Author: Tony DeGonia

What makes a cybersecurity sales engineer?

A cybersecurity sales engineer is a crucial link between the technical aspects of cybersecurity solutions and the sales process. Here are some key components that make up a successful cybersecurity sales engineer:

Read More »

The Role of a Corporate Evangelist in Cybersecurity

In cybersecurity, trust is everything. Customers don’t just buy products — they buy confidence that the technology will solve real problems, integrate into their environment, and keep their data safe. One of the most powerful ways companies build that confidence is through a role often overlooked: the corporate evangelist.

Read More »

Fortinet Marketing

One of the coolest things I have experienced happened to me today. I was doing some research on the internet. I ran across marketing material from a major company I had never worked for before that used an article I had written for AT&T Cybersecurity.

Read More »

DNS: Types of DNS Records, DNS Servers and DNS Query Types

DNS is a global system for translating IP addresses to human-readable domain names. When a user tries to access a web address like “example.com,” their web browser or application performs a DNS Query against a DNS server, supplying the hostname. The DNS server takes the hostname and resolves it into

Read More »

The Top 6 DNS Attack Vectors per ChatGPT

The Domain Name System (DNS) is a critical infrastructure that is used to translate domain names into IP addresses, and it plays a key role in the functioning of the internet. As such, DNS is a common target for cyber-attacks, and there are several different types of threat vectors that

Read More »

How Network Traffic Can Mask A Serious Cyber Threat

Our network is always moving. Data flows from place to place, between all the endpoints that require rapid internet access. But like any traffic, this data can become congested – and some of it can be dangerous.  You never quite know what is hidden in your network traffic until it

Read More »

Can Cybersecurity be Automated?

Cybersecurity is time- and resource-intensive. The threat landscape continues to evolve, and security analysts are feeling burnt out. According to research, 54% of security operation center (SOC) teams say that they are drowning in alerts, and 55% are not confident that they can prioritize alerts or respond effectively. Effective cybersecurity requires

Read More »