What Is OpenTracing?

Whether you call it misinformation, malinformation, or fake news, everyone instinctively knows what disinformation is and understands how it can disrupt and destroy personal or organizational wellbeing.

Let’s take a deeper look at disinformation and how it’s creating an emerging technology category called disinformation security that aims to counter disinformation threats.

What is disinformation?

According to the Cybersecurity and Infrastructure Security Agency (CISA), disinformation is inauthentic content that takes three forms (PDF):

Even though it encompasses three forms, inauthentic content is commonly referred to as “disinformation”.

(Image source: CISA PDF.)

Types of disinformation

The table below outlines several types of disinformation. Each type hurts people and organizations in different ways — spreading false stories, ruining reputations, enabling criminal activity, prompting cyberattacks, stealing money, impersonating trusted entities, and more.

Disinformation Type
How It Works
Cheapfakes
Authentic (real) video and audio clips are slowed down, sped up, or shown out of context.
Deepfakes

Inauthentic (false) video and audio clips are generated to deceive.

  • Audio deepfakes simulate other people’s voices.
  • Video deepfakes feature recognizable faces and full-body video of people, places, and things.
Forgeries
Forged artifacts use faked certificates, logos, social media posts, and other material for malicious purposes. Frequently posted alongside authentic content, forgeries may be promoted as “leaked” material to appear more credible.
Phishing, Vishing, and Smishing

Techniques to trick or lure users into disclosing sensitive, confidential, or personal information.

  • Phishing uses proxy (fake) websites and deceptive email to get users to disclose information.
  • Vishing uses voicemails or phone calls to trick users into information disclosure.
  • Smishing uses fraudulent text messages to collect user information.
Proxy websites
Fronts for malicious actors, proxy websites launder disinformation about high visibility events and inauthentic content, to deceive or take advantage of unsuspecting visitors. They may impersonate legitimate sites with URLs containing minor changes to popular web site names (ex.: providing a URL of sp1unk.com to trick users into thinking they are accessing splunk.com).

Disinformation vs. cyberattacks: what’s the difference?

There is some overlap between disinformation and cyberattacks, but they represent two different security threats.

Cyberattacks hack and target computer infrastructure — these attacks are digital by nature.

Disinformation campaigns target our biases, psychological vulnerabilities, critical thinking skills, and confidential knowledge to do several things, including:

With increased artificial intelligence usage, disinformation campaigns are expected to grow in frequency and sophistication — making them more effective and dangerous.

What is Disinformation Security?

An emerging technology category called disinformation security aims to counter and mitigate disinformation threats. One of Gartner’s 2025 Top 10 Strategic Technology Trends, disinformation security is designed to help identify what can be trusted. Disinformation security has three goals:

These goals are designed to help organizations and individuals avoid being misled, manipulated, or harmed by disinformation.

Areas of disinformation security

Gartner identifies these core detection, prevention, and protection areas for disinformation security.

By 2028, Gartner estimates that 50% of all enterprises will adopt products, services, or features that specifically address disinformation use cases. That’s up from less than 5% of organizations that adopted these products in 2024.

Solutions for Disinformation Security: technology, people, and processes

Unfortunately, there is no overarching suite of innovative technologies that by themselves will stop or mitigate all disinformation campaigns. Current technologies and services that may be able to identify and counter disinformation include:

A technology and systems-based approach can help prevent disinformation attacks, particularly when paired with Gen AI, digital forensic techniques, and other detection and response methods.

However, technology alone is not enough to ensure disinformation security. Your approach should also be paired with organizational and individual responses to disinformation attacks, including:

Disinformation awareness training

Educating users on how to spot, avoid, and respond to disinformation campaigns. CISA estimates that 90% of successful cyberattacks start with a phishing email.

Elevating disinformation awareness — especially among the most vulnerable populations — can significantly cut down on successful disinformation attacks.

Cross-functional protection

Aligning technology, people, and processes from across the organization to reduce, spot, and respond to potential and successful disinformation attacks. Organization-wide disinformation response teams can include executives, enterprise security, marketing, financing, public relations, human resources, legal counsel, and more.

Just as organizations create disaster recovery plans for business outages, you could create a separate response/security plan for a disinformation crisis. Planned cross-functional response plans can help prevent disinformation from damaging organizations.

The disinformation arms race

Like disinformation campaigns themselves, the effectiveness of disinformation security technology, people, and processes will only increase with artificial intelligence techniques. Disinformation security vendors and users will be continually modifying their defenses while disinformation providers will continue to refine their campaign tactics.

And both disinformation offense and defense will occur at AI speed. The disinformation arms race has intensified.

Related Articles

What Are Servers? A Practical Guide for Modern IT & AI
Learn
4 Minute Read

What Are Servers? A Practical Guide for Modern IT & AI

Learn what a computer server is, how servers work, common server types, key components, and how to choose the right server for your organization.
Identity and Access Management (IAM) Explained: Components, AI, and Best Practices
Learn
9 Minute Read

Identity and Access Management (IAM) Explained: Components, AI, and Best Practices

Learn what Identity and Access Management (IAM) is, why it matters, key components like SSO and MFA, AI integration, and best practices for secure access.
Risk-Based Vulnerability Management (RBVM) Explained
Learn
6 Minute Read

Risk-Based Vulnerability Management (RBVM) Explained

Managing vulnerabilities is a critical security practice. Learn about the RBVM approach: using risk factors to inform vulnerability management.
Your 2026 IT and Technology Salary Guide: Tech Trends Driving the Year’s Highest-Paying Jobs
Learn
6 Minute Read

Your 2026 IT and Technology Salary Guide: Tech Trends Driving the Year’s Highest-Paying Jobs

This blog post will review, roundup, and summarize some of the latest trends for IT salaries and roles to help you get a clear view of the landscape.
Are You Prepared for Data Breaches? How to Limit Exposure & Reduce Impact
Learn
5 Minute Read

Are You Prepared for Data Breaches? How to Limit Exposure & Reduce Impact

Data breaches can happen in many ways — ransomware, phishing, accidental exposure — but one thing is clear: our data is being breached all the time.
Zero-Day Attacks: Meaning, Examples, and Modern Defense Strategies
Learn
4 Minute Read

Zero-Day Attacks: Meaning, Examples, and Modern Defense Strategies

Nothing described with “zero” sounds good. That’s absolutely the case here, when it comes to zero-day vulnerabilities, exploits and attacks.
AI Infrastructure Explained: How to Build Scalable LLM and ML Systems
Learn
4 Minute Read

AI Infrastructure Explained: How to Build Scalable LLM and ML Systems

Discover what AI infrastructure is, why it matters, and how compute, storage, networking, ML frameworks, and observability work together to enable scalable, high-performance AI systems.
How to Use LLMs for Log File Analysis: Examples, Workflows, and Best Practices
Learn
7 Minute Read

How to Use LLMs for Log File Analysis: Examples, Workflows, and Best Practices

Learn how to use LLMs for log file analysis, from parsing unstructured logs to detecting anomalies, summarizing incidents, and accelerating root cause analysis.
Beyond Deepfakes: Why Digital Provenance is Critical Now
Learn
5 Minute Read

Beyond Deepfakes: Why Digital Provenance is Critical Now

Combat AI misinformation with digital provenance. Learn how this essential concept tracks digital asset lifecycles, ensuring content authenticity.