Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Leadership and ManagementLogical SecuritySecurity & Business Resilience

Disinformation is the next big cybersecurity threat

By Wasim Khaled
people on cell phones

Image from Unsplash

July 14, 2022

What began as memes and a way for scammers to drive ad revenue via clickbait has morphed and expanded into almost every area of our lives. Misinformation, disinformation, malinformation (MDM), and a host of other terms used so loosely are now co-opted for nefarious use, and some have lost their meaning almost entirely.

Understanding the nuances of MDM is an essential first step for those practicing or developing a practice around information-driven threats. Misinformation is the unintentional spread of disinformation. The person disseminating the content believes it is true. Disinformation, on the other hand, is fabricated and purpose-built for deception by the creator, who is often driven by profiteering, influence or polarization. Malinformation is any information that is disseminated to cause harm, such as leaking user password databases. These threats have become so severe they are now considered by experts as adjacent to cyberattacks.

Globalization has created an environment where borders, economies and communications are on a level playing field. This democratization has many positives, but it has also proven equally beneficial to adversaries who know how to use this against opponents. Non-state actors are empowered, decentralized armies in this new era of gamified conflict that attacks human perception online and offline, while state actors are able to infiltrate nation-states through their own citizens. This is key to the future of conflict and information warfare; a signifier to global and enterprise organizations of what is to come.

Currently, $78 billion is lost annually to private firms due to disinformation, and 87% of executives say the spread of disinformation is one of the greatest reputational risks for businesses today. Additionally, 88% of investors consider disinformation attacks on corporations as a serious issue.

The number and types of threat actors are growing: hackers, hacktivists, disgruntled employees and Disinformation as a Service (DaaS) offerings are all among today’s bad actors. DaaS companies utilize tactics to seed and spread targeted narratives. Their main approach is to share disinformation with high-engagement social media influencers (also known as superspreaders) who then push this through their networks. In May 2021 several influencers with followings in the hundreds of thousands were contacted by London-based public relations agency Fazze asking them to promote misleading messaging about Pfizer-BioNTech’s COVID-19 vaccine for their client. To further create chaos and confusion, these types of companies also craft and publish misleading articles in the news, seed fabricated narratives on social media, build fake social media accounts, and create deepfakes.

This is where cybersecurity and information operations and their associated risks intersect and need to be a high priority for all organizations. Planning for known and unknown threats as part of an information warfare playbook is one of the best investments an organization can invest in today.

Present-day monitoring tools are not built to solve this exceptionally global problem. While the volume-based statistics they collect are still important criteria when assessing content amplification and reach, they’re limited in providing deeper mis- and disinformation insights. Risk and communications teams need to be able to identify MDM before it surfaces and know what to do with the information as part of their security strategy.

Threat actors have developed tools and tactics to hijack communications in novel and complex ways, while frequently evolving to avoid detection and simultaneously exploit trends and events. This generates a constant state of confusion. When every online attack feels like an emergency, it’s difficult to identify or prioritize which battle to fight first. Organizations often lack sufficient toolsets and knowledge to effectively identify root sources of information-based threats.

To compete against these MDM threat actors organizations, must reevaluate their information security posture to meet the challenges of an entirely new class of information-based risks.

Evaluating current approaches to better understand where we remain exposed, how we must evolve, and what actions need to be taken will enable organizations to identify opportunities to lean into informed and positive momentum wherever possible. If corporations have the ability to challenge deeply polarizing and hostile information challenges at the source, it means more possibilities to move from a reactive to a proactive state. As adversaries evolve, so must corporate capabilities, investment and leadership teams.

KEYWORDS: disinformation information protection misinformation campaigns risk management social media threat monitoring

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Wasim khaled headshot (1)

Wasim Khaled is CEO of Blackbird.AI. He has consulted and advised government agencies and companies around the world on the dangers of and countermeasures against the escalating information warfare arms race. Prior to Blackbird, Khaled founded LuxMobile, an Inc. 500 Company, earned the distinction of Inc. 500’s Asian Entrepreneur of the Year and has built businesses with Fortune 500 clients in the fields of artificial intelligence, manufacturing, logistics and adtech.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Why the Security Talent Gap Is the Next Big Crisis

    See More
  • Next Big U.S. Threat? Cyber Attack on the Smart Grid

    See More
  • SEC0420-cyber-Feat-slide1_900px

    What's Next: The Future of Big Cybersecurity Conferences

    See More

Related Products

See More Products
  • threat and detection.jpg

    Surveillance and Threat Detection

  • The Database Hacker's Handboo

  • 9780367030407.jpg

    National Security, Personal Privacy and the Law

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing