Productivity

O365 Client Migrator

The plan was to send e-mails asking 25K non-technical employees to manually execute complex PowerShell .ps1 scripts, set execution policies, then stare at 100's of lines of verbose tech jargon flying up a console window?

Uhhh NO. 

They assign me to the project...

NEW PLAN:

Everyone's laptop gets a "magic pill" that rebrands everything Office 365 related with the new company name, license, logos, even a new e-mail signature template... like they were hit with a Fairy Godmother's wand.

Privacy

CryptoBrick™

During a greenfield Active Directory deployment, Azure Information Protection and ADRMS might not be up yet.

In an "assumed breach" World, how do you protect sensitive files on Tier 2 workstations? Shared Tier 1 servers from internal threats?

I reprogrammed the Internet's worst ransomware which now locks out prying eyes and prevents hackers from "living off the land".

Compliance

Secure Torch™

Applications can communicate using weak, insecure SSL / TLS versions of the protocol on any port.

How do you discover where these security vulnerabilities exist

I reprogrammed the Internet's worst ransomware which now locks out prying eyes and prevents hackers from "living off the land".