Tulane University As a Sales Engineer, a particular aspect of the job has no defined description. You Learn More »
Industrial Control Use Case I designed this solution based on specs from AT&T USM Anywhere being used as the Learn More »
AT&T Marketing Collateral (Public Sector) Marketing Collateral AT&T Cybersecurity Public Sector Customer Summary of Challenges During my time at AT&T Learn More »
Sys Logic Technology Services, LLC. Marketing Collateral Sys Logic Technology Services, LLC Marketing Collateral 2024 Learn More »
Seminole State College Please register with our website for a Basic, Advanced, or Recruiter Learn More » WellStreet Urgent Care Please register with our website for a Basic, Advanced, or Recruiter Learn More » AT&T Managed Threat Detection and Response – Infrastructure Drawing Introducing the AT&T Managed Threat Detection and Response network architecture drawing, meticulously crafted in 2021 Learn More » ObserveIT Integration Use Case To integrate with a third-party application that will provide deep granular information into user activity Learn More » Jimbob’s Towing and Wrecker Service This is a fictitious network design and proposal for a fictitious towing company by a Learn More » IBM Security – Cost of Data Breach Report 2023 (Enablement) The IBM Security Market Insights team is renowned for its comprehensive reports, offering profound insights Learn More » DeKalb County School District Please register with our website for a Basic, Advanced, or Recruiter Learn More » Cybersecurity TechSegment Please register with our website for a Basic, Advanced, or Recruiter Learn More » AT&T Sales Enablement Training Please register with our website for a Basic, Advanced, or Recruiter Learn More » IBM Security QRadar SOAR – A Day In The Life. During my time at IBM Security, I had the privilege of working on what we Learn More » Zscaler SASE Example Secure Access Service Edge Zscaler Interview Company Summary of Challenges This is an example Wide Learn More » Nueces County, TX SASE Please register with our website for a Basic, Advanced, or Recruiter Learn More »
WellStreet Urgent Care Please register with our website for a Basic, Advanced, or Recruiter Learn More » AT&T Managed Threat Detection and Response – Infrastructure Drawing Introducing the AT&T Managed Threat Detection and Response network architecture drawing, meticulously crafted in 2021 Learn More » ObserveIT Integration Use Case To integrate with a third-party application that will provide deep granular information into user activity Learn More » Jimbob’s Towing and Wrecker Service This is a fictitious network design and proposal for a fictitious towing company by a Learn More » IBM Security – Cost of Data Breach Report 2023 (Enablement) The IBM Security Market Insights team is renowned for its comprehensive reports, offering profound insights Learn More » DeKalb County School District Please register with our website for a Basic, Advanced, or Recruiter Learn More » Cybersecurity TechSegment Please register with our website for a Basic, Advanced, or Recruiter Learn More » AT&T Sales Enablement Training Please register with our website for a Basic, Advanced, or Recruiter Learn More » IBM Security QRadar SOAR – A Day In The Life. During my time at IBM Security, I had the privilege of working on what we Learn More » Zscaler SASE Example Secure Access Service Edge Zscaler Interview Company Summary of Challenges This is an example Wide Learn More » Nueces County, TX SASE Please register with our website for a Basic, Advanced, or Recruiter Learn More »
AT&T Managed Threat Detection and Response – Infrastructure Drawing Introducing the AT&T Managed Threat Detection and Response network architecture drawing, meticulously crafted in 2021 Learn More »
ObserveIT Integration Use Case To integrate with a third-party application that will provide deep granular information into user activity Learn More »
Jimbob’s Towing and Wrecker Service This is a fictitious network design and proposal for a fictitious towing company by a Learn More »
IBM Security – Cost of Data Breach Report 2023 (Enablement) The IBM Security Market Insights team is renowned for its comprehensive reports, offering profound insights Learn More »
DeKalb County School District Please register with our website for a Basic, Advanced, or Recruiter Learn More » Cybersecurity TechSegment Please register with our website for a Basic, Advanced, or Recruiter Learn More » AT&T Sales Enablement Training Please register with our website for a Basic, Advanced, or Recruiter Learn More » IBM Security QRadar SOAR – A Day In The Life. During my time at IBM Security, I had the privilege of working on what we Learn More » Zscaler SASE Example Secure Access Service Edge Zscaler Interview Company Summary of Challenges This is an example Wide Learn More » Nueces County, TX SASE Please register with our website for a Basic, Advanced, or Recruiter Learn More »
Cybersecurity TechSegment Please register with our website for a Basic, Advanced, or Recruiter Learn More » AT&T Sales Enablement Training Please register with our website for a Basic, Advanced, or Recruiter Learn More » IBM Security QRadar SOAR – A Day In The Life. During my time at IBM Security, I had the privilege of working on what we Learn More » Zscaler SASE Example Secure Access Service Edge Zscaler Interview Company Summary of Challenges This is an example Wide Learn More » Nueces County, TX SASE Please register with our website for a Basic, Advanced, or Recruiter Learn More »
AT&T Sales Enablement Training Please register with our website for a Basic, Advanced, or Recruiter Learn More » IBM Security QRadar SOAR – A Day In The Life. During my time at IBM Security, I had the privilege of working on what we Learn More » Zscaler SASE Example Secure Access Service Edge Zscaler Interview Company Summary of Challenges This is an example Wide Learn More » Nueces County, TX SASE Please register with our website for a Basic, Advanced, or Recruiter Learn More »
IBM Security QRadar SOAR – A Day In The Life. During my time at IBM Security, I had the privilege of working on what we Learn More »
Zscaler SASE Example Secure Access Service Edge Zscaler Interview Company Summary of Challenges This is an example Wide Learn More »
Nueces County, TX SASE Please register with our website for a Basic, Advanced, or Recruiter Learn More »
Cybersecurity User Awareness Training Course Overview: This training program is designed to empower employees with the knowledge and skills Read More »
Networking and Cybersecurity Advanced Learning Series Unlock the future of digital defense and network architecture with our Networking and Cybersecurity Advanced Read More »
Cybersecurity Basics Learning Series Please register with our website for a Basic, Advanced, or Recruiter Read More » Networking Basics Learning Series Please register with our website for a Basic, Advanced, or Recruiter Read More »
Networking Basics Learning Series Please register with our website for a Basic, Advanced, or Recruiter Read More »
U.S. Army Intel Analyst Pled Guilty to Conspiracy, Export Control Violations, and Bribery Korbein Schultz, a U.S. Army soldier and intelligence analyst, pleaded guilty today to all charges Read More » tonydegonia November 1, 2024
Networking What is WCCP? This is a new type of post that I want to start writing. Doing this Read More » tonydegonia September 4, 2024
Current Events Being unemployed does not equate to being unqualified Unemployment does not equate to being unqualified because unemployment can result from various factors unrelated Read More » tonydegonia July 15, 2024
Curated AT&T Launches New Managed Cybersecurity Services Business LevelBlue AT&T Cybersecurity has spun out into its own, standalone managed cybersecurity services business called LevelBlue. Read More » tonydegonia May 9, 2024
Cybersecurity What makes a cybersecurity sales engineer? A cybersecurity sales engineer is a crucial link between the technical aspects of cybersecurity solutions Read More » tonydegonia May 5, 2024
Cybersecurity Fortinet Marketing Please register with our website for a Basic, Advanced, or Recruiter Read More » tonydegonia December 14, 2023 Cybersecurity DNS: Types of DNS Records, DNS Servers and DNS Query Types Please register with our website for a Basic, Advanced, or Recruiter Read More » tonydegonia January 26, 2023 Cybersecurity The Top 6 DNS Attack Vectors per ChatGPT Please register with our website for a Basic, Advanced, or Recruiter Read More » tonydegonia January 24, 2023 Cybersecurity How Network Traffic Can Mask A Serious Cyber Threat Please register with our website for a Basic, Advanced, or Recruiter Account, depending on your needs. You can find the Tier choice at the top of the homepage. Thank you in advance for your patience and for visiting tonydegonia.com. Read More » tonydegonia September 9, 2022 Cybersecurity Can Cybersecurity be Automated? Please register with our website for a Basic, Advanced, or Recruiter Account, depending on your needs. You can find the Tier choice at the top of the homepage. Thank you in advance for your patience and for visiting tonydegonia.com. Read More » tonydegonia June 14, 2022 Page1 Page2 Page3
Cybersecurity DNS: Types of DNS Records, DNS Servers and DNS Query Types Please register with our website for a Basic, Advanced, or Recruiter Read More » tonydegonia January 26, 2023 Cybersecurity The Top 6 DNS Attack Vectors per ChatGPT Please register with our website for a Basic, Advanced, or Recruiter Read More » tonydegonia January 24, 2023 Cybersecurity How Network Traffic Can Mask A Serious Cyber Threat Please register with our website for a Basic, Advanced, or Recruiter Account, depending on your needs. You can find the Tier choice at the top of the homepage. Thank you in advance for your patience and for visiting tonydegonia.com. Read More » tonydegonia September 9, 2022 Cybersecurity Can Cybersecurity be Automated? Please register with our website for a Basic, Advanced, or Recruiter Account, depending on your needs. You can find the Tier choice at the top of the homepage. Thank you in advance for your patience and for visiting tonydegonia.com. Read More » tonydegonia June 14, 2022 Page1 Page2 Page3
Cybersecurity The Top 6 DNS Attack Vectors per ChatGPT Please register with our website for a Basic, Advanced, or Recruiter Read More » tonydegonia January 24, 2023 Cybersecurity How Network Traffic Can Mask A Serious Cyber Threat Please register with our website for a Basic, Advanced, or Recruiter Account, depending on your needs. You can find the Tier choice at the top of the homepage. Thank you in advance for your patience and for visiting tonydegonia.com. Read More » tonydegonia September 9, 2022 Cybersecurity Can Cybersecurity be Automated? Please register with our website for a Basic, Advanced, or Recruiter Account, depending on your needs. You can find the Tier choice at the top of the homepage. Thank you in advance for your patience and for visiting tonydegonia.com. Read More » tonydegonia June 14, 2022 Page1 Page2 Page3
Cybersecurity How Network Traffic Can Mask A Serious Cyber Threat Please register with our website for a Basic, Advanced, or Recruiter Account, depending on your needs. You can find the Tier choice at the top of the homepage. Thank you in advance for your patience and for visiting tonydegonia.com. Read More » tonydegonia September 9, 2022
Cybersecurity Can Cybersecurity be Automated? Please register with our website for a Basic, Advanced, or Recruiter Account, depending on your needs. You can find the Tier choice at the top of the homepage. Thank you in advance for your patience and for visiting tonydegonia.com. Read More » tonydegonia June 14, 2022