Research Analyst

Alejandro Leal

Alejandro joined KuppingerCole as a Research Analyst in December 2021. His main areas of expertise include digital transformation in the public and private sector, managing business in today’s geopolitical context, and governance in artificial intelligence and cyberspace.

Background and Education

Bachelor of International Relations and Security from Jagiellonian University in Poland and a Master of Technology Governance and Digital Transformation from Tallinn University of Technology in Estonia.

Professional Experience

Alejandro has gained professional experience doing research in cybersecurity think tanks, a cryptocurrency gaming brand, and the Mexican Embassy.

Latest research

Whitepaper
How to Implement a Zero Trust Security Model With TrustBuilder’s Adaptive Authentication and Fine-Grained Authorization
November 13, 2023
Every organization, regardless of size or industry, needs an agile and modern Identity and Access Management (IAM) platform. As the cybersecurity threat landscape continues to evolve, so do the requirements for IAM. Managing identities and access is essential to ensure that only the right…
Advisory Note
Cybersecurity Resilience with Generative AI
August 25, 2023
Cyberattacks have intensified in recent years. The evolving threat landscape is exemplified by the persistent threat of cyberattacks, driven by cybercriminals' exploration of new tools and techniques, enabling them to launch sophisticated and evasive attacks. As a result, organizations need…
Leadership Compass
Access Management
August 16, 2023
This report provides an overview of the market for Access Management products and services and presents you with a compass to help you to find the product or service that best meets your organization’s needs. We examine the market segment, vendor product and service functionality, relative…
Executive View
SailPoint Identity Security Cloud
March 20, 2023
SailPoint Identity Security Cloud is a cloud-based identity security solution that helps organizations manage access to their applications, data, and other resources. The platform provides a comprehensive view of user access across an organization's IT environment, allowing administrators to…
Leadership Compass
Security Orchestration Automation and Response (SOAR)
January 30, 2023
This report provides an overview of the SOAR market and a compass to help you find a solution that best meets your needs. We examine the SOAR market segment, product/service functionality, relative market share, and innovative approaches to providing SOAR solutions.
Executive View
HID Global Authentication Platform
January 19, 2023
In recent years, investment into cybersecurity has soared but, in most cases, these efforts have not fully addressed the reliance on passwords and the challenges they introduce. Without secure access to resources, businesses and organizations are at risk of suffering from phishing and social…

Latest blog posts

Blog
Tech vs. Law: A Dialectical Approach to Balancing Innovation and Regulation
September 12, 2023
Reshaping the future The relationship between law and technology is a complex one. While law plays a crucial role in safeguarding public interests and ensuring checks and balances, it is also perceived by some as a potential impediment and a deterrent to innovation in the tech…
Blog
Beyond Boundaries: The Geopolitics of Cyberspace
August 15, 2023
In recent years, the question of a state's territorial sovereignty in cyberspace has been a major topic of discussion. The emergence of cyberspace has introduced new spatial dimensions and challenged our understanding of international law. When it comes to cyberspace, the solid and defined…
Blog
Future Cybersecurity Threats: Advanced Disinformation Campaigns
July 21, 2023
Deepfakes and Disinformation in Cyberspace Cyberspace greatly enhances an actor's ability to engage in activities that can yield geopolitical and economic gains without resorting to the use of force. With the advent of cyberspace, various actors, including both state and non-state…
Blog
2023 Trends and Predictions - Passwordless Authentication
March 24, 2023
We hear it all the time: “Humans are the weakest link in cybersecurity”. Unfortunately, this contemptuous characterization of human nature is deeply ingrained in the industry. While human error is still the driving force behind a number of security breaches and incidents, the…
Blog
Going Passwordless – Separating Identity and Authentication
January 26, 2023
Identity and Authentication Digital transformation can be defined as a process that organizations go through to deliver digital services to their customers and consumers in the Digital Age. Essentially, delivering digital services requires the management of the digital identities of…
Blog
Human Factor in Cybersecurity: The Weakest Link?
August 14, 2022
The Human Factor Cybercriminals often exploit our human vulnerabilities and psychological elements to steal credentials and gain unauthorized access. Since phishing and social engineering attacks are primarily targeted at people, the human factor continues to be an important element…

Latest videos

Webinar Recording
Passwordless Authentication: What, Why, and How
October 27, 2023
Join identity and access management experts from KuppingerCole Analysts and ForgeRock for a discussion on passwordless authentication solutions, the reasons organizations are slow to implement them, and how to go about making the switch successfully by understanding the technologies and…
Analyst Chat
Analyst Chat #188: Beyond Tradition - The Evolution and Integration of Access Management
September 04, 2023
Today, host Matthias and expert Alejandro Leal discuss the dynamic realm of Access Management. They'll touch on its evolution beyond traditional capabilities, the intertwined nature of Access Management and Identity Federation, and the industry-wide shift driven by Covid-19 towards modern…
Analyst Chat
Analyst Chat #183: The Danger of Deepfakes for Identity Proofing and Growing Misinformation
July 31, 2023
Join Matthias as he delves into the world of deep fakes with Research Analyst Alejandro Leal. Deep fakes are manipulated media that can be difficult to distinguish from real footage, posing threats in remote identity proofing attacks and disinformation campaigns. Alejandro…
Webinar Recording
Optimize Security With Security Orchestration, Automation, & Response
May 05, 2023
Join security experts from KuppingerCole Analysts and IBM as they explain how Security Orchestration, Automation, and Response (SOAR) solutions address this and other security challenges. They will also examine different approaches to SOAR, and discuss how to identify SOAR solutions that…
Webinar Recording
Take Invisible MFA to the Next Level With Passwordless Continuous Authentication
April 21, 2023
Join experts from KuppingerCole Analysts and SecureAuth as they discuss why not all MFA solutions offer the same level of protection, and how organizations can improve their security posture and user experience by adopting a different approach that combines MFA with risk-based Passwordless…
Webinar Recording
Best of Both Worlds: Combining Multi-Factor and Passwordless Authentication
March 24, 2023
Join experts from KuppingerCole Analysts and trusted identity firm Entrust as they discuss why not all MFA solutions offer the same level of protection. They will also explore the current state of Passwordless Authentication solutions and how best to implement them. Alejandro Leal,…