Senior Sales Engineer
Senior Solutions Architect

Articles:
  • 5 questions every higher-ed security leader should ask
  • The 10 Domains of Cybersecurity
  • U.S. Army Intel Analyst Pled Guilty to Conspiracy, Export Control Violations, and Bribery
  • The Internal Cyber Kill Chain Model
  • DNS: Types of DNS Records, DNS Servers and DNS Query Types
  • Home
  • Articles

    Cybersecurity Insights &
    Thought Leadership

    This section is a collection of original articles, research, and curated insights from my work with AT&T Cybersecurity, Fortra/Alert Logic, and IBM Security. Many stem from real-world cybersecurity challenges and industry trends.

    🔹 Curated Favorites – My top cybersecurity reads.
    🔹 Top Reader Picks – The most popular articles.
    🔹 Original Research – My insights on security strategy and innovation.
    🔹 Category Archive – Browse all articles by topic.

    Explore, learn, and let me know if there’s a topic you’d like covered!

    • Breaches

      2019: The Rise of the Government Data Breach

      2018 Sees Record Number of Data Breaches – Gigantic Economic Effects

      Breaches

    • Business

      AT&T to Create Standalone Managed Cybersecurity Services Business

      AT&T Launches New Managed Cybersecurity Services Business LevelBlue

      Business

    • Current Events

      Current Events

      U.S. Army Intel Analyst Pled Guilty to Conspiracy, Export Control Violations, and Bribery

      U.S. Army Intelligence Analyst Arrested

    • Cybersecurity

      Fortinet Marketing

      The Top 6 DNS Attack Vectors per ChatGPT

      The 10 Domains of Cybersecurity

      How Network Traffic Can Mask A Serious Cyber Threat

      Can Cybersecurity be Automated?

      5 Common Indicators of a Phishing Attempt

      5 questions every higher-ed security leader should ask

      Prevent WordPress hacking using this Pen Testing guide

      Hacking WordPress: Building the Lab

      10 Steps to Creating a Secure IT Environment

      The Dark Web has a Serious Deduplication Problem

      The Internal Cyber Kill Chain Model

      Cybersecurity

    • Employment

      The Best Time to Apply for Jobs

      Being unemployed does not equate to being unqualified

      Job Seeker’s Confidence Remains Low

      The ATS Resume Scam Targeting Job Seekers on LinkedIn

      Are ATS Systems Keeping You From Your Dream Job? What Job Seekers and Recruiters Really Think

      ATS Resume Optimization: 2025 Master Guide

      Employment

    • Sales Engineering

      What makes a cybersecurity sales engineer?

      The Role of a Corporate Evangelist in Cybersecurity

      The Solutions Architect Journey in Cybersecurity: From Junior to Principal Architect

      Sales Engineer vs. Solutions Architect: What’s the Real Difference in Cybersecurity Pre-Sales?

      The Sales Engineer Journey in Cybersecurity: From Junior to Principal Architect

      Building a home cybersecurity lab

      Sales Engineering

    • Technology

      Technology

      Desktop market matures but VDI challenges remain

    Article Categories

    Top Curated

    • AT&T Cybersecurity All-in-one Product Architecture
    • AT&T MTDR – Infrastructure Drawing
    • IBM Security QRadar Suite Architecture
    • WanAware Enablement
    • Zscaler SASE Example
    • AT&T Cybersecurity All-in-one Product Architecture
    • AT&T MTDR – Infrastructure Drawing
    • IBM Security QRadar Suite Architecture
    • WanAware Enablement
    • Zscaler SASE Example

    My Curated Faves

    • AT&T Cybersecurity All-in-one Product Architecture
    • AT&T MTDR – Infrastructure Drawing
    • IBM Security QRadar Suite Architecture
    • WanAware Enablement
    • Zscaler SASE Example
    • AT&T Cybersecurity All-in-one Product Architecture
    • AT&T MTDR – Infrastructure Drawing
    • IBM Security QRadar Suite Architecture
    • WanAware Enablement
    • Zscaler SASE Example

    Top Original

    • ATS Resume Optimization: 2025 Master Guide
    • Are ATS Systems Keeping You From Your Dream Job? What Job Seekers and Recruiters Really Think
    • 10 Steps to Creating a Secure IT Environment
    • ATS Resume Optimization: 2025 Master Guide
    • Are ATS Systems Keeping You From Your Dream Job? What Job Seekers and Recruiters Really Think
    • 10 Steps to Creating a Secure IT Environment

    My Original Faves

    • AT&T Cybersecurity All-in-one Product Architecture
    • AT&T MTDR – Infrastructure Drawing
    • IBM Security QRadar Suite Architecture
    • WanAware Enablement
    • Zscaler SASE Example
    • AT&T Cybersecurity All-in-one Product Architecture
    • AT&T MTDR – Infrastructure Drawing
    • IBM Security QRadar Suite Architecture
    • WanAware Enablement
    • Zscaler SASE Example
  • Portfolio
    • Architecture
      Architecture

      IBM Security QRadar Suite Architecture

      Learn More »
      Architecture

      AT&T Cybersecurity All-in-one Product Architecture

      Learn More »
      Architecture

      Zscaler SASE Example

      Learn More »
      Architecture

      AT&T MTDR – Infrastructure Drawing

      Learn More »
      Architecture

      WanAware Enablement

      Learn More »
    • Customer Solution
      AT&T

      Nueces County, TX SASE

      Learn More »
      AT&T

      DeKalb County School District

      Learn More »
      AT&T

      Seminole State College

      Learn More »
      AT&T

      WellStreet Urgent Care

      Learn More »
      AT&T

      City of Dallas Boot Camp Training

      Learn More »
      AT&T

      Tulane University

      Learn More »
    • Marketing
      IBM

      IBM Security QRadar SOAR – A Day In The Life.

      Learn More »
      AT&T

      AT&T Marketing Collateral (Public Sector)

      Learn More »
      Marketing

      Sys Logic Technology Services, LLC. Marketing Collateral

      Learn More »
    • Sales Enablement
      AT&T

      Cybersecurity TechSegment

      Learn More »
      AT&T

      AT&T Sales Enablement Training

      Learn More »
      Fortra

      Alert Logic MDR Competitive Guide

      Learn More »
      IBM

      IBM Security – Cost of Data Breach Report 2023 (Enablement)

      Learn More »
    • Use Case
      City of Dallas

      Jimbob’s Towing and Wrecker Service

      Learn More »
      Sovergence

      Industrial Control Use Case

      Learn More »
      AT&T

      ObserveIT Integration Use Case

      Learn More »
  • Technical Resources
    • DNS IP Lookup
    • DNS Whois Search
    • DNS Records Check
    • DNS Blacklist Search
    • DNS DMARC Search
    • Email Header Extraction
    • DNS IP Lookup
    • DNS Whois Search
    • DNS Records Check
    • DNS Blacklist Search
    • DNS DMARC Search
    • Email Header Extraction

    DNS Search

    • Dictionary of Technical Terms
    • OSI Model
    • VLANs and Network Segmentation
    • DNS Server Lists
    • DNS Simplified
    • Dictionary of Technical Terms
    • OSI Model
    • VLANs and Network Segmentation
    • DNS Server Lists
    • DNS Simplified

    Technical Resources

    Artificial Intelligence - Coming Soon

    Advanced Networking - Coming Soon

    Encryption Standards - Coming Soon

  • Homeless Resources
    • Veteran Homelessness
    • SSVF Homeless Support Search
    • Homeless Resource for Everyone
    • Veteran Homelessness
    • SSVF Homeless Support Search
    • Homeless Resource for Everyone

    Homeless Resources

  • About Me
    • My Story
      Picture of Tony DeGonia

      Tony DeGonia

      Dynamic Senior Cybersecurity Sales Engineer with 15+ years of experience architecting and executing security solutions that drive revenue and market growth. Adept at partnering with executive and regional leadership to develop territory business plans, forecast security initiatives, and deliver thought leadership at the CXO/CISO level. Proven track record in accelerating sales cycles, executing targeted go-to-market strategies, and coaching cross-functional teams to deliver integrated security offerings.

      Go Now!
    • My Online Resume

      A resume is a formal document that provides a summary of a person’s professional experience, skills, education, and achievements. It is typically used to apply for jobs and serves as a marketing tool to showcase qualifications and expertise to potential employers.

      Here you will find my resume in long form format that will cover all of roles since 2000. I have been working in technology since 1990 whether in telecommunications, information technology, advanced technology, or cybersecurity. Here you can find the entire story of my career journey.

      Go Now!
    • My Video Resume

      This section of the website is unique. Seldom do you find job candidates who take the time and effort to create a video resume. However, in this job market, everything that gives you a competitive edge or creates positive attention is a good thing. You will find one full copy of my video resume, and the rest of the videos are where I broke my resume into sections. Please check it and let me know what you think.

      Go Now!
    • Podcasts & Videos

      Welcome to my Video and Podcast Page.

      Here, you can view various videos and podcasts I have made since I started recording work videos and cybersecurity podcasts in 2008. Not all videos are of the greatest quality, but video recording and podcasting technology has come a long way since then.

      My name is Tony DeGonia, and I am passionate about delivering top-notch cybersecurity solutions to protect businesses from cyber threats. My YouTube channel educates business owners and IT professionals on the latest SIEM, SOAR, MDR, XDR, firewalling, and threat management advancements. With years of experience under my belt, I take pride in designing custom cybersecurity solutions tailored to each client’s specific needs, whether they’re a small business or a large enterprise.

      Go Now!
  • Contact Me
  • Login

    Log in

    Lost your password?
Lost your password?

Project Portfolio Menu

Architecture

  • AT&T Cybersecurity All-in-one Product Architecture
  • AT&T MTDR – Infrastructure Drawing
  • IBM Security QRadar Suite Architecture
  • WanAware Enablement
  • Zscaler SASE Example
  • AT&T Cybersecurity All-in-one Product Architecture
  • AT&T MTDR – Infrastructure Drawing
  • IBM Security QRadar Suite Architecture
  • WanAware Enablement
  • Zscaler SASE Example

Customer Solution

  • DeKalb County School District
  • Nueces County, TX SASE
  • Seminole State College
  • Tulane University
  • WellStreet Urgent Care
  • DeKalb County School District
  • Nueces County, TX SASE
  • Seminole State College
  • Tulane University
  • WellStreet Urgent Care

Marketing

  • AT&T Marketing Collateral (Public Sector)
  • IBM Security QRadar SOAR – A Day In The Life.
  • Sys Logic Technology Services, LLC. Marketing Collateral
  • AT&T Marketing Collateral (Public Sector)
  • IBM Security QRadar SOAR – A Day In The Life.
  • Sys Logic Technology Services, LLC. Marketing Collateral

Sales Enablement

  • Alert Logic MDR Competitive Guide
  • AT&T Sales Enablement Training
  • IBM Security – Cost of Data Breach Report 2023 (Enablement)
  • Cybersecurity TechSegment
  • Alert Logic MDR Competitive Guide
  • AT&T Sales Enablement Training
  • IBM Security – Cost of Data Breach Report 2023 (Enablement)
  • Cybersecurity TechSegment

Use Cases

  • City of Dallas Boot Camp Training
  • Industrial Control Use Case
  • Jimbob’s Towing and Wrecker Service
  • ObserveIT Integration Use Case
  • City of Dallas Boot Camp Training
  • Industrial Control Use Case
  • Jimbob’s Towing and Wrecker Service
  • ObserveIT Integration Use Case

I'm Social

Linkedin X-twitter Youtube

I believe no goal is out of reach with dedication, enthusiasm, and an unwavering drive to grow. I tell hiring managers they won’t find anyone more committed—and I mean it. My work ethic powers a constant pursuit of innovation, efficiency, and excellence, strengthening both the customer experience and the teams I’m privileged to serve.

Article Caregories

  • Breaches
  • Business
  • Current Events
  • Cybersecurity
  • Employment
  • Networking
  • Sales Engineering
  • Technology
  • Breaches
  • Business
  • Current Events
  • Cybersecurity
  • Employment
  • Networking
  • Sales Engineering
  • Technology

Top Articles

  • ATS Resume Optimization: 2025 Master Guide
  • Are ATS Systems Keeping You From Your Dream Job? What Job Seekers and Recruiters Really Think
  • 10 Steps to Creating a Secure IT Environment
  • ATS Resume Optimization: 2025 Master Guide
  • Are ATS Systems Keeping You From Your Dream Job? What Job Seekers and Recruiters Really Think
  • 10 Steps to Creating a Secure IT Environment

Favorite Articles

  • Being unemployed does not equate to being unqualified
  • Can Cybersecurity be Automated?
  • The Best Time to Apply for Jobs
  • Being unemployed does not equate to being unqualified
  • Can Cybersecurity be Automated?
  • The Best Time to Apply for Jobs

Technical Resources

  • Dictionary of Technical Terms
  • OSI Model
  • VLANs and Network Segmentation
  • DNS Server Lists
  • DNS Simplified
  • Dictionary of Technical Terms
  • OSI Model
  • VLANs and Network Segmentation
  • DNS Server Lists
  • DNS Simplified

Homeless Resources

  • Veteran Homelessness
  • SSVF Homeless Support Search
  • Homeless Resource for Everyone
  • Veteran Homelessness
  • SSVF Homeless Support Search
  • Homeless Resource for Everyone

DNS Search

  • DNS IP Lookup
  • DNS Whois Search
  • DNS Records Check
  • DNS Blacklist Search
  • DNS DMARC Search
  • Email Header Extraction
  • DNS IP Lookup
  • DNS Whois Search
  • DNS Records Check
  • DNS Blacklist Search
  • DNS DMARC Search
  • Email Header Extraction
  • Home
  • Contact Me
  • Terms and Conditions
  • Cookie Policy
  • Privacy Policy
  • Opt-out preferences
  • Home
  • Contact Me
  • Terms and Conditions
  • Cookie Policy
  • Privacy Policy
  • Opt-out preferences

POWERED BY SOVERGENCE  |  THE TECHNOLOGY PROVIDER’S PROVIDER!  |  © 2025 Tony DeGonia | All Rights Reserved.

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}