Author: Tony DeGonia

Job Seeker’s Confidence Remains Low

The job market is tough right now — and Americans are feeling it. Confidence in finding or keeping a job remains near record lows, according to the latest LinkedIn Workforce Confidence survey.

Read More »

The ATS Resume Scam Targeting Job Seekers on LinkedIn

If you’ve been on LinkedIn while job hunting, you’ve probably been approached by “recruiters” offering to connect you with amazing opportunities — only to later tell you your resume isn’t “ATS compliant” and refer you to their “professional resume writer” for hundreds of dollars.

Read More »

ATS Resume Optimization: 2025 Master Guide

Over 90% of mid-to-large companies use Applicant Tracking Systems (ATS) to filter resumes before a recruiter ever sees them. Even if you’re a perfect fit, you can be rejected instantly if the ATS doesn’t rank you high enough.

Read More »

Fortinet Marketing

One of the coolest things I have experienced happened to me today. I was doing some research on the internet. I ran across marketing material from a major company I had never worked for before that used an article I had written for AT&T Cybersecurity.

Read More »

DNS: Types of DNS Records, DNS Servers and DNS Query Types

DNS is a global system for translating IP addresses to human-readable domain names. When a user tries to access a web address like “example.com,” their web browser or application performs a DNS Query against a DNS server, supplying the hostname. The DNS server takes the hostname and resolves it into

Read More »

The Top 6 DNS Attack Vectors per ChatGPT

The Domain Name System (DNS) is a critical infrastructure that is used to translate domain names into IP addresses, and it plays a key role in the functioning of the internet. As such, DNS is a common target for cyber-attacks, and there are several different types of threat vectors that

Read More »

The 10 Domains of Cybersecurity

What, you might ask, are industries and domains within cybersecurity? Simply put, industries are groups of related companies based on their primary business activities. Fields are specified spheres of knowledge and action within a discipline. Why is it essential for those interested in a cybersecurity career to know the top

Read More »