Author: Diego Asturias

Diego Asturias

Diego is a full-time researcher and writer specializing in networking and cybersecurity. He has been researching, gathering, and publishing stunning content for about six years.
Behind the Scenes.
Diego is one of those who believe you don’t need to go to University to be the best, but he went anyway. He went to study at Strayer University, Virginia, USA, where he got his Bachelor's Degree in Internetworking Technology. This, obviously opened a lot of doors. He went on to work in major Latinamerican ISPs and cybersecurity providers. During this time, he designed and monitored networks, configured 3G/4G mobile broadband technologies, led different infrastructure installations, and learned to secure all those networks.

In addition, across Diego's career, he has also gotten certifications from Cisco and McAfee and pursued others like AWS, Certified Ethical Hacker (CEH), and Wireshark.

Being hungry for more knowledge and challenging experiences, he traveled across the world to Seoul, South Korea, where he got his Master's degree. In a fantastic university, besides drinking beer for breakfast, he also collaborated on the development of a Wireless Sensor Networks project; one of those key technologies that led to the now popular, IoT.

Diego also traveled to Africa to collaborate with the Chinese mega-company, Huawei, to design, maintain, monitor, and develop the 4G/LTE networks for about two years. After some tough cold nights sleeping inside A/C powered data centers, rather than under the beautiful African sky, Diego dreamed to become a journalist and share all his knowledge with others.
Jumping Into Tech Journalism.
Now, Diego loves what he does: Tech Journalism. Although dreaming about it, was smooth and fun, opening the way has been a wild ride. Now, six years have passed, and Diego is making a living and full-time career as a tech journalist.

Today, he tests products; from proxy servers, VPNs, network monitoring tools, and WAFs. He writes about them and gives his opinion. He researches the web, sets up virtual and cloud labs, reads from fellow experts, identifies trends in tech, and shares his opinion.

Diego also writes about server installations, securing those servers, threat intelligence, VPNs, proxies, TOR, P2P, online privacy, and more. He has been covering news on SiliconANGLE Media, has published in Threat Post, Lanner Electronics, Cloudbric, PCWDLD, ITT Systems, SecurityGladiators, Rapidseedbox, and many other leaders in the networking and cybersecurity industry.


Network Device Monitoring Guide

Keeping a close eye on a network’s performance and availability is paramount. In most cases, it only takes a single faulty line or overloaded network device to significantly impact the…


10 Best LogMeIn Alternatives

LogMeIn has been one of the favorite remote access and support solutions for a long time. But now, long-time users are starting to look for a change. As of 2022,…


8 Best Mainframe Monitoring Tools

Mainframe monitoring is an entirely different ball game. Mainframes process high volumes of transactions and input/output operations in parallel and exceptionally quickly, and they usually serve mission-critical applications. Organizations that…


7 Business Email Security Best Practices

As of 2022, email is still the number one target of cybercriminals and fraudsters. According to Cisco’s last year’s (2021) cybersecurity threat trends report, at least one person in around…


The 10 Best Email Security Software

This article reviews the ten best email security software available today. This type of software provides the fundamental security capabilities of email security gateways, including protection from threats like malware,…


The 10 Best Secure Web Gateways

A Secure Web Gateway (SWG), also known as Web Security Gateway, lets organizations benefit from the web and cloud-based applications and sites without exposing users to dangerous web-borne malware, viruses,…


The 10 Best Virtual Machine Backup Software

The virtual machine backup software shown in this post aims to protect data via backup and recovery, data security, and privacy methodologies‚— all qualities of a data security-centric solution. We…


How to Query Cisco ISE Using TACACS

Cisco ISO is a robust network access control policy and enforcement platform. It supports the TACACS+ protocol to allow fine controls and audits of network devices and configurations. You can…


Azure Solutions: IaaS vs. PaaS

IaaS and PaaS are two of the four types (along with SaaS and serverless) of the cloud as a services model provided by Microsoft Azure. Knowing the differences between the…