Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Stop Killing Games is a consumer-driven shake up for digital distribution as a whole | Opinion

    Goat Simulator creators reveal new studio Feeble Minds

    Wreckreation maker Three Fields Entertainment puts whole studio on redundancy notice

    Facebook X (Twitter) Instagram
    • Artificial Intelligence
    • Business Technology
    • Cryptocurrency
    • Gadgets
    • Gaming
    • Health
    • Software and Apps
    • Technology
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Tech AI Verse
    • Home
    • Artificial Intelligence

      Apple’s AI chief abruptly steps down

      December 3, 2025

      The issue that’s scrambling both parties: From the Politics Desk

      December 3, 2025

      More of Silicon Valley is building on free Chinese AI

      December 1, 2025

      From Steve Bannon to Elizabeth Warren, backlash erupts over push to block states from regulating AI

      November 23, 2025

      Insurance companies are trying to avoid big payouts by making AI safer

      November 19, 2025
    • Business

      Public GitLab repositories exposed more than 17,000 secrets

      November 29, 2025

      ASUS warns of new critical auth bypass flaw in AiCloud routers

      November 28, 2025

      Windows 11 gets new Cloud Rebuild, Point-in-Time Restore tools

      November 18, 2025

      Government faces questions about why US AWS outage disrupted UK tax office and banking firms

      October 23, 2025

      Amazon’s AWS outage knocked services like Alexa, Snapchat, Fortnite, Venmo and more offline

      October 21, 2025
    • Crypto

      HTX Research Releases New Report on Prediction Markets: From Structural Constraints to the Future of Attention-Based Financial Infrastructure

      December 4, 2025

      Monad (MON) Risks a Slide to Listing Lows as Big Players Walk Away — Last Hope At $0.028?

      December 4, 2025

      Peter Schiff to CZ: ‘Bitcoin Payments? They’re Just Liquidated Bets’

      December 4, 2025

      Tom Lee’s Relentless ETH Buying Puts BMNR Stock on a Possible 55% Breakout Path

      December 4, 2025

      Vienna Crypto Murder Shocks Europe as Kidnapping Wave Escalates

      December 4, 2025
    • Technology

      ‘AI is permeating everything we do’: How Guitar Center developed 2 AI tools this year

      December 4, 2025

      Media Briefing: Publishers turn to vertical video to compete with creators and grow ad revenue in 2026

      December 4, 2025

      From lawsuits to lobbying: How publishers are fighting AI

      December 4, 2025

      U.K. retailer Boots leads brand efforts to invest in ad creative’s data layer

      December 4, 2025

      Digiday+ Research Subscription Index 2025: Subscription strategies from Bloomberg, The New York Times, Vox and others

      December 4, 2025
    • Others
      • Gadgets
      • Gaming
      • Health
      • Software and Apps
    Check BMI
    Tech AI Verse
    You are at:Home»Technology»Unspoken risk: Human factors undermine trusted platforms
    Technology

    Unspoken risk: Human factors undermine trusted platforms

    TechAiVerseBy TechAiVerseMay 7, 2025No Comments5 Mins Read2 Views
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    Unspoken risk: Human factors undermine trusted platforms
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp Email

    Unspoken risk: Human factors undermine trusted platforms

    A leak of information on American military operations caused a major political incident in March 2025. The Security Think Tank considers what can CISOs can learn from this potentially fatal error.

    By

    • Aditya K Sood, Aryaka

    Published: 06 May 2025

    The Signal leak incident in which a journalist was inadvertently added to a group chat discussing classified American military operations – underscores a chilling truth: even the most secure platforms are vulnerable to human error. This wasn’t a breakdown in encryption or a zero-day exploit. It was a simple, all-too-human mistake with potentially devastating consequences; a stark reminder of the high stakes involved in cyber security.

    Are encrypted platforms like Signal safe?

    Considering the design of the Signal messaging application and inherent security controls, the answer is yes. Encrypted messaging platforms are technically sound, offering state-of-the-art end-to-end encryption. However, encryption is not a substitute for judgment or process. These tools are vulnerable to misuse and abuse if contextual governance and user discipline are lacking. The assumption that secure tools ensure secure communication is dangerously misleading. Human error – misaddressing messages, mismanaging access, or misunderstanding context – can completely undermine even the strongest security frameworks. Even the best examples of secure design can fail when you add humans. Tools rarely break, but the trust and control around them often do.

    Consider this case study a caution and a call to action. Mistakes are inevitable, but systems can be designed to detect and minimise the impact of those errors. Communication security must be reframed as a human-centered challenge, where technical controls are complemented by cultural change and operational safeguards. Cyber security professionals who want to shape a human-centered approach to security should keep the following principles in mind.

    • Human error always trumps encryption: No matter how robust the cryptographic protocols or how secure the messaging platform, a single misstep – like adding the wrong participant to a sensitive group chat—can render all technical safeguards useless. Encryption secures data at rest and in transit but cannot prevent a user from unintentionally sharing that data with an unauthorised person. The weakest link is not the algorithm but the human operating it. 
    • A secure platform does not equal secure policy enforcement: Using a secure platform like Signal does not equate to having a secure communication policy – platform ≠ policy. While Signal provides strong encryption and privacy features, it cannot enforce organisational rules, manage information sensitivity, or prevent misuse by trusted users. Security isn’t embedded in the tool but in how it is used, governed, and monitored. Without clear policies regarding group management, participant vetting, discussion classification, and user accountability, even the most secure platforms can become vectors for accidental or malicious leaks.
    • Metadata is a hidden risk: Even when message content is encrypted, metadata still matters – and can be dangerously revealing. Metadata includes who is communicating, when, how often and from where. In the context of the Signal leak, while the messages may have been protected, specific participant patterns in communication could have exposed sensitive operational insights. Adversaries can exploit metadata to map networks, infer relationships, track activity patterns, or time-sensitive actions without decrypting a single word.
    • Zero-trust applies to communications too: Zero-trust is often applied to networks, identities and endpoints but in today’s threat landscape it must also extend to communications. Just because a message is sent within an encrypted app doesn’t mean the recipient is verified, appropriate, or even authorized to receive that information. In the case of the Signal leak, the breach didn’t happen through technical compromise – it happened because assumed trust was misplaced. Applying zero-trust principles to communications means verifying every participant device’s security posture, controlling access dynamically, auditing group activity and continuously validating identity and context. 

    Setting practical boundaries

    Security doesn’t stop at the algorithm; it must encompass behavior, policy, and trust boundaries. There are practical steps CISOw can take to mitigate human factors:

    • Implement internal-only communication apps or hardened versions of Signal-like apps under controlled infrastructure
    • Segment communications by classification level, such as operational, strategic, or confidential, to restrict group owners from adding participants outside a verified user directory
    • Use AI-based monitoring to detect anomalies in group formation or message flow
    • Conduct training that embeds “trust but verify” habits by simulating breaches to improve behavior under stress
    • Adopt controls that minimise metadata exposure, limit group visibility and anonymize or obfuscate communication patterns wherever possible.

    CISOs must move from securing tools to securing behaviours. Building technical trust is step one, and creating a culture of secure communication is now step zero. Adding this step is the key to mitigating human-centric risks in messaging platforms.

    Aditya K Sood is vice president of security engineering and AI strategy at Aryaka.

    Read more on Web application security


    • Security Think Tank: What CISOs can learn from Signalgate


    • Signalgate: Learnings for CISOs securing enterprise data

      By: Todd Thiemann


    • The top 5 most secure encrypted messaging apps

      By: Madeleine Streets


    • France pushes for law enforcement access to Signal, WhatsApp and encrypted email 

      By: Bill Goodwin

    Share. Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Telegram Email
    Previous ArticleFintech summit reveals what’s next for sector
    Next Article Government industrial strategy will back cyber tech in drive for economic growth 
    TechAiVerse
    • Website

    Jonathan is a tech enthusiast and the mind behind Tech AI Verse. With a passion for artificial intelligence, consumer tech, and emerging innovations, he deliver clear, insightful content to keep readers informed. From cutting-edge gadgets to AI advancements and cryptocurrency trends, Jonathan breaks down complex topics to make technology accessible to all.

    Related Posts

    ‘AI is permeating everything we do’: How Guitar Center developed 2 AI tools this year

    December 4, 2025

    Media Briefing: Publishers turn to vertical video to compete with creators and grow ad revenue in 2026

    December 4, 2025

    From lawsuits to lobbying: How publishers are fighting AI

    December 4, 2025
    Leave A Reply Cancel Reply

    Top Posts

    Ping, You’ve Got Whale: AI detection system alerts ships of whales in their path

    April 22, 2025475 Views

    Lumo vs. Duck AI: Which AI is Better for Your Privacy?

    July 31, 2025162 Views

    6.7 Cummins Lifter Failure: What Years Are Affected (And Possible Fixes)

    April 14, 202586 Views

    Is Libby Compatible With Kobo E-Readers?

    March 31, 202563 Views
    Don't Miss
    Gaming December 4, 2025

    Stop Killing Games is a consumer-driven shake up for digital distribution as a whole | Opinion

    Stop Killing Games is a consumer-driven shake up for digital distribution as a whole |…

    Goat Simulator creators reveal new studio Feeble Minds

    Wreckreation maker Three Fields Entertainment puts whole studio on redundancy notice

    Clair Obscur: Expedition 33 becomes 2025’s top third-party release on Xbox Game Pass

    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    About Us
    About Us

    Welcome to Tech AI Verse, your go-to destination for everything technology! We bring you the latest news, trends, and insights from the ever-evolving world of tech. Our coverage spans across global technology industry updates, artificial intelligence advancements, machine learning ethics, and automation innovations. Stay connected with us as we explore the limitless possibilities of technology!

    Facebook X (Twitter) Pinterest YouTube WhatsApp
    Our Picks

    Stop Killing Games is a consumer-driven shake up for digital distribution as a whole | Opinion

    December 4, 20250 Views

    Goat Simulator creators reveal new studio Feeble Minds

    December 4, 20250 Views

    Wreckreation maker Three Fields Entertainment puts whole studio on redundancy notice

    December 4, 20250 Views
    Most Popular

    Apple thinks people won’t use MagSafe on iPhone 16e

    March 12, 20250 Views

    Volkswagen’s cheapest EV ever is the first to use Rivian software

    March 12, 20250 Views

    Startup studio Hexa acquires majority stake in Veevart, a vertical SaaS platform for museums

    March 12, 20250 Views
    © 2025 TechAiVerse. Designed by Divya Tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions

    Type above and press Enter to search. Press Esc to cancel.