Tony DeGonia

Sales Engineer | USA - South East Region
Highly Experienced Sales Engineer in multiple domains creating solutions for highly technical problems for the multitude of industry clients who require physical security/surveillance solutions.

Contact Information

469 969 9450 (Cell)
Available anytime via email or cellphone.

12 I know what it is to be in need, and I know what it is to have plenty. I have learned the secret of being content in any and every situation, whether well fed or hungry, whether living in plenty or in want. 13 I can do all this through him who gives me strength.

- Philipians 4:12-13


Rusty Barlow, 51, of Corsicana dead

UPDATE: Canton tornado claims Corsicana man

It was a day for a celebration. But a day that was intended to make great memories instead turned to sorrow when the Canton tornado hit Saturday, leaving Rusty Barlow, 51, of Corsicana dead. Four generations of the Eaton/Arnett family were gathered at the home of Amanda and Clyde Scott outside Canton. Amanda’s goal was to give her sister Jessica the wedding of her dreams. The wedding was to be held in the Scott’s shop, and prospective groom Kyle Carpenter along with about 11 other family members were in the shop prior to the festivities.

Tornado Damage Emergency

Van Zandt, Henderson, Rains County Tornado Emergency Info

On 5/29/2017 4 tornadoes swept through Van Zandt County wreaking havoc across multiple small towns and cities in the area. In the past 24 hours over 50 people have been taken to area hospitals to be treated for everything from minor cuts and scrapes to major injuries. Additionally, there have so far been 5 fatalities recorded from these deadly storms. As you may know springtime in Texas can be quite dangerous with the culmination of severe storms that often turn into deadly tornadoes as was the case on Saturday.

OSX Malware is Catching Up, and it wants to Read Your HTTPS Traffic

by Ofer Caspi, Malware Research Team | posted 2017/04/27 People often assume that if you’re running OSX, you’re relatively safe from malware. But this is becoming less and less true, as evidenced by a new strain of malware encountered by the Check Point malware research team. This new malware – dubbed OSX/Dok — affects all […]

2017 Security Predictions – The Threats Are Real

WatchGuard Technologies, Inc. https://www.watchguard.com While 2016 was a banner year for cyberattacks, hold onto your boots, 2017 should be a wild ride as well. We’ll see escalations of current threats and brand new attack vectors. Will the first ever Ransomworm spread through networks like wildfire? Will your IoT device become the de facto target for zombie […]

Free security tools to support cyber security efforts

More cyber security freebies than you knew existed By David Geer – CSO | Dec 22, 2016 5:30 AM PT There are more free information security tools out there than you can highlight with a fist full of whiteboard pointers. While many are trial ware-based enticements designed to lure decision makers to purchase the pricey […]

Serious Bug Exposes Sensitive Data From Millions Sites Sitting Behind CloudFlare

2017-02-23T22:45:00-11:00Thursday, February 23, 2017 Swati Khandelwal A severe security vulnerability has been discovered in the CloudFlare content delivery network that has caused big-name websites to expose private session keys and other sensitive data. CloudFlare, a content delivery network (CDN) and web security provider that helps optimize safety and performance of over 5.5 Million websites on […]

The practicality of the Cyber Kill Chain approach to security

By Lysa Myers Lysa Myers of the InfoSec Institute explains the Cyber Kill Chain approach and whether or not it’s a good fit for certain organizations. If you’re one of those folks who read a lot of InfoSec news, you’ve no doubt heard a lot of mention of the effectiveness of a Cyber Kill Chain […]

10 new AWS cloud services you never expected

From data scooping to facial recognition, Amazon’s latest additions give devs new, wide-ranging powers in the cloud By Peter Wayner | Follow | Contributing Editor, InfoWorld | Jan 23, 2017 3:00 AM PT In the beginning, life in the cloud was simple. Type in your credit card number and—voilà—you had root on a machine you […]

Microsoft’s ad missed the mark but opened eyes

  DIVERSE-IT  |  By Sharon Florentine, Senior Writer, CIO | APR 20, 2017 4:12 AM PT Microsoft’s latest Women in STEM ad misses the point. Unless the point is to blame women for their own oppression. Microsoft’s diversity and inclusion page starts off with this sentence, “In over 20 years of committed diversity and inclusion efforts, […]

IT leaders say it’s hard to keep the cloud safe

Shadow IT causing cloud trouble by illicitly working behind the scenes By Sharon Gaudin | Senior Writer, Computerworld | FEB 15, 2017 12:17 PM PT IT managers are finding it difficult to keep their applications and data safe in the cloud, and many are slowing cloud adoption because of it. That was one of the findings of […]

Hackers use old Stuxnet-related bug to carry out attacks

Protection from these exploits means installing security patches or upgrading your OS By Michael Kan | U.S. Correspondent, IDG News Service | APR 20, 2017 1:45 PM PT Users that run unpatched software beware. Hackers have been relying on an old software bug tied to the Stuxnet worm to carry out their attacks. Microsoft may have initially […]

Upcoming Events