Welcome to my Video and Podcast Page.

Here, you can view various videos and podcasts I have made since I started recording work videos and cybersecurity podcasts in 2008. Not all videos are of the greatest quality, but video recording and podcasting technology has come a long way since then.

My name is Tony DeGonia, and I am passionate about delivering top-notch cybersecurity solutions to protect businesses from cyber threats. My YouTube channel educates business owners and IT professionals on the latest SIEM, SOAR, MDR, XDR, firewalling, and threat management advancements. With years of experience under my belt, I take pride in designing custom cybersecurity solutions tailored to each client’s specific needs, whether they’re a small business or a large enterprise.

Cybersecurity Sales Engineer

Welcome to my Video and Podcast page. Here, you can view an assortment of videos and podcasts I have made since I started recording work videos and cybersecurity podcasts in 2008. Not all of the videos are of the greatest quality, but video recording and podcasting technology has come a long way since then.

Interview Questions with a Cybersecurity Sales Engineer

25 Videos

I had the privilege to interview with the fine folks at LogRhythm in early February 2023. It was a joy to meet Peter McNaul and his staff and cohorts. As I always try to do with every opportunity, I learned a few things about their SIEM platform. I was pleasantly surprised by the ease of use, breadth, and depth of the platform’s coverage. Even though I was on a demo of the platform (let’s face it, demos are always underpowered and pretty much useless), it was responsive. It never made me wait more than a few seconds to deliver a response to any of the commands I sent to the platform.

The Threat Intelligence feeds seemed very robust, and the ability to implement and correlate with the threat feeds was almost flawless. I didn’t get the opportunity to run through a deployment cycle, so I can’t speak for the ease of deployment, but whatever it takes, it’s well worth it. The system can ingest NetFlow in the cloud without blowing out the cloud elastic storage like some competitors do (AlienVault.).

The integrations with third-party security tools and utilities were exceptional. I have only seen three other systems with more integrations than Logrhythm, and they are all costly for the self-managed or Managed Detection and Response versions. Though I won’t divulge pricing here, LogRhythm is surprisingly affordable, considering all of the features combined with world-class security functionality, features, and feeds. They also offer a company a monitoring service and training to manage their deployment. You can deploy it in the cloud, on-premise, or via a hybrid solution incorporating both.

My advice… If you are looking for SIEM for your enterprise, look at LogRhythm! These guys are real players and can compete with the more prominent solutions in the industry from a functionality standpoint and be much easier to use. They can also compete price-wise with their down-market competitors and annihilate downmarket competition with functionality, correlation, and performance.

Cybersecurity Fundamentals

Episode 1 – DNS Basics

Cybersecurity Fundamentals is a series of short 5 – 15 minute videos designed to give the viewer a quick understanding of the technologies, best practices, threats, and defensive techniques that are prevalent, and affect users on the internet and in corporate networks around the world. We design these informational videos with everyday users of computing technologies in mind. In today’s episode, we will be covering DNS Basics.

DNS Basics cover a high-level overview of how the Domain Name System works, all the steps that occur in the 50 milliseconds between entering a domain name in your browser and a webpage opening. DNS seems like such a small thing but the foundation for it is big and robust and full of opportunities for attackers.

Please enjoy the video and we hope that you will walk away from this video with a better understanding of DNS.

You can watch the video to the left or you can download the full PowerPoint Presentation with embedded audio from the button below.

Download the PowerPoint Presentation with audio below if that is something you might find useful.

https://tonydegonia.com/wp-content/uploads/2023/01/Cybersecurity-Fundamentals-DNS-Basics-2.pptx

Episode 2 – DNS Attack Vectors

Cybersecurity Fundamentals is a series of short 5 – 15 minute videos designed to give the viewer a quick understanding of the technologies, best practices, threats, and defensive techniques that are prevalent, and affect users on the internet and in corporate networks around the world. We design these informational videos with everyday users of computing technologies in mind. In today’s episode, we will be covering DNS Attack Vectors.

In episode 2 DNS Attack Vectors we cover the six most used attack vectors. The DNS systems is the most attacked aspect of internetworking. According to Unit 42 threat research team “more than 80 percent of malware uses DNS to identify a command-and-control, or C2, server to steal data and spread malware.”

Please enjoy the video and we hope that you will walk away from this video with a better understanding of DNS.

You can watch the video to the left or you can download the full PowerPoint Presentation with embedded audio from the button below.

Download the PowerPoint Presentation with audio below if that is something you might find useful.

https://tonydegonia.com/wp-content/uploads/2023/01/Cybersecurity-Fundamentals-DNS-Attack-Vectors.pptx

Amazon Web Services

AWS Solutions Architect Projects

2 Videos

IndigoVision