Connect with us

Innovation and Technology

Signals

Published

on

Signals

From Signal to Systems Failure

When The Atlantic’s Jeffrey Goldberg published the now-infamous account of being added — accidentally and silently — to a Signal chat involving Vice President JD Vance, Secretary of Defense Pete Hegseth, Director of National Intelligence Tulsi Gabbard and others, it sparked national outrage. The chat wasn’t just idle chatter — it included timestamped details about drone launches and missile strikes in Yemen. Goldberg, unaware of the gravity of what he was reading at first, later confirmed that he had a front-row seat to real-time discussions of imminent military action.

The Venmo Vectors and Open-Source Oversights

Following Signalgate, Wired reported that National Security Adviser Michael Waltz had his Venmo account set to public, exposing a network of 328 connections — including journalists, military officers and government staffers. Among them: active members of the National Security Council. It’s not just about who paid whom for tacos or splitting a hotel bill — it’s about network mapping. Foreign intelligence services couldn’t ask for a more convenient way to build a social graph of top U.S. officials.

Why This Is Worse Than It Looks

It’s easy to laugh off a public Venmo account or an outdated contact list. But in the hands of a nation-state adversary or a well-funded cybercriminal syndicate, this data becomes a weapon. Here’s how:

  • Social Graph Mapping: By analyzing who officials are connected to, adversaries can identify secondary targets who may have weaker defenses but high-value access — staffers, family members, assistants.
  • Phishing with Context: A phishing email from a random sender is easy to ignore. One that appears to come from a known colleague or friend — referencing a recent payment or shared trip — is far more convincing.
  • Credential Harvesting and Pivot Attacks: A compromised assistant’s inbox can lead to calendar invites, shared docs or even credentials that open more sensitive systems. The attacker doesn’t start at the top — they work their way there, one trusted contact at a time.
  • Extortion and Leverage: Knowing an official’s inner circle and routines gives adversaries ammunition for coercion — whether it’s exploiting embarrassing personal connections or threatening to expose operational lapses.

The Culture Problem Behind the Cyber Problem

The Signalgate scandal, combined with these broader exposures, reflects a culture problem.

What Needs to Happen Now

To prevent future incidents like Signalgate — or worse — several things need to happen:

  • Mandatory Cyber Hygiene Training for Government Officials: If a mid-level employee at a tech company can be required to pass annual security training, so should every cabinet member and political appointee.
  • Strict Communication Protocols: Government communications involving operational or classified content must be conducted through approved, monitored systems — not convenience-first consumer apps.
  • Aggressive Open-Source Intelligence Audits: Officials should undergo regular reviews of their digital footprint to identify and remediate exposed information — before an adversary uses it.
  • A Security-First Mindset: Cybersecurity cannot be relegated to IT departments. It must be part of every decision — from how apps are used to how networks are built and how people connect.

Every Breadcrumb Matters

Signalgate didn’t happen because of some masterful hack or a catastrophic zero-day exploit. It appears to have happened because someone fat-fingered a phone number. It’s a chilling reminder that even at the highest levels of power, the smallest mistakes can have enormous consequences.

Conclusion

Every bit of data — every contact, payment, message or connection — is a piece of a puzzle. And once an adversary has enough of those pieces, they can see the whole picture clearly. Cybersecurity isn’t just about protecting secrets — it’s about protecting the ordinary details that, when combined, become extraordinary vulnerabilities.

FAQs

  • What is the main issue with the Signalgate scandal?
    • The main issue is that government officials are conducting sensitive communications on personal devices, which can be vulnerable to hacking and exploitation.
  • What is the significance of the Venmo account being set to public?
    • The significance is that it exposes a network of connections, including journalists, military officers and government staffers, which can be used by foreign intelligence services to build a social graph of top U.S. officials.
  • What are the potential consequences of these digital hygiene failures?
    • The potential consequences include social graph mapping, phishing with context, credential harvesting and pivot attacks, and extortion and leverage.
  • What needs to happen to prevent future incidents like Signalgate?
    • Mandatory cyber hygiene training, strict communication protocols, aggressive open-source intelligence audits, and a security-first mindset are necessary to prevent future incidents.

Innovation and Technology

Breach Readiness for Business Continuity

Published

on

Breach Readiness for Business Continuity

Introduction to Breach Readiness

Cybersecurity strategy has undergone a fundamental shift—from aspiring to build impenetrable defenses to accepting that breaches are inevitable. In today’s environment, the defining question is no longer if you’ll be breached, but when—and whether your business can keep running when it happens.

Rethinking the Security Mandate

The traditional security model—fortify the perimeter, stop the intrusion—no longer holds. Perimeters have dissolved with the rise of cloud adoption, remote work, and interconnected systems. Attackers no longer need to “break in” when they can just log in with stolen credentials.

Breach readiness reflects a new security mandate: contain threats swiftly, prevent their spread, and sustain critical operations even during an active attack. It’s about designing security not just to protect the business, but to preserve the business when protection fails.

As Sunil Muralidhar, VP of marketing and partnerships at ColorTokens put it on a recent episode of the TechSpective Podcast, “The goal of a business at the end of the day is to make money… Now cybersecurity, the role of the CISO, for example, is to align with that goal—what do you need to do as a cybersecurity function to ensure business continues despite a breach.”

Containment Is the New Perimeter

Once attackers gain access, they typically aim for lateral movement—hopping from system to system, performing reconnaissance, escalating privileges, and seeking out high-value assets. The longer they go undetected, the greater the damage.

Breach readiness prioritizes limiting the blast radius. The objective isn’t to eliminate every threat, but to prevent one compromised user or device from becoming a launchpad for widespread damage. That requires designing internal controls with the assumption that compromise is already underway.

This shift in mindset parallels other domains. Submarines are divided into sealed compartments because flooding is expected, not unthinkable. Hospitals protect critical systems like EMRs or imaging equipment over endpoints with lower operational impact. The same logic must now be applied to digital infrastructure.

Zero Trust and the Business Continuity Equation

Zero trust has reemerged as a foundational approach to enabling breach readiness, especially as digital environments grow more fragmented and complex. But zero trust isn’t a product or single action—it’s a strategy built on the assumption of compromise.

Muralidhar explained, “Breach readiness basically means continuing your digital operations… in an adverse environment. And in order to do that, the cyber leader needs to have visibility, understand the business, and know which applications and systems matter most.”

That means shifting from blanket security policies to risk-based prioritization. In sectors like healthcare, for instance, securing Epic or Cerner servers may matter more for continuity than a nurse’s workstation. In manufacturing, keeping OT systems online may take precedence over administrative tools.

This kind of risk-informed approach is essential for maintaining operations while under attack.

Cyber Resilience: A Strategic Differentiator

Breach readiness is a strategic differentiator for companies today. It supports brand trust, regulatory compliance, and operational uptime. More importantly, it enables organizations to absorb shocks without catastrophic failure.

Cyber resilience and breach readiness are increasingly linked in boardroom discussions. Gartner predicts that by 2026, 70% of CEOs will mandate a culture of organizational resilience to survive coinciding threats from cyberattacks, severe weather, and geopolitical unrest.

Forward-thinking CISOs are already aligning with that vision—translating risk into business terms, prioritizing continuity, and advocating for architectural investments that ensure the enterprise can take a hit and keep running.

The Breach-Ready Future

The question isn’t whether attackers will target your business—it’s how far they’ll get and how fast you can shut them down. Breach readiness is about controlling the clock and the blast radius.

It’s a commitment to designing systems, policies, and controls that assume compromise—yet protect operations, data, and customers even under pressure.

That’s not defeatist thinking. It’s reality-based resilience. And in today’s high-stakes cyber environment, it’s the only strategy that guarantees the business survives to fight another day.

Conclusion

In conclusion, breach readiness is a critical component of any organization’s cybersecurity strategy. By acknowledging that breaches are inevitable and taking proactive steps to contain and mitigate them, businesses can minimize the impact of an attack and ensure continuity of operations. This requires a shift in mindset, from focusing solely on prevention to prioritizing resilience and breach readiness.

FAQs

  • Q: What is breach readiness?
    • A: Breach readiness refers to the proactive discipline of preparing for compromise without letting it compromise continuity. It involves designing security measures to contain threats swiftly, prevent their spread, and sustain critical operations even during an active attack.
  • Q: Why is the traditional security model no longer effective?
    • A: The traditional security model is no longer effective because perimeters have dissolved with the rise of cloud adoption, remote work, and interconnected systems, making it easier for attackers to gain access without needing to "break in."
  • Q: What is the role of zero trust in breach readiness?
    • A: Zero trust is a foundational approach to enabling breach readiness, built on the assumption of compromise. It involves shifting from blanket security policies to risk-based prioritization, understanding which applications and systems matter most to the business.
  • Q: How does breach readiness support business continuity?
    • A: Breach readiness supports business continuity by prioritizing the protection of critical operations and data, ensuring that the business can continue to function even during an active attack. This is achieved through risk-informed approaches, such as securing high-value assets and systems that are crucial for operational continuity.
Continue Reading

Innovation and Technology

Innovating for Impact: How Social Enterprises are Leveraging Tech for Good

Published

on

Innovating for Impact: How Social Enterprises are Leveraging Tech for Good

Technology for social change is revolutionizing the way we address global challenges, and social enterprises are at the forefront of this movement. By harnessing the power of technology, these organizations are creating innovative solutions to some of the world’s most pressing problems. From healthcare and education to environmental sustainability and economic development, social enterprises are leveraging tech to drive positive impact and improve lives.

The Rise of Social Enterprises

Social enterprises are businesses that prioritize social and environmental impact alongside financial returns. These organizations are driven by a mission to create positive change and address specific social or environmental challenges. With the rise of social entrepreneurship, we are seeing a new generation of leaders who are using business as a force for good. They are leveraging technology to scale their impact, reach new audiences, and create sustainable solutions to complex problems.

Key Characteristics of Social Enterprises

Social enterprises are characterized by their commitment to social and environmental impact, innovative approaches to problem-solving, and sustainable business models. They often use technology to amplify their impact, whether through digital platforms, mobile apps, or data analytics. By leveraging technology, social enterprises can reach more people, reduce costs, and improve the effectiveness of their programs.

The Role of Technology in Social Impact

Technology is a key enabler of social impact, providing social enterprises with the tools and platforms they need to scale their work and reach new audiences. From mobile health apps to online education platforms, technology is being used to address some of the world’s most pressing challenges. Social enterprises are leveraging technology to collect data, analyze trends, and develop targeted solutions to specific social and environmental problems.

Examples of Tech for Social Good

There are many examples of social enterprises using technology to drive social impact. For instance, mobile health apps are being used to diagnose and treat diseases in remote communities, while online platforms are providing access to education and job training for marginalized groups. Additionally, data analytics is being used to track climate change, identify areas of high conservation value, and develop targeted conservation strategies.

Impact of Social Enterprises on Society

Social enterprises are having a profound impact on society, from improving health and education outcomes to promoting environmental sustainability and economic development. By leveraging technology, these organizations are able to reach more people, reduce costs, and improve the effectiveness of their programs. Social enterprises are also creating new opportunities for employment, entrepreneurship, and social mobility, particularly in marginalized communities.

Measuring Social Impact

Measuring social impact is critical to understanding the effectiveness of social enterprises and identifying areas for improvement. Social enterprises use a range of metrics to measure their impact, from outcome-based metrics such as health outcomes or educational attainment, to process-based metrics such as website traffic or social media engagement. By tracking their impact, social enterprises can refine their strategies, optimize their programs, and scale their impact over time.

Challenges and Opportunities

While social enterprises are making a significant impact, they also face a range of challenges, from funding and scalability to regulation and talent acquisition. However, these challenges also present opportunities for innovation and growth, as social enterprises leverage technology to overcome obstacles and achieve their goals. By embracing digital technologies, social enterprises can reduce costs, improve efficiency, and increase their impact.

Future of Social Enterprises

The future of social enterprises is exciting and uncertain, as these organizations continue to innovate and evolve in response to changing social and environmental challenges. As technology continues to advance, we can expect to see even more innovative solutions to social and environmental problems, from artificial intelligence and blockchain to the Internet of Things and virtual reality. By leveraging these technologies, social enterprises will be able to drive even greater impact and create a more sustainable, equitable, and just world.

Conclusion

In conclusion, social enterprises are leveraging technology to drive social impact and improve lives. From healthcare and education to environmental sustainability and economic development, these organizations are creating innovative solutions to some of the world’s most pressing challenges. By harnessing the power of technology, social enterprises are able to scale their impact, reach new audiences, and create sustainable solutions to complex problems. As the social enterprise sector continues to grow and evolve, we can expect to see even more innovative solutions to social and environmental challenges, and a brighter future for all.

Frequently Asked Questions

What is a social enterprise?

A social enterprise is a business that prioritizes social and environmental impact alongside financial returns. These organizations are driven by a mission to create positive change and address specific social or environmental challenges.

How do social enterprises use technology?

Social enterprises use technology to amplify their impact, whether through digital platforms, mobile apps, or data analytics. By leveraging technology, social enterprises can reach more people, reduce costs, and improve the effectiveness of their programs.

What are some examples of social enterprises using technology for social good?

There are many examples of social enterprises using technology to drive social impact, from mobile health apps to online education platforms. Additionally, data analytics is being used to track climate change, identify areas of high conservation value, and develop targeted conservation strategies.

How can I get involved in the social enterprise sector?

There are many ways to get involved in the social enterprise sector, from volunteering or interning with a social enterprise to starting your own social enterprise. You can also support social enterprises by donating to their causes or purchasing their products and services.

What is the future of social enterprises?

The future of social enterprises is exciting and uncertain, as these organizations continue to innovate and evolve in response to changing social and environmental challenges. As technology continues to advance, we can expect to see even more innovative solutions to social and environmental problems, and a brighter future for all.

Continue Reading

Innovation and Technology

Survey Says 67% Of Jobs Use AI, But Do Leaders Understand Its Limits?

Published

on

Survey Says 67% Of Jobs Use AI, But Do Leaders Understand Its Limits?

Introduction to AI in the Workplace

In a survey of 1,000 knowledge workers, 67% of respondents said that their companies use AI, with 56% of companies encouraging AI usage. Owl Labs created the survey, and they found that Gen Z employees are more likely to report being “heavily reliant” on AI, with 70% of the youngest generation leaning in on the tech for a multitude of tasks. That lines up with the observations of OpenAI CEO, Sam Altman, who recently shared that Gen Z workers view ChatGPT as a “life adviser". Embracing technology is a good idea, but is Gen Z squeezing LLMs too tightly? What do these current and future workforce leaders need to know, about what AI can (and can’t) do?

Tell Me How You Use ChatGPT and I’ll Guess Your Age

“Older people,” Altman told an audience at Sequoia Capital’s AI Ascent Event, “use ChatGPT as a Google replacement. People in college use it as an operating system.” Tech Crunch reports that younger adults have fairly complex prompts memorized, which also means saved in the notes on their phone, and they rapidly and frequently pepper the program with problems and queries. Altman goes on to say that, "they [Gen Z and Gen Alpha] don’t really make life decisions without asking ChatGPT what they should do. It has the full context on every person in their life and what they’ve talked about."

AI expert Amanda Caswell, a writer for Tom’s Guide, says, “Personally, I’ve used ChatGPT to tackle everything from project summaries to panic attacks, and have found it to be a great sounding board when facing tough choices. While it’s no substitute for human guidance or a therapist, ChatGPT can be a great assistant in a pinch.”

The Upside and Downside of Using AI

There’s definitely an upside to having a second opinion on various aspects of your life and work – especially when that perspective has access to trillions of data points, the works of Freud, Jung, and James, as well as most of recorded history. But there are risks that can come with using AI, and leaning in too heavily on the platform. Experts say that it’s essential to be careful how much you share with AI – and how you use the tool at work. The rewards are many, but so are the risks – and using LLMs wisely is good counsel for every generation.

What to Watch Out For With AI: Experts Weigh In

“AI has no world model,” according to process scientist, Sam Drauschak. Questions that require real-world context can be a challenge for ChatGPT and other AI platforms. “When you ask it to read this picture of a clock, it’s strictly pattern prediction.”

Louis Rosenberg, Stanford professor, inventor, AI scientist and author of Our Next Reality, says that sometimes AI is dyslexic. And, as someone who is dyslexic, Rosenberg’s perspective gives an interesting read on why AI struggles to tell time. “When I recall things in my mind (objects, environments, images, or text), I don’t visualize them from a fixed first-person perspective. I think about them from all directions at once, more as a vague cloud of perspectives than a single, grounded orientation,” he explains – articulating the AI point of view. That’s how large language models see things – and it often means that vector orientations (such as “clockwise”) are elusive to AI platforms. “When you ask AI to interpret a tissue sample," he says, using an application from healthcare that is becoming more and more common, “accuracy is not impacted by orientation.”

But innovative problem-solving and creative thinking is. While AI can generate novel combinations for text and produce creative works in art and music, its capacity for truly original thought and breakthrough innovation remains limited. But the speed of the platform can be astonishing. So, should we treat AI like just another voice in the room, or the voice of God? “Think about it more like an intern,” Drauschak advises.

“AI doesn’t do anything new. It can synthesize things from lots of different domains. And the labor of synthesizing things can seem to generate insight. Like a brilliant intern – with the ability to process billions of data points at once – it’s going to come up with good ideas and contribute. But it’s a really good idea to check on the work,” he explains. While you may not be asking AI to read a clock, perspective always matters – especially when it comes to work product, context and point of view.

Room for Error with AI

AI doesn’t possess emotions or empathy, Draushak explains. “It doesn’t have a conversation where it acknowledges any sort of room for error or humility or, you know, ‘I only feel 80% about this’". Drauschak likens it to the consultant’s mantra: “I may be incorrect, but I’m never unsure of myself.” Hallucinations and facts are presented with the same level of confidence.

AI has no world model, so anything that requires real-time context creates progressive levels of failure, according to Drauschak. Long-term planning can be a challenge as well, as AI platforms have limited memory. To be fair, certain programs and prompts can provide reference and context – a context which comes to human beings naturally, as a result of being in the real world.

And reading the room is a challenge for AI. “AI is the future,” Dylan Matthews shares in Vox. “It’ just can’t predict it.” Science Daily echoes that sentiment, in a post that proclaims that humans are better at predicting social interactions than AI. "AI for a self-driving car, for example, would need to recognize the intentions, goals, and actions of human drivers and pedestrians. You would want it to know which way a pedestrian is about to start walking, or whether two people are in conversation versus about to cross the street," said lead author Leyla Isik, an assistant professor of cognitive science at Johns Hopkins University who did an extensive study into the limitations of current LLMs. "Any time you want an AI to interact with humans, you want it to be able to recognize what people are doing. I think this sheds light on the fact that these systems can’t right now." Cathy Garcia, a colleague and contributor to the Johns Hopkins study, says, "Real life isn’t static. We need AI to understand the story that is unfolding in a scene. Understanding the relationships, context, and dynamics of social interactions is the next step, and this research suggests there might be a blind spot in AI model development."

Leading with AI: Understanding Its Limits to Access Its Capabilities

For leaders and aspiring leaders, the message is one of balance. While the capabilities of AI have opened up seemingly limitless possibility, those possibilities actually do have limits. The real question, across every generation in the workforce, is: what do you want to outsource to AI? Tools can accelerate results when used correctly. But turning to AI for every direction in your life seems unwise. Indeed, research already shows a decline in cognitive skills from over-reliance on LLMs. Convenience, speed, ease: these are the advantages of AI. But understanding how best to use an AI platform like ChatGPT is crucial for leaders today.

In side by side tournaments run by Metaculus, human beings have beaten AI at forecasting for the last three quarters running. But that gap is narrowing. Think of how prediction matters in your business: for lawyers, negotiating a settlement requires instincts around agreement based on real-time contexts – and intuition. Producers at Netflix predict what shows will hit. Intuition, innovation, direction: these uniquely human characteristics still matter in decision-making – even when 67% of workers are using ChatGPT and its cousins. AI can help with the predictive journey, but it’s not the whole trip – at least, not yet.

Conclusion

The use of AI in the workplace is on the rise, with 67% of companies using AI and 56% encouraging its use. While AI can be a powerful tool, it’s essential to understand its limitations and use it wisely. Gen Z employees are more likely to rely heavily on AI, but it’s crucial for all generations to be aware of the potential risks and benefits. By understanding what AI can and can’t do, leaders and aspiring leaders can make informed decisions about how to use AI to accelerate results and improve productivity.

FAQs

Q: What percentage of companies use AI?
A: 67% of companies use AI, according to a survey by Owl Labs.
Q: What is the main difference in how older and younger generations use ChatGPT?
A: Older people use ChatGPT as a Google replacement, while younger adults use it as an operating system.
Q: What are some limitations of AI?
A: AI has no world model, limited memory, and struggles with real-time context, innovative problem-solving, and creative thinking.
Q: Can AI predict social interactions?
A: No, humans are better at predicting social interactions than AI, according to research by Johns Hopkins University.
Q: What is the importance of understanding AI’s limitations?
A: Understanding AI’s limitations is crucial for leaders and aspiring leaders to make informed decisions about how to use AI to accelerate results and improve productivity, and to avoid over-reliance on AI.

Continue Reading
Advertisement

Our Newsletter

Subscribe Us To Receive Our Latest News Directly In Your Inbox!

We don’t spam! Read our privacy policy for more info.

Trending