Blog
Tech vs. Law: A Dialectical Approach to Balancing Innovation and Regulation
by Alejandro Leal
Reshaping the future The relationship between law and technology is a complex one. While law plays a crucial role in safeguarding public interests and ensuring checks and balances, it is also perceived by some as a potential impediment and a deterrent to innovation in the tech industry. Proponents of this idea argue that the tech industry has thrived in part because of its ability to respond to market demands. However, discussions around law and technology tend to yield valuable insights, often involving multiple stakeholders and featuring concerted efforts. During my graduate...
Blog
Beyond Boundaries: The Geopolitics of Cyberspace
by Alejandro Leal
In recent years, the question of a state's territorial sovereignty in cyberspace has been a major topic of discussion. The emergence of cyberspace has introduced new spatial dimensions and challenged our understanding of international law. When it comes to cyberspace, the solid and defined notion of territory does not necessarily apply there. Sovereignty has been unbundled in cyberspace, both in practice and in legality. At its core, the notion of sovereignty in cyberspace encompasses a state's authority and control over the digital activities that take place within its borders. While...
Blog
Future Cybersecurity Threats: Advanced Disinformation Campaigns
by Alejandro Leal
Deepfakes and Disinformation in Cyberspace Cyberspace greatly enhances an actor's ability to engage in activities that can yield geopolitical and economic gains without resorting to the use of force. With the advent of cyberspace, various actors, including both state and non-state entities, have taken advantage of its vast interconnectedness to partake in a wide range of activities, including malicious behavior. Cybercriminals and state-sponsored adversaries are always looking for new ways to exploit vulnerabilities and use new tools to target individuals and organizations. For...
Blog
2023 Trends and Predictions - Passwordless Authentication
by Alejandro Leal
We hear it all the time: “Humans are the weakest link in cybersecurity”. Unfortunately, this contemptuous characterization of human nature is deeply ingrained in the industry. While human error is still the driving force behind a number of security breaches and incidents, the modern cybersecurity landscape has become too broad and sophisticated to be managed by individuals alone. By modernizing and implementing the right tools, however, we may be able to reduce and improve the impact of the human factor on cybersecurity. The Alternative? Passwordless Authentication...
Blog
Going Passwordless – Separating Identity and Authentication
by Alejandro Leal
Identity and Authentication Digital transformation can be defined as a process that organizations go through to deliver digital services to their customers and consumers in the Digital Age. Essentially, delivering digital services requires the management of the digital identities of consumers, customers, and business partners in a secure and seamless manner. Therefore, the success of digital transformation initiatives depends on managing access and managing these digital identities. In contrast to the increased centralization of digital identity, the authentication layer has become...
Blog
Human Factor in Cybersecurity: The Weakest Link?
by Alejandro Leal
The Human Factor Cybercriminals often exploit our human vulnerabilities and psychological elements to steal credentials and gain unauthorized access. Since phishing and social engineering attacks are primarily targeted at people, the human factor continues to be an important element CISOs need to consider in order to protect their organizations from cyber-attacks. Most data breaches are caused by human error, negligence, or lack of awareness, for example, by simply clicking the wrong link. So, it is common for employees to increase their digital footprint without being aware of the...
Blog
Will Users and Organizations Have Trust in Keys Roaming via the Cloud?
by Alejandro Leal
The need for authentication standards In the cybersecurity industry, many new technologies–particularly those related to identity management and authentication–are constantly driving change and innovation. Yet one thing remains the same: the use of passwords continues to pose a threat to an organization’s IT security. As long as passwords continue to be used, users and organizations will remain vulnerable to attacks. Fortunately, due to the development of new solutions and authentication standards, replacing passwords as the dominant form of authentication on the...
Blog
Public-Private Cooperation in Cyberspace
by Alejandro Leal
Managing business in today's geopolitical context In the face of a geopolitical crisis, concerns are growing about the threat of cyber-attacks to global supply chains and private organizations, which are already in a precarious state due to the Covid-19 pandemic. When a crisis occurs, business continuity and corporate resilience are essential. Both require a company-wide response. In this context, geopolitical risk assessments are integral to a secure IT environment. With the advent of cyberspace, state and non-state actors have been willing to challenge the political and economic...