23:39
Play later
Play later
Lists
Like
Liked
23:39Welcome to The Golden Age of Orthodontics, hosted by Dr. Leon Klempner and Amy Epstein. As GP referral models shift and corporate dental groups expand, more pediatric dentists and orthodontists are joining forces to stay competitive. But is this model right for everyone? Today, we’re joined by Dr. Chris Teeters, an orthodontist who collaborates wit…
…
continue reading
Ransomware attacks move quickly, making your initial response crucial in minimizing impact. This episode outlines critical first steps, from isolating infected machines to gathering key information and initiating containment. Whether you’re a SOC analyst, incident responder, or the first to notice an attack, this framework is designed to help you r…
…
continue reading
Today’s episode explores Apple Spotlight and its extended metadata—a powerful yet often overlooked forensic tool in the Mac ecosystem. Spotlight plays a critical role in uncovering digital evidence on macOS. Both experienced forensic analysts and newcomers will find its capabilities essential. Let’s dive into the details.…
…
continue reading
BIN directories (short for binary) store command binaries like CD, PWD, LS, Vi, and CAT. Every platform has multiple BIN directories: two in the root directory and two in each user directory. This episode explains the types of files in these directories and the purpose of each BIN directory. I will also clarify which directories are typically used …
…
continue reading
Modern Windows systems use a tightly coordinated sequence of core processes to establish secure system and user environments. DFIR investigators and incident responders must understand the interrelationships between processes such as Idle, SMSS, CSRSS, WININIT, and WINLOGON. Recognizing expected behaviors and anomalies in these steps is crucial for…
…
continue reading
Today we’re talking all about MacOS AutoRun locations and how to spot persistence mechanisms. We’ll explore the ins and outs of property list files, launch daemons, system integrity protections, and the recent changes in macOS that can impact your forensic examinations...
…
continue reading

1
Ep. 69 - Why Dr. Adam Reynolds Made Grin the Backbone of His Modern Orthodontic Practice
31:44
31:44
Play later
Play later
Lists
Like
Liked
31:44Welcome to The Golden Age of Orthodontics, the podcast that helps orthodontists compete on expertise and trust. Hosted by Dr. Leon Klempner and Amy Epstein, this show explores technology and strategies shaping modern orthodontics. In this episode, Dr. Adam Reynolds shares how Grin’s remote monitoring transformed his practice, improving efficiency, …
…
continue reading
This week I'm talking about the three task hosts. These are Windows core files, and they share not only similar names, but similar functionality. Because of this, there is the potential for confusion, which may allow an attacker to leverage these similarities and mask they are malware. My goal in this episode is to demystify the three different tas…
…
continue reading
Today’s episode is all about Windows event logs that record blocked network connections. Blocked network events are interesting because they might signal that an attacker’s secondary or tertiary toolset isn’t working as intended. That’s good news from a security standpoint...
…
continue reading
Today I cover an evolving threat in the cybersecurity world: data brokers. From a computer forensics standpoint, this threats pose unique challenges. While breaches capture headlines, data brokers play a major (and sometimes overlooked) role in fueling cybercrime. In this session, we will explore how these threats operate, why they are dangerous, a…
…
continue reading

1
Ep 68 - Comparing and Contrasting New Aligner Innovations with Dr. Neil Warshawsky
40:25
40:25
Play later
Play later
Lists
Like
Liked
40:25Welcome to The Golden Age of Orthodontics, the podcast that keeps orthodontists ahead of the curve in innovation and patient care. Join hosts Dr. Leon Klempner and Amy Epstein as they explore groundbreaking advancements shaping the future of orthodontics. In today’s episode, they welcome Dr. Neil Warshawsky, founder of Get It Straight Orthodontics,…
…
continue reading
The Common Vulnerability Scoring System (CVSS) is a powerful tool for assessing the severity and impact of security vulnerabilities. In digital forensics and incident response, CVSS scores can provide critical context to prioritize investigations and focus on the most significant risks. This episode I will explore how leveraging CVSS scoring enhanc…
…
continue reading
Understanding the behavior and characteristics of common file types used in attacks, such as executables, scripts, and document files, is essential for effective analysis. In this episode, we will explore practical approaches to triage malware, focusing on key indicators and techniques for prioritizing investigations.…
…
continue reading
Windows permit events, often overlooked, offer valuable details about allowed network connections that can reveal patterns of malicious activity. In this episode, we will dive into how analyzing these events can enhance network triage, enabling security teams to detect, scope, and respond to threats more effectively.…
…
continue reading
Security risk assessments can be a tool for guiding and prioritizing incident response investigations. By evaluating the potential impact and likelihood of various threats, these assessments provide a structured framework to identify and mitigate risks effectively. This episode will explore how integrating security risk assessments into incident re…
…
continue reading