Tony DeGonia

Tony DeGonia

Sales Engineer

Tony DeGonia is an experienced Sales Engineer with over 10 years experience designing and providing advanced security solutions to customers in the SMB and Mid-Market Sectors throughout the U.S. Tony is also well versed in the security requirements around Law Enforcement at the Municipal, State and Federal level.

Tony regularly blogs and provides commentary on curated articles on cybersimplified.com. As well, Tony is the host of the 53 Zone Podcast by cybersimplified.com. Tony currently holds a Sales Engineering role with AlienVault and provides to customer’s solution fit, security posture, and many other aspects of cybersecurity solutions.

You can find Tony on LinkedIn or at https://www.cybersimplified.com

January 17, 2019 | Tony DeGonia

The Dark Web has a Serious Deduplication Problem

In a post released on 1/8/19, I wrote about the record number of breaches in 2018. This brought to mind a podcast that I was listening to a few days back hosted by Corey Nachreiner, CTO of WatchGuard Technologies, Inc. on his 443 Podcast. Corey discussed the potential data deduplication problem on the Dark Web. This article will attempt to break down how…

January 8, 2019 | Tony DeGonia

2018 Sees Record Number of Online Retail Data Breaches

During the holiday season people logged on to make purchases through online retailers, like no other time of the year. While there was significant growth in many segments of society on a global scale in 2018, we also  saw a significant increase in online retail breaches where personally identifiable information was compromised at an alarming rate. With more and more…

Get the latest security news in your inbox.

Subscribe via Email

January 3, 2019 | Tony DeGonia

The “Internal” Cyber Kill Chain Model

An Alternative to the “Classic” Cyber Kill Chain Model for Internal Attacks and BreachesDeveloped by Lockheed Martin, the Cyber Kill Chain® (CKC) framework is part of the Intelligence Driven Defense® model for the identification and prevention of cyber intrusions activity. The model identifies what adversaries must complete in order to achieve…

Watch a Demo ›
GET PRICE FREE TRIAL