What Is OpenTracing?

Whether you call it misinformation, malinformation, or fake news, everyone instinctively knows what disinformation is and understands how it can disrupt and destroy personal or organizational wellbeing.

Let’s take a deeper look at disinformation and how it’s creating an emerging technology category called disinformation security that aims to counter disinformation threats.

What is disinformation?

According to the Cybersecurity and Infrastructure Security Agency (CISA), disinformation is inauthentic content that takes three forms (PDF):

Even though it encompasses three forms, inauthentic content is commonly referred to as “disinformation”.

(Image source: CISA PDF.)

Types of disinformation

The table below outlines several types of disinformation. Each type hurts people and organizations in different ways — spreading false stories, ruining reputations, enabling criminal activity, prompting cyberattacks, stealing money, impersonating trusted entities, and more.

Disinformation Type
How It Works
Cheapfakes
Authentic (real) video and audio clips are slowed down, sped up, or shown out of context.
Deepfakes

Inauthentic (false) video and audio clips are generated to deceive.

  • Audio deepfakes simulate other people’s voices.
  • Video deepfakes feature recognizable faces and full-body video of people, places, and things.
Forgeries
Forged artifacts use faked certificates, logos, social media posts, and other material for malicious purposes. Frequently posted alongside authentic content, forgeries may be promoted as “leaked” material to appear more credible.
Phishing, Vishing, and Smishing

Techniques to trick or lure users into disclosing sensitive, confidential, or personal information.

  • Phishing uses proxy (fake) websites and deceptive email to get users to disclose information.
  • Vishing uses voicemails or phone calls to trick users into information disclosure.
  • Smishing uses fraudulent text messages to collect user information.
Proxy websites
Fronts for malicious actors, proxy websites launder disinformation about high visibility events and inauthentic content, to deceive or take advantage of unsuspecting visitors. They may impersonate legitimate sites with URLs containing minor changes to popular web site names (ex.: providing a URL of sp1unk.com to trick users into thinking they are accessing splunk.com).

Disinformation vs. cyberattacks: what’s the difference?

There is some overlap between disinformation and cyberattacks, but they represent two different security threats.

Cyberattacks hack and target computer infrastructure — these attacks are digital by nature.

Disinformation campaigns target our biases, psychological vulnerabilities, critical thinking skills, and confidential knowledge to do several things, including:

With increased artificial intelligence usage, disinformation campaigns are expected to grow in frequency and sophistication — making them more effective and dangerous.

What is Disinformation Security?

An emerging technology category called disinformation security aims to counter and mitigate disinformation threats. One of Gartner’s 2025 Top 10 Strategic Technology Trends, disinformation security is designed to help identify what can be trusted. Disinformation security has three goals:

These goals are designed to help organizations and individuals avoid being misled, manipulated, or harmed by disinformation.

Areas of disinformation security

Gartner identifies these core detection, prevention, and protection areas for disinformation security.

By 2028, Gartner estimates that 50% of all enterprises will adopt products, services, or features that specifically address disinformation use cases. That’s up from less than 5% of organizations that adopted these products in 2024.

Solutions for Disinformation Security: technology, people, and processes

Unfortunately, there is no overarching suite of innovative technologies that by themselves will stop or mitigate all disinformation campaigns. Current technologies and services that may be able to identify and counter disinformation include:

A technology and systems-based approach can help prevent disinformation attacks, particularly when paired with Gen AI, digital forensic techniques, and other detection and response methods.

However, technology alone is not enough to ensure disinformation security. Your approach should also be paired with organizational and individual responses to disinformation attacks, including:

Disinformation awareness training

Educating users on how to spot, avoid, and respond to disinformation campaigns. CISA estimates that 90% of successful cyberattacks start with a phishing email.

Elevating disinformation awareness — especially among the most vulnerable populations — can significantly cut down on successful disinformation attacks.

Cross-functional protection

Aligning technology, people, and processes from across the organization to reduce, spot, and respond to potential and successful disinformation attacks. Organization-wide disinformation response teams can include executives, enterprise security, marketing, financing, public relations, human resources, legal counsel, and more.

Just as organizations create disaster recovery plans for business outages, you could create a separate response/security plan for a disinformation crisis. Planned cross-functional response plans can help prevent disinformation from damaging organizations.

The disinformation arms race

Like disinformation campaigns themselves, the effectiveness of disinformation security technology, people, and processes will only increase with artificial intelligence techniques. Disinformation security vendors and users will be continually modifying their defenses while disinformation providers will continue to refine their campaign tactics.

And both disinformation offense and defense will occur at AI speed. The disinformation arms race has intensified.

Related Articles

Cybersecurity Attacks Explained: How They Work & What’s Coming Next in 2026
Learn
4 Minute Read

Cybersecurity Attacks Explained: How They Work & What’s Coming Next in 2026

Today’s cyberattacks are more targeted, AI-driven, and harder to detect. Learn how modern attacks work, key attack types, and what security teams should expect in 2026.
Exploit Prediction Scoring System (EPSS): How It Works and Why It Matters
Learn
5 Minute Read

Exploit Prediction Scoring System (EPSS): How It Works and Why It Matters

Discover how the Exploit Prediction Scoring System (EPSS) predicts the likelihood of vulnerability exploitation, improves prioritization, and differs from CVSS.
What Are Servers? A Practical Guide for Modern IT & AI
Learn
4 Minute Read

What Are Servers? A Practical Guide for Modern IT & AI

Learn what a computer server is, how servers work, common server types, key components, and how to choose the right server for your organization.