Whether you call it misinformation, malinformation, or fake news, everyone instinctively knows what disinformation is and understands how it can disrupt and destroy personal or organizational wellbeing.
Let’s take a deeper look at disinformation and how it’s creating an emerging technology category called disinformation security that aims to counter disinformation threats.
According to the Cybersecurity and Infrastructure Security Agency (CISA), disinformation is inauthentic content that takes three forms (PDF):
Even though it encompasses three forms, inauthentic content is commonly referred to as “disinformation”.
(Image source: CISA PDF.)
The table below outlines several types of disinformation. Each type hurts people and organizations in different ways — spreading false stories, ruining reputations, enabling criminal activity, prompting cyberattacks, stealing money, impersonating trusted entities, and more.
Disinformation Type | How It Works |
Cheapfakes | Authentic (real) video and audio clips are slowed down, sped up, or shown out of context. |
Deepfakes | Inauthentic (false) video and audio clips are generated to deceive.
|
Forgeries | Forged artifacts use faked certificates, logos, social media posts, and other material for malicious purposes. Frequently posted alongside authentic content, forgeries may be promoted as “leaked” material to appear more credible. |
Phishing, Vishing, and Smishing | Techniques to trick or lure users into disclosing sensitive, confidential, or personal information.
|
Proxy websites | Fronts for malicious actors, proxy websites launder disinformation about high visibility events and inauthentic content, to deceive or take advantage of unsuspecting visitors. They may impersonate legitimate sites with URLs containing minor changes to popular web site names (ex.: providing a URL of sp1unk.com to trick users into thinking they are accessing splunk.com). |
There is some overlap between disinformation and cyberattacks, but they represent two different security threats.
Cyberattacks hack and target computer infrastructure — these attacks are digital by nature.
Disinformation campaigns target our biases, psychological vulnerabilities, critical thinking skills, and confidential knowledge to do several things, including:
With increased artificial intelligence usage, disinformation campaigns are expected to grow in frequency and sophistication — making them more effective and dangerous.
An emerging technology category called disinformation security aims to counter and mitigate disinformation threats. One of Gartner’s 2025 Top 10 Strategic Technology Trends, disinformation security is designed to help identify what can be trusted. Disinformation security has three goals:
These goals are designed to help organizations and individuals avoid being misled, manipulated, or harmed by disinformation.
Gartner identifies these core detection, prevention, and protection areas for disinformation security.
By 2028, Gartner estimates that 50% of all enterprises will adopt products, services, or features that specifically address disinformation use cases. That’s up from less than 5% of organizations that adopted these products in 2024.
Unfortunately, there is no overarching suite of innovative technologies that by themselves will stop or mitigate all disinformation campaigns. Current technologies and services that may be able to identify and counter disinformation include:
A technology and systems-based approach can help prevent disinformation attacks, particularly when paired with Gen AI, digital forensic techniques, and other detection and response methods.
However, technology alone is not enough to ensure disinformation security. Your approach should also be paired with organizational and individual responses to disinformation attacks, including:
Educating users on how to spot, avoid, and respond to disinformation campaigns. CISA estimates that 90% of successful cyberattacks start with a phishing email.
Elevating disinformation awareness — especially among the most vulnerable populations — can significantly cut down on successful disinformation attacks.
Aligning technology, people, and processes from across the organization to reduce, spot, and respond to potential and successful disinformation attacks. Organization-wide disinformation response teams can include executives, enterprise security, marketing, financing, public relations, human resources, legal counsel, and more.
Just as organizations create disaster recovery plans for business outages, you could create a separate response/security plan for a disinformation crisis. Planned cross-functional response plans can help prevent disinformation from damaging organizations.
Like disinformation campaigns themselves, the effectiveness of disinformation security technology, people, and processes will only increase with artificial intelligence techniques. Disinformation security vendors and users will be continually modifying their defenses while disinformation providers will continue to refine their campaign tactics.
And both disinformation offense and defense will occur at AI speed. The disinformation arms race has intensified.
See an error or have a suggestion? Please let us know by emailing ssg-blogs@splunk.com.
This posting does not necessarily represent Splunk's position, strategies or opinion.
The Splunk platform removes the barriers between data and action, empowering observability, IT and security teams to ensure their organizations are secure, resilient and innovative.
Founded in 2003, Splunk is a global company — with over 7,500 employees, Splunkers have received over 1,020 patents to date and availability in 21 regions around the world — and offers an open, extensible data platform that supports shared data across any environment so that all teams in an organization can get end-to-end visibility, with context, for every interaction and business process. Build a strong data foundation with Splunk.