Tony DeGonia

Consultant - Cyber, Cloud, Networking and Physical

Highly proficient, knowledgeable and motivated Sales Engineer with a successful track record of sales success across 2 decades. Motivated professional who excels at delivering quality service while exceeding revenue benchmarks on a consistent basis. Well versed in multiple security domains including, cyber, cloud, networking and physical (IP/CCTV). Equally comfortable installing and deploying cutting edge technology, negotiating sales contracts from SMB to Large Enterprise or speaking/training on an advanced technology subjects to an audience of 400 or more. I am available for immediate employment either via W2 or 1099. If you are a client and would like to contract my services as a consultant please contact me via email or telephone and we can discuss the issues and my rates at that time. Thank you for visiting my website.

How long since I have had gainful employment

I have been laid of since:February 12, 2018
4 months ago.

Years of Sales Engineering Experience

Years of Sales/Business Experience

Cyber Security Proficiency


Cloud Services Proficiency


Networking Proficiency


Physical Security Proficiency


Podcast Central

11. For I know the plans I have for you,” declares the Lord, “plans to prosper you and not to harm you, plans to give you hope and a future. 12. Then you will call on me and come and pray to me, and I will listen to you. 13. You will seek me and find me when you seek me with all your heart.

Jeremiah 29:11 New International Version (NIV)


I write and curate articles for this site that I think may be helpful, educational and even some that are original works. I am also a published author of a number of articles on different technology subjects, not just through my own website but through nationally know channels as well. I have also been quoted for numerous articles as a subject matter expert in the fields of Managed Services and Cloud Services.

Free security tools to support cyber security efforts

More cyber security freebies than you knew existed By David Geer – CSO | Dec 22, 2016 5:30 AM PT There are more free information security tools out there than you can highlight with a fist full of whiteboard pointers. While many are trial ware-based enticements designed to lure decision makers to purchase the pricey […]

Serious Bug Exposes Sensitive Data From Millions Sites Sitting Behind CloudFlare

2017-02-23T22:45:00-11:00Thursday, February 23, 2017 Swati Khandelwal A severe security vulnerability has been discovered in the CloudFlare content delivery network that has caused big-name websites to expose private session keys and other sensitive data. CloudFlare, a content delivery network (CDN) and web security provider that helps optimize safety and performance of over 5.5 Million websites on […]

The practicality of the Cyber Kill Chain approach to security

By Lysa Myers Lysa Myers of the InfoSec Institute explains the Cyber Kill Chain approach and whether or not it’s a good fit for certain organizations. If you’re one of those folks who read a lot of InfoSec news, you’ve no doubt heard a lot of mention of the effectiveness of a Cyber Kill Chain […]

10 new AWS cloud services you never expected

From data scooping to facial recognition, Amazon’s latest additions give devs new, wide-ranging powers in the cloud By Peter Wayner | Follow | Contributing Editor, InfoWorld | Jan 23, 2017 3:00 AM PT In the beginning, life in the cloud was simple. Type in your credit card number and—voilà—you had root on a machine you […]

Microsoft’s ad missed the mark but opened eyes

  DIVERSE-IT  |  By Sharon Florentine, Senior Writer, CIO | APR 20, 2017 4:12 AM PT Microsoft’s latest Women in STEM ad misses the point. Unless the point is to blame women for their own oppression. Microsoft’s diversity and inclusion page starts off with this sentence, “In over 20 years of committed diversity and inclusion efforts, […]

IT leaders say it’s hard to keep the cloud safe

Shadow IT causing cloud trouble by illicitly working behind the scenes By Sharon Gaudin | Senior Writer, Computerworld | FEB 15, 2017 12:17 PM PT IT managers are finding it difficult to keep their applications and data safe in the cloud, and many are slowing cloud adoption because of it. That was one of the findings of […]

Hackers use old Stuxnet-related bug to carry out attacks

Protection from these exploits means installing security patches or upgrading your OS By Michael Kan | U.S. Correspondent, IDG News Service | APR 20, 2017 1:45 PM PT Users that run unpatched software beware. Hackers have been relying on an old software bug tied to the Stuxnet worm to carry out their attacks. Microsoft may have initially […]

Top Scoring Data Breaches

Top 10 Data Breaches Since 2013

Top Scoring Data Breaches Organization Breached Records Breached Date of Breach Type of Breach Source of Breach Location Industry Risk Score JPMorgan Chase 83,000,000 8/27/2014 Identity Theft Malicious Outsider United States Financial 10 Korea Credit Bureau, NH Nonghyup Card, Lotte Card, KB Kookmin Card 104,000,000 1/20/2014 Identity Theft Malicious Insider South Korea Financial 10 Target 110,000,000 11/4/2013 […]

Hacker Shows How Easy It Is To Hack People While Walking Around in Public

2017-02-24T03:24:00-11:00Friday, February 24, 2017 Mohit Kumar Wi-Fi enabled devices — widely known as the Internet of Things (IoT) — are populating offices and homes in greater and greater numbers. From smartphones to connected printers and even coffee makers, most of these IoT devices have good intentions and can connect to your company’s network without a […]

US government ‘hacked global bank system’

Dave Lee – North America technology reporter – April 15, 2017 A huge range of security weaknesses, said to be worth over $2m if sold on the black market, have been leaked online. The tools are said to have been created by the US National Security Agency (NSA), and accompanying documents appear to indicate a possible breach […]

Profiling Modern Hackers: Hacktivists, Criminals, and Cyber Spies. Oh My!

May 30, 2013 By Corey Nachreiner Sun Tzu, the renowned military strategist and author of The Art of War, was known for the saying, “Know thy enemy and known thyself, and you will not be imperiled in a hundred battles.” While the true intention of this quote is likely to remind us that knowing our […]

Don’t Lose Your Tax Return to Hacker Emails

April 13, 2017 By The Editor @ Be on the lookout for fake IRS emails as tax season comes to a close. Phishers pretending to be from the IRS are flooding the internet. Last year the IRS saw a 400 percent increase in phishing and malware incidents in the first part of tax season, compared […]

Member of The Internet Defense League

Subscribe to my website for updates

Enter your email address to subscribe to my website and receive notifications of all my new articles and podcasts via email.

Join 1,320 other subscribers

Wills Point, TX
humidity: 94%
wind: 7mph SE
H 75 • L 74
Weather from OpenWeatherMap

Check out my Social Media