• Account
  • Profile
  • Courses
  • Home
  • Articles

    Cybersecurity Insights & Thought Leadership

    This section is a collection of original articles, research, and curated insights from my work with AT&T Cybersecurity, Fortra/Alert Logic, and IBM Security. Many stem from real-world cybersecurity challenges and industry trends.

    🔹 Curated Favorites – My top cybersecurity reads.
    🔹 Top Reader Picks – The most popular articles.
    🔹 Original Research – My insights on security strategy and innovation.
    🔹 Category Archive – Browse all articles by topic.

    Explore, learn, and let me know if there’s a topic you’d like covered!

    • Breaches

      Ticketmaster confirms hack which could affect 560m

      2019: The Rise of the Government Data Breach

      2018 Sees Record Number of Data Breaches – Gigantic Economic Effects

      Breaches

    • Business

      Leading U.S. Cybersecurity Awareness Company Unknowingly Hires Remote North Korean Hacker

      LevelBlue Launches at RSA Conference, Bolstering Organizations’ Cyber Resilience While Eliminating Complexity

      AT&T Launches New Managed Cybersecurity Services Business LevelBlue

      AT&T to Create Standalone Managed Cybersecurity Services Business

      Business

    • Current Events
      Korbein Schultz, a U.S. Army soldier and intelligence analyst.

      U.S. Army Analyst Sentenced for Selling Info to Chinese Government

      U.S. Army Intel Analyst Pled Guilty to Conspiracy, Export Control Violations, and Bribery

      U.S. Army Intelligence Analyst Pleads Guilty to Charges of Conspiracy

      Suicide rates in the US are on the rise: New study offers surprising reasons why

      Being unemployed does not equate to being unqualified

      U.S. Army Intelligence Analyst Arrested

      Current Events

    • Cybersecurity

      The Top 6 DNS Attack Vectors per ChatGPT

      The 10 Domains of Cybersecurity

      How Network Traffic Can Mask A Serious Cyber Threat

      5 Common Indicators of a Phishing Attempt

      5 questions every higher-ed security leader should ask

      Prevent WordPress hacking using this Pen Testing guide

      Hacking WordPress: Building the Lab

      10 Steps to Creating a Secure IT Environment

      The Dark Web has a Serious Deduplication Problem

      The Internal Cyber Kill Chain Model

      Cybersecurity

    • Employment

      THE EMPLOYMENT SITUATION — JULY 2024

      The Best Time to Apply for Jobs

      That job you applied for might not exist. Here’s what’s behind a boom in “ghost jobs.”

      Employment

    • Sales Engineering

      Mastering Cybersecurity Discovery: Best Practices for Selling SIEM and MDR Services to Enterprise Customers

      What makes a cybersecurity sales engineer?

      Building a home cybersecurity lab

      Sales Engineering

    • Technology

      Technology

      Can Cybersecurity be Automated?

      Desktop market matures but VDI challenges remain

    Article Categories

    Top Curated

    • U.S. Army Intelligence Analyst Arrested
    • Fortinet Marketing
    • The 10 Domains of Cybersecurity
    • U.S. Army Intelligence Analyst Arrested
    • Fortinet Marketing
    • The 10 Domains of Cybersecurity

    My Curated Faves

    • AT&T to Create Standalone Managed Cybersecurity Services Business
    • The 10 Domains of Cybersecurity
    • U.S. Army Intelligence Analyst Arrested
    • AT&T to Create Standalone Managed Cybersecurity Services Business
    • The 10 Domains of Cybersecurity
    • U.S. Army Intelligence Analyst Arrested

    Top Original

    • 10 Steps to Creating a Secure IT Environment
    • 2018 Sees Record Number of Data Breaches – Gigantic Economic Effects
    • 2019: The Rise of the Government Data Breach
    • 10 Steps to Creating a Secure IT Environment
    • 2018 Sees Record Number of Data Breaches – Gigantic Economic Effects
    • 2019: The Rise of the Government Data Breach

    My Original Faves

    • 5 questions every higher-ed security leader should ask
    • Hacking WordPress: Building the Lab
    • 5 questions every higher-ed security leader should ask
    • Hacking WordPress: Building the Lab
  • Project Portfolio
    • Architecture
      Architecture

      IBM Security QRadar Suite Architecture

      Learn More »
      Architecture

      AT&T Cybersecurity All-in-one Product Architecture

      Learn More »
      Architecture

      AT&T Managed Threat Detection and Response – Infrastructure Drawing

      Learn More »
    • Customer Solution
      Customer Solution

      Tulane University

      Learn More »
      Customer Solution

      Seminole State College

      Learn More »
      Customer Solution

      Nueces County, TX SASE

      Learn More »
      Customer Solution

      WellStreet Urgent Care

      Learn More »
      Customer Solution

      DeKalb County School District

      Learn More »
    • Marketing
      Marketing

      IBM Security QRadar SOAR – A Day In The Life.

      Learn More »
      Marketing

      Sys Logic Technology Services, LLC. Marketing Collateral

      Learn More »
      Marketing

      IBM Security – Cost of Data Breach Report 2023 (Enablement)

      Learn More »
      Marketing

      AT&T Marketing Collateral (Public Sector)

      Learn More »
    • Sales Enablement
      Sales Enablement

      AT&T Sales Enablement Training

      Learn More »
      Sales Enablement

      Alert Logic MDR Competitive Guide

      Learn More »
      Sales Enablement

      Cybersecurity TechSegment

      Learn More »
    • Use Case
      Use Case

      ObserveIT Integration Use Case

      Learn More »
      Use Case

      Jimbob’s Towing and Wrecker Service

      Learn More »
      Use Case

      Industrial Control Use Case

      Learn More »
      Use Case

      Zscaler SASE Example

      Learn More »
  • About Me
    • My Story
      Picture of Tony DeGonia

      Tony DeGonia

      Dynamic Senior Cybersecurity Sales Engineer with 15+ years of experience architecting and executing security solutions that drive revenue and market growth. Adept at partnering with executive and regional leadership to develop territory business plans, forecast security initiatives, and deliver thought leadership at the CXO/CISO level. Proven track record in accelerating sales cycles, executing targeted go-to-market strategies, and coaching cross-functional teams to deliver integrated security offerings.

      Go Now!
    • My Online Resume

      A resume is a formal document that provides a summary of a person’s professional experience, skills, education, and achievements. It is typically used to apply for jobs and serves as a marketing tool to showcase qualifications and expertise to potential employers.

      Here you will find my resume in long form format that will cover all of roles since 2000. I have been working in technology since 1990 whether in telecommunications, information technology, advanced technology, or cybersecurity. Here you can find the entire story of my career journey.

      Go Now!
    • My Video Resume

      This section of the website is unique. Seldom do you find job candidates who take the time and effort to create a video resume. However, in this job market, everything that gives you a competitive edge or creates positive attention is a good thing. You will find one full copy of my video resume, and the rest of the videos are where I broke my resume into sections. Please check it and let me know what you think.

      Go Now!
    • Podcasts & Videos

      Welcome to my Video and Podcast Page.

      Here, you can view various videos and podcasts I have made since I started recording work videos and cybersecurity podcasts in 2008. Not all videos are of the greatest quality, but video recording and podcasting technology has come a long way since then.

      My name is Tony DeGonia, and I am passionate about delivering top-notch cybersecurity solutions to protect businesses from cyber threats. My YouTube channel educates business owners and IT professionals on the latest SIEM, SOAR, MDR, XDR, firewalling, and threat management advancements. With years of experience under my belt, I take pride in designing custom cybersecurity solutions tailored to each client’s specific needs, whether they’re a small business or a large enterprise.

      Go Now!
  • Contact Me
t-logo-wht
Linkedin X-twitter Youtube

Main Menu

  • About Me
  • Contact Me
  • Build A SOC Planner
  • Podcasts & Videos
  • Dictionary of Technical Terms
  • About Me
  • Contact Me
  • Build A SOC Planner
  • Podcasts & Videos
  • Dictionary of Technical Terms

Tony DeGonia

U.S. Army Veteran
Senior Sales Engineer
Solutions Architect
Changer of Landscapes

Breaches

  • 2018 Sees Record Number of Data Breaches – Gigantic Economic Effects
  • 2019: The Rise of the Government Data Breach
  • Ticketmaster confirms hack which could affect 560m
  • Leading U.S. Cybersecurity Awareness Company Unknowingly Hires Remote North Korean Hacker
  • 2018 Sees Record Number of Data Breaches – Gigantic Economic Effects
  • 2019: The Rise of the Government Data Breach
  • Ticketmaster confirms hack which could affect 560m
  • Leading U.S. Cybersecurity Awareness Company Unknowingly Hires Remote North Korean Hacker

Business

  • AT&T Launches New Managed Cybersecurity Services Business LevelBlue
  • AT&T to Create Standalone Managed Cybersecurity Services Business
  • LevelBlue Launches at RSA Conference, Bolstering Organizations’ Cyber Resilience While Eliminating Complexity
  • AT&T Launches New Managed Cybersecurity Services Business LevelBlue
  • AT&T to Create Standalone Managed Cybersecurity Services Business
  • LevelBlue Launches at RSA Conference, Bolstering Organizations’ Cyber Resilience While Eliminating Complexity

Cybersecurity

  • The 10 Domains of Cybersecurity
  • 5 Common Indicators of a Phishing Attempt
  • 5 questions every higher-ed security leader should ask
  • How Network Traffic Can Mask A Serious Cyber Threat
  • Prevent WordPress hacking using this Pen Testing guide
  • The Dark Web has a Serious Deduplication Problem
  • The Internal Cyber Kill Chain Model
  • The Top 6 DNS Attack Vectors per ChatGPT
  • The 10 Domains of Cybersecurity
  • 5 Common Indicators of a Phishing Attempt
  • 5 questions every higher-ed security leader should ask
  • How Network Traffic Can Mask A Serious Cyber Threat
  • Prevent WordPress hacking using this Pen Testing guide
  • The Dark Web has a Serious Deduplication Problem
  • The Internal Cyber Kill Chain Model
  • The Top 6 DNS Attack Vectors per ChatGPT

Current Events

  • U.S. Army Intel Analyst Pled Guilty to Conspiracy, Export Control Violations, and Bribery
  • U.S. Army Intelligence Analyst Arrested
  • U.S. Army Intelligence Analyst Pleads Guilty to Charges of Conspiracy
  • U.S. Army Intel Analyst Pled Guilty to Conspiracy, Export Control Violations, and Bribery
  • U.S. Army Intelligence Analyst Arrested
  • U.S. Army Intelligence Analyst Pleads Guilty to Charges of Conspiracy

Employment

  • Being unemployed does not equate to being unqualified
  • Suicide rates in the US are on the rise: New study offers surprising reasons why
  • That job you applied for might not exist. Here’s what’s behind a boom in “ghost jobs.”
  • The Best Time to Apply for Jobs
  • THE EMPLOYMENT SITUATION — JULY 2024
  • Being unemployed does not equate to being unqualified
  • Suicide rates in the US are on the rise: New study offers surprising reasons why
  • That job you applied for might not exist. Here’s what’s behind a boom in “ghost jobs.”
  • The Best Time to Apply for Jobs
  • THE EMPLOYMENT SITUATION — JULY 2024

Networking

  • What is WCCP?
  • DNS: Types of DNS Records, DNS Servers and DNS Query Types
  • What is WCCP?
  • DNS: Types of DNS Records, DNS Servers and DNS Query Types

Sales Engineer

  • What makes a cybersecurity sales engineer?
  • Building a home cybersecurity lab
  • What makes a cybersecurity sales engineer?
  • Building a home cybersecurity lab

Technology

  • Can Cybersecurity be Automated?
  • Desktop market matures but VDI challenges remain
  • Can Cybersecurity be Automated?
  • Desktop market matures but VDI challenges remain

Project Portfolio

Architecture

  • AT&T Managed Threat Detection and Response – Infrastructure Drawing
  • IBM Security QRadar Suite Architecture
  • AT&T Cybersecurity All-in-one Product Architecture
  • AT&T Managed Threat Detection and Response – Infrastructure Drawing
  • IBM Security QRadar Suite Architecture
  • AT&T Cybersecurity All-in-one Product Architecture

Customer Solution

  • DeKalb County School District
  • Nueces County, TX SASE
  • Seminole State College
  • Tulane University
  • WellStreet Urgent Care
  • DeKalb County School District
  • Nueces County, TX SASE
  • Seminole State College
  • Tulane University
  • WellStreet Urgent Care

Marketing

  • AT&T Marketing Collateral (Public Sector)
  • IBM Security – Cost of Data Breach Report 2023 (Enablement)
  • IBM Security QRadar SOAR – A Day In The Life.
  • Sys Logic Technology Services, LLC. Marketing Collateral
  • AT&T Marketing Collateral (Public Sector)
  • IBM Security – Cost of Data Breach Report 2023 (Enablement)
  • IBM Security QRadar SOAR – A Day In The Life.
  • Sys Logic Technology Services, LLC. Marketing Collateral

Sales Enablement

  • Alert Logic MDR Competitive Guide
  • AT&T Sales Enablement Training
  • IBM Security – Cost of Data Breach Report 2023 (Enablement)
  • IBM Security QRadar SOAR – A Day In The Life
  • Cybersecurity TechSegment
  • Alert Logic MDR Competitive Guide
  • AT&T Sales Enablement Training
  • IBM Security – Cost of Data Breach Report 2023 (Enablement)
  • IBM Security QRadar SOAR – A Day In The Life
  • Cybersecurity TechSegment

Use Cases

  • Industrial Control Use Case
  • Jimbob’s Towing and Wrecker Service
  • ObserveIT Integration Use Case
  • Zscaler SASE Example
  • Industrial Control Use Case
  • Jimbob’s Towing and Wrecker Service
  • ObserveIT Integration Use Case
  • Zscaler SASE Example

POWERED bY SOVERGENCE | THE TECHNOLOGY PROVIDER’S PROVIDER!
© 2025 Tony DeGonia | All Rights Reserved.