Senior Sales Engineer
Senior Solutions Architect

Articles:
  • 5 questions every higher-ed security leader should ask
  • Building a home cybersecurity lab
  • Fortinet Marketing
  • Being unemployed does not equate to being unqualified
  • The Internal Cyber Kill Chain Model
  • Home
  • Articles

    Cybersecurity Insights &
    Thought Leadership

    This section is a collection of original articles, research, and curated insights from my work with AT&T Cybersecurity, Fortra/Alert Logic, and IBM Security. Many stem from real-world cybersecurity challenges and industry trends.

    🔹 Curated Favorites – My top cybersecurity reads.
    🔹 Top Reader Picks – The most popular articles.
    🔹 Original Research – My insights on security strategy and innovation.
    🔹 Category Archive – Browse all articles by topic.

    Explore, learn, and let me know if there’s a topic you’d like covered!

    • Breaches

      2019: The Rise of the Government Data Breach

      2018 Sees Record Number of Data Breaches – Gigantic Economic Effects

      Breaches

    • Business

      AT&T to Create Standalone Managed Cybersecurity Services Business

      AT&T Launches New Managed Cybersecurity Services Business LevelBlue

      Business

    • Current Events

      Current Events

      U.S. Army Intel Analyst Pled Guilty to Conspiracy, Export Control Violations, and Bribery

      Being unemployed does not equate to being unqualified

      LevelBlue Launches at RSA Conference, Bolstering Organizations’ Cyber Resilience While Eliminating Complexity

      Suicide rates in the US are on the rise: New study offers surprising reasons why

      U.S. Army Intelligence Analyst Pleads Guilty to Charges of Conspiracy

      U.S. Army Analyst Sentenced for Selling Info to Chinese Government

      U.S. Army Intelligence Analyst Arrested

    • Cybersecurity

      The Day I Became a Scam Hunter: In Memory of Carroll Smith

      The Role of a Corporate Evangelist in Cybersecurity

      The Solutions Architect Journey in Cybersecurity: From Junior to Principal Architect

      Sales Engineer vs. Solutions Architect: What’s the Real Difference in Cybersecurity Pre-Sales?

      The Sales Engineer Journey in Cybersecurity: From Junior to Principal Architect

      The Top 6 DNS Attack Vectors per ChatGPT

      The 10 Domains of Cybersecurity

      How Network Traffic Can Mask A Serious Cyber Threat

      5 Common Indicators of a Phishing Attempt

      5 questions every higher-ed security leader should ask

      Prevent WordPress hacking using this Pen Testing guide

      Hacking WordPress: Building the Lab

      Cybersecurity

    • Employment

      The Best Time to Apply for Jobs

      That job you applied for might not exist. Here’s what’s behind a boom in “ghost jobs.”

      THE EMPLOYMENT SITUATION — JULY 2024

      Job Seeker’s Confidence Remains Low

      The ATS Resume Scam Targeting Job Seekers on LinkedIn

      Are ATS Systems Keeping You From Your Dream Job? What Job Seekers and Recruiters Really Think

      ATS Resume Optimization: 2025 Master Guide

      Employment

    • Sales Engineering

      What makes a cybersecurity sales engineer?

      Mastering Cybersecurity Discovery: Best Practices for Selling SIEM and MDR Services to Enterprise Customers

      The Role of a Corporate Evangelist in Cybersecurity

      The Solutions Architect Journey in Cybersecurity: From Junior to Principal Architect

      Sales Engineer vs. Solutions Architect: What’s the Real Difference in Cybersecurity Pre-Sales?

      The Sales Engineer Journey in Cybersecurity: From Junior to Principal Architect

      Building a home cybersecurity lab

      Sales Engineering

    • Technology

      Technology

      Can Cybersecurity be Automated?

      Desktop market matures but VDI challenges remain

    Article Categories

    Top Curated

    • AT&T Managed Threat Detection and Response – Infrastructure Drawing
    • IBM Security QRadar Suite Architecture
    • AT&T Cybersecurity All-in-one Product Architecture
    • AT&T Managed Threat Detection and Response – Infrastructure Drawing
    • IBM Security QRadar Suite Architecture
    • AT&T Cybersecurity All-in-one Product Architecture

    My Curated Faves

    • AT&T Managed Threat Detection and Response – Infrastructure Drawing
    • IBM Security QRadar Suite Architecture
    • AT&T Cybersecurity All-in-one Product Architecture
    • AT&T Managed Threat Detection and Response – Infrastructure Drawing
    • IBM Security QRadar Suite Architecture
    • AT&T Cybersecurity All-in-one Product Architecture

    Top Original

    • ATS Resume Optimization: 2025 Master Guide
    • Are ATS Systems Keeping You From Your Dream Job? What Job Seekers and Recruiters Really Think
    • 10 Steps to Creating a Secure IT Environment
    • ATS Resume Optimization: 2025 Master Guide
    • Are ATS Systems Keeping You From Your Dream Job? What Job Seekers and Recruiters Really Think
    • 10 Steps to Creating a Secure IT Environment

    My Original Faves

    • AT&T Managed Threat Detection and Response – Infrastructure Drawing
    • IBM Security QRadar Suite Architecture
    • AT&T Cybersecurity All-in-one Product Architecture
    • AT&T Managed Threat Detection and Response – Infrastructure Drawing
    • IBM Security QRadar Suite Architecture
    • AT&T Cybersecurity All-in-one Product Architecture
  • Portfolio
    • Architecture
      Architecture

      AT&T Cybersecurity All-in-one Product Architecture

      Learn More »
      Architecture

      AT&T MTDR – Infrastructure Drawing

      Learn More »
      Architecture

      IBM Security QRadar Suite Architecture

      Learn More »
    • Customer Solution
      Customer Solution

      DeKalb County School District

      Learn More »
      Customer Solution

      Nueces County, TX SASE

      Learn More »
      Customer Solution

      Tulane University

      Learn More »
      Customer Solution

      WellStreet Urgent Care

      Learn More »
      Customer Solution

      Seminole State College

      Learn More »
    • Marketing
      Marketing

      AT&T Marketing Collateral (Public Sector)

      Learn More »
      Marketing

      IBM Security QRadar SOAR – A Day In The Life.

      Learn More »
      Marketing

      Sys Logic Technology Services, LLC. Marketing Collateral

      Learn More »
    • Sales Enablement
      Sales Enablement

      Alert Logic MDR Competitive Guide

      Learn More »
      Sales Enablement

      Cybersecurity TechSegment

      Learn More »
      Sales Enablement

      AT&T Sales Enablement Training

      Learn More »
      Sales Enablement

      IBM Security – Cost of Data Breach Report 2023 (Enablement)

      Learn More »
    • Use Case
      Use Case

      Zscaler SASE Example

      Learn More »
      Use Case

      Industrial Control Use Case

      Learn More »
      Use Case

      ObserveIT Integration Use Case

      Learn More »
      Use Case

      Jimbob’s Towing and Wrecker Service

      Learn More »
  • Resources

    Homeless Resources

    • Veteran Homelessness
    • SSVF Homeless Support Search
    • Veteran Homelessness
    • SSVF Homeless Support Search

    Technical Resources

    • Dictionary of Technical Terms
    • OSI Model
    • Podcasts & Videos
    • Dictionary of Technical Terms
    • OSI Model
    • Podcasts & Videos
    Veterans Homelessness
    Here is a little information about the very real problem of Veteran Homelessness
    More Info.
    VA SSVF Homeless Search
    Supportive Services for Veteran Families For very low-income Veterans, SSVF provides case management and supportive services to prevent the imminent loss of a Veteran's home or identify a new, more suitable housing situation for the individual and his or her family; or to rapidly re-house Veterans and their families who are homeless and might remain homeless without this assistance.
    Search
  • About Me
    • My Story
      Picture of Tony DeGonia

      Tony DeGonia

      Dynamic Senior Cybersecurity Sales Engineer with 15+ years of experience architecting and executing security solutions that drive revenue and market growth. Adept at partnering with executive and regional leadership to develop territory business plans, forecast security initiatives, and deliver thought leadership at the CXO/CISO level. Proven track record in accelerating sales cycles, executing targeted go-to-market strategies, and coaching cross-functional teams to deliver integrated security offerings.

      Go Now!
    • My Online Resume

      A resume is a formal document that provides a summary of a person’s professional experience, skills, education, and achievements. It is typically used to apply for jobs and serves as a marketing tool to showcase qualifications and expertise to potential employers.

      Here you will find my resume in long form format that will cover all of roles since 2000. I have been working in technology since 1990 whether in telecommunications, information technology, advanced technology, or cybersecurity. Here you can find the entire story of my career journey.

      Go Now!
    • My Video Resume

      This section of the website is unique. Seldom do you find job candidates who take the time and effort to create a video resume. However, in this job market, everything that gives you a competitive edge or creates positive attention is a good thing. You will find one full copy of my video resume, and the rest of the videos are where I broke my resume into sections. Please check it and let me know what you think.

      Go Now!
    • Podcasts & Videos

      Welcome to my Video and Podcast Page.

      Here, you can view various videos and podcasts I have made since I started recording work videos and cybersecurity podcasts in 2008. Not all videos are of the greatest quality, but video recording and podcasting technology has come a long way since then.

      My name is Tony DeGonia, and I am passionate about delivering top-notch cybersecurity solutions to protect businesses from cyber threats. My YouTube channel educates business owners and IT professionals on the latest SIEM, SOAR, MDR, XDR, firewalling, and threat management advancements. With years of experience under my belt, I take pride in designing custom cybersecurity solutions tailored to each client’s specific needs, whether they’re a small business or a large enterprise.

      Go Now!
  • Contact Me
  • Login
Lost your password?

Articles Menu

Breaches

  • 2018 Sees Record Number of Data Breaches – Gigantic Economic Effects
  • 2019: The Rise of the Government Data Breach
  • 2018 Sees Record Number of Data Breaches – Gigantic Economic Effects
  • 2019: The Rise of the Government Data Breach

I'm Social

Linkedin X-twitter Youtube

Business

  • AT&T Launches New Managed Cybersecurity Services Business LevelBlue
  • AT&T to Create Standalone Managed Cybersecurity Services Business
  • AT&T Launches New Managed Cybersecurity Services Business LevelBlue
  • AT&T to Create Standalone Managed Cybersecurity Services Business

Current Events

  • U.S. Army Intel Analyst Pled Guilty to Conspiracy, Export Control Violations, and Bribery
  • U.S. Army Intelligence Analyst Arrested
  • U.S. Army Intel Analyst Pled Guilty to Conspiracy, Export Control Violations, and Bribery
  • U.S. Army Intelligence Analyst Arrested

Cybersecurity

  • The 10 Domains of Cybersecurity
  • 5 Common Indicators of a Phishing Attempt
  • 5 questions every higher-ed security leader should ask
  • How Network Traffic Can Mask A Serious Cyber Threat
  • Prevent WordPress hacking using this Pen Testing guide
  • The Dark Web has a Serious Deduplication Problem
  • The Internal Cyber Kill Chain Model
  • The Top 6 DNS Attack Vectors per ChatGPT
  • The 10 Domains of Cybersecurity
  • 5 Common Indicators of a Phishing Attempt
  • 5 questions every higher-ed security leader should ask
  • How Network Traffic Can Mask A Serious Cyber Threat
  • Prevent WordPress hacking using this Pen Testing guide
  • The Dark Web has a Serious Deduplication Problem
  • The Internal Cyber Kill Chain Model
  • The Top 6 DNS Attack Vectors per ChatGPT

Employment

  • Being unemployed does not equate to being unqualified
  • The Best Time to Apply for Jobs
  • Being unemployed does not equate to being unqualified
  • The Best Time to Apply for Jobs

Networking

  • AT&T Managed Threat Detection and Response – Infrastructure Drawing
  • IBM Security QRadar Suite Architecture
  • AT&T Cybersecurity All-in-one Product Architecture
  • AT&T Managed Threat Detection and Response – Infrastructure Drawing
  • IBM Security QRadar Suite Architecture
  • AT&T Cybersecurity All-in-one Product Architecture

Sales Engineer

  • What makes a cybersecurity sales engineer?
  • Building a home cybersecurity lab
  • What makes a cybersecurity sales engineer?
  • Building a home cybersecurity lab

Technology

  • Can Cybersecurity be Automated?
  • Desktop market matures but VDI challenges remain
  • Are ATS Systems Keeping You From Your Dream Job? What Job Seekers and Recruiters Really Think
  • ATS Resume Optimization: 2025 Master Guide
  • Can Cybersecurity be Automated?
  • Desktop market matures but VDI challenges remain
  • Are ATS Systems Keeping You From Your Dream Job? What Job Seekers and Recruiters Really Think
  • ATS Resume Optimization: 2025 Master Guide

Project Portfolio Menu

Architecture

  • AT&T Managed Threat Detection and Response – Infrastructure Drawing
  • IBM Security QRadar Suite Architecture
  • AT&T Cybersecurity All-in-one Product Architecture
  • AT&T Managed Threat Detection and Response – Infrastructure Drawing
  • IBM Security QRadar Suite Architecture
  • AT&T Cybersecurity All-in-one Product Architecture

Customer Solution

  • AT&T Managed Threat Detection and Response – Infrastructure Drawing
  • IBM Security QRadar Suite Architecture
  • AT&T Cybersecurity All-in-one Product Architecture
  • AT&T Managed Threat Detection and Response – Infrastructure Drawing
  • IBM Security QRadar Suite Architecture
  • AT&T Cybersecurity All-in-one Product Architecture

Marketing

  • AT&T Managed Threat Detection and Response – Infrastructure Drawing
  • IBM Security QRadar Suite Architecture
  • AT&T Cybersecurity All-in-one Product Architecture
  • AT&T Managed Threat Detection and Response – Infrastructure Drawing
  • IBM Security QRadar Suite Architecture
  • AT&T Cybersecurity All-in-one Product Architecture

Sales Enablement

  • Alert Logic MDR Competitive Guide
  • AT&T Sales Enablement Training
  • IBM Security – Cost of Data Breach Report 2023 (Enablement)
  • Cybersecurity TechSegment
  • Alert Logic MDR Competitive Guide
  • AT&T Sales Enablement Training
  • IBM Security – Cost of Data Breach Report 2023 (Enablement)
  • Cybersecurity TechSegment

Use Cases

  • Industrial Control Use Case
  • Jimbob’s Towing and Wrecker Service
  • ObserveIT Integration Use Case
  • Zscaler SASE Example
  • Industrial Control Use Case
  • Jimbob’s Towing and Wrecker Service
  • ObserveIT Integration Use Case
  • Zscaler SASE Example
  • Home
  • About Me
  • Contact Me
  • Terms and Conditions
  • Cookie Policy
  • Privacy Policy
  • Opt-out preferences
  • Home
  • About Me
  • Contact Me
  • Terms and Conditions
  • Cookie Policy
  • Privacy Policy
  • Opt-out preferences

POWERED BY SOVERGENCE  |  THE TECHNOLOGY PROVIDER’S PROVIDER!  |  © 2025 Tony DeGonia | All Rights Reserved.

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}