recently voluntarily committed to developing a system to"watermark" all forms of content, from text and images to audio and video generated by AI so that users will know when the technology has been used.
For corporate security professionals, it will become even more important to track and monitor threats and malicious information, and to improve case management practices and processes so your team can triangulate all available data. We will likely see a rise in systems that utilize multiple types of data to identify and authenticate intelligence information.
Until then, organizations must double down on the measures they can already take to disrupt threats and hoaxes. Rapid response plans, potentially including tabletop exercises, should be developed to consider how to counter the effects of online hoaxes and damaging media.