Author: Tony DeGonia

How Network Traffic Can Mask A Serious Cyber Threat

Our network is always moving. Data flows from place to place, between all the endpoints that require rapid internet access. But like any traffic, this data can become congested – and some of it can be dangerous.  You never quite know what is hidden in your network traffic until it

Read More »

Can Cybersecurity be Automated?

Cybersecurity is time- and resource-intensive. The threat landscape continues to evolve, and security analysts are feeling burnt out. According to research, 54% of security operation center (SOC) teams say that they are drowning in alerts, and 55% are not confident that they can prioritize alerts or respond effectively. Effective cybersecurity requires

Read More »

2019: The Rise of the Government Data Breach

Data breaches are forever becoming more a part of everyday life in the United States. Hardly a day goes by when you can’t watch the news, read on the internet about another company having their networks breached by cybercriminals. Billions of records are exposed to hackers every year, 2019 was

Read More »

Building a home cybersecurity lab

Part of our blog series “How to prevent a WordPress site hack in 2019: lessons from a former hacker” Hello all and welcome to the first episode of a new blog series focused on how to prevent WordPress site hacks. In this first post of the series, I will provide

Read More »

Prevent WordPress hacking using this Pen Testing guide

Welcome back to the next edition of “Hacking WordPress”. Find Part 1 if you missed it. Let me start with a PSA message. It is illegal to hack, log in to, penetrate, take over or even hack, a system or network of systems without the explicit permission of the owner.

Read More »

Hacking WordPress: Building the Lab

Hello all and welcome to the first episode of the Hacking WordPress series. With this series, I will be putting together a series of videos and articles that will comprise a set of tutorials to show you the ins and outs of building a home lab that will give you

Read More »

10 Steps to Creating a Secure IT Environment

Every day, as a part of my work at AlienVault, I talk to prospective clients. Many of them are trying to put together a security plan for their business. Most of the people I talk to are IT professionals who, like everyone else, are learning as they go.

Read More »

The Dark Web has a Serious Deduplication Problem

In a post released on 1/8/19, I wrote about the record number of breaches in 2018. This brought to mind a podcast that I was listening to a few days back hosted by Corey Nachreiner, CTO of WatchGuard Technologies, Inc. on his 443 Podcast.

Read More »