Cyber Insecurity and Misinformation Top WEF Global Risk List

The latest World Economic Forum Global Risks Report 2024 highlighted the rising tide of cyber threats and places misinformation and disinformation as the most severe risk globally.
It also warned of low-cost crime havens and issues surrounding concentrated AI power in few hands.
Misinformation and disinformation have emerged as the most severe global risk anticipated over the next two years.
The WEF noted that misinformation and disinformation has risen rapidly and the risk is likely to become more acute as elections in several economies take place this year.
The report highlighted that the widespread use of misinformation and disinformation, and tools to disseminate it, may undermine the legitimacy of newly elected governments.
Easy-to-use interfaces to large-scale artificial intelligence models have already enabled an explosion in falsified information and so-called 'synthetic' content, from sophisticated voice cloning to counterfeit websites, the WEF noted.
While there is regulation emerging which seeks to combat online disinformation and illegal content, the World Economic Forum said that the speed and effectiveness of regulation is unlikely to match the pace of development.
The risk of cyber-attacks and cyber insecurity remained a top concern for many stakeholders surveyed in the Global Risks Report 2024.
Examining the current risk landscape, cyber-attacks were cited by 39% of those questioned, the fifth biggest concern for 2024.
Extreme weather topped the risk landscape, followed by AI-generated mis and disinformation, societal and/or political polarization then cost-of-living crisis.
In terms of global risks ranked by severity over the next two years, cyber insecurity placed fourth and was ranked as a persistent concern.
Government and private sector stakeholders placed cyber insecurity as the third most severe risk in the short term.
Barriers to entry will be broken down because of these technological advances, particularly in the cyber domain, allowing transnational criminal networks to spread. These crime networks will increasingly adopt blended business models utilizing new technologies to diversify illicit funding and fragment the physical presence of organized crime.
Ultimately, cybercrime offers an increasingly low-risk and low-cost revenue stream for organized crime, the WEF noted.
Geographically, the WEF notes that cybercrime will continue to spread to parts of Asia and West and Southern Africa as sophisticated cyber defenses shift targets towards less digitally literate individuals or less secure infrastructure and systems.
The geographic trend is also being driven by greater internet connectivity in these regions as well as growing affluency.
The report's respondents highlighted cyber insecurity and technological power concentration as the only risk drivers of adverse outcomes of AI technologies.
The production of AI technologies is highly concentrated, the report noted, with a few companies and countries in favor.
This creates significant supply-chain risk that the WEF said could unfold over the coming decade.
Dominance of the Global North in tech stack development could perpetuate social, cultural and political biases, while resilience to risks posed by AI, from mis- and disinformation to criminal use, may also be lower in the Global South.


This Cyber News was published on www.infosecurity-magazine.com. Publication date: Wed, 10 Jan 2024 14:45:19 +0000


Cyber News related to Cyber Insecurity and Misinformation Top WEF Global Risk List

Cyber Insecurity and Misinformation Top WEF Global Risk List - The latest World Economic Forum Global Risks Report 2024 highlighted the rising tide of cyber threats and places misinformation and disinformation as the most severe risk globally. It also warned of low-cost crime havens and issues surrounding ...
5 months ago Infosecurity-magazine.com
This is why AI-powered misinformation is the top global risk - With many nations expected to hold elections during the next two years, the use of misinformation and disinformation - powered by artificial intelligence - will be the most severe global risk. Also: 4 ways to overcome your biggest worries about ...
5 months ago Zdnet.com
Key elements for a successful cyber risk management strategy - In this Help Net Security interview, Yoav Nathaniel, CEO at Silk Security, discusses the evolution of cyber risk management strategies and practices, uncovering common mistakes and highlighting key components for successful risk resolution. Nathaniel ...
5 months ago Helpnetsecurity.com
A Cybersecurity Risk Assessment Guide for Leaders - Now more than ever, keeping your cyber risk in check is crucial. In the first half of 2022's Cyber Risk Index, 85% of the survey's 4,100 global respondents said it's somewhat to very likely they will experience a cyber attack in the next 12 months. ...
1 year ago Trendmicro.com
ProcessUnity Introduces Industry's All-In-One Third-Party Risk Management Platform - PRESS RELEASE. BOSTON-(BUSINESS WIRE)- ProcessUnity, provider of comprehensive end-to-end third-party risk management and cybersecurity solutions to leading enterprises, today announced the completed integration of the Global Risk Exchange. The newly ...
5 months ago Darkreading.com
Cyber Insurance: A Smart Investment to Protect Your Business from Cyber Threats in 2023 - Don't wait until it's too late - get cyber insurance today and secure your business for tomorrow. According to the U.S. Federal Trade Commission, cyber insurance is a particular type of insurance that helps businesses mitigate financial losses ...
4 months ago Cyberdefensemagazine.com
Fighting ransomware: A guide to getting the right cybersecurity insurance - While the cybersecurity risk insurance market has been around for more than 20 years, the rapidly changing nature of attacks and the rise in the ransomware epidemic has markedly changed the nature of cyber insurance in recent years. It's more ...
5 months ago Scmagazine.com
Does Pentesting Actually Save You Money On Cyber Insurance Premiums? - Way back in the cyber dark ages of the early 1990s as many households were buying their first candy-colored Macintoshes and using them to play Oregon Trail and visit AOL chat rooms, many businesses started venturing into the digital realm as well by ...
6 months ago Securityboulevard.com
16 top ERM software vendors to consider in 2024 - Enterprise risk management software helps organizations identify, mitigate and remediate business risks, which can lead to improved business performance. The risk management market is rapidly evolving from separate tools across different risk domains ...
5 months ago Techtarget.com
Master Security by Building on Compliance with A Risk-Centric Approach - In recent years, a confluence of circumstances has led to a sharp rise in IT risk for many organizations. That's why a proactive approach to seeing, understanding, and acting on risk is key to improving the effectiveness of defenses in place to meet ...
5 months ago Cyberdefensemagazine.com
Cyber Insurance for Businesses: Navigating Coverage - To mitigate these risks, many businesses opt for cyber insurance. With the wide range of policies available, navigating the world of cyber insurance can be overwhelming. In this article, we will delve into the complexities of cyber insurance and ...
5 months ago Securityzap.com
The Cyber Risk Nightmare and Financial Risk Disaster of Using Personal Messaging Apps in The Workplace - This practice, which is unfortunately still widespread in an environment of relentless cyberattacks, is fraught with major cyber and financial risk. Unsecure messaging apps are a gateway for cybercriminals to access, expose and exploit an ...
5 months ago Cyberdefensemagazine.com
Cyber Insights 2023: Cyberinsurance - The result is more than a dozen features on subjects ranging from AI, quantum encryption, and attack surface management to venture capital, regulations, and criminal gangs. In 2022, Russia invaded Ukraine with the potential for more serious and more ...
1 year ago Securityweek.com
Three Things to Know About the New SEC Rules on Sharing Information and Breach Disclosure Deadlines - Recently, the Securities and Exchange Commission adopted rules about the handling and reporting of cyber risks and breaches. With these new guidelines and regulations, public companies and organizations must disclose cybersecurity incidents ...
4 months ago Cyberdefensemagazine.com
Critical Start Implements Cyber Risk Assessments With Peer Benchmarking and Prioritization Engine - PRESS RELEASE. PLANO, Texas, Jan. 11, 2024 /PRNewswire/ - Today, Critical Start, a leading provider of Managed Detection and Response cybersecurity solutions and pioneer of Managed Cyber Risk Reduction, announced general availability of Critical ...
5 months ago Darkreading.com
Cybersecurity Tops 2024 Global Business Risks - The newly released Allianz Risk Barometer revealed that Cyber incidents such as ransomware attacks, data breaches, and IT disruptions are the biggest worry for companies globally, as well as in the United States, in 2024. The 13th annual business ...
4 months ago Cybersecurity-insiders.com
WEF 2024 Report: Cybersecurity at the forefront, zero trust seen as critical for trust rebuilding - The best place for the World Economic Forum to achieve its key theme this year of rebuilding trust is to start with cybersecurity, cyber defenses, and cyber-resilience. Their latest global cybersecurity outlook 2024 insight report delivers insights ...
5 months ago Venturebeat.com
CISOs Need to Take a Holistic Approach to Risk Management - Although the traditional approach to cybersecurity typically revolves around mitigating threats and vulnerabilities, these tactics are no longer enough to protect businesses effectively. There is now a need for a more comprehensive, holistic approach ...
6 months ago Feeds.fortinet.com
IT Professionals in ASEAN Confronting Rising Cyber Security Risks - The ASEAN region is seeing more cyber attacks as digitisation advances. In July 2023, the Association of Southeast Asian Nations officially opened a joint cyber security information sharing and research centre, or Cybersecurity and Information Centre ...
6 months ago Techrepublic.com
Meet Your New Cybersecurity Auditor: Your Insurer - As businesses deal with the fallout of massive ransomware waves, from Lapsus$ to Cl0p/MOVEit, an unlikely new entity is joining the regulatory bodies to raise the bar for cybersecurity: the cyber insurer. Their coverage requirements and ...
7 months ago Darkreading.com
Strengthening Resilience: Navigating the Cybersecurity Landscape - Over the last four years, businesses have faced significant challenges characterized by increased frequency and severity of cyber threats. In a recent global survey of 3,000 decision-makers, Aon identified cyberattacks or data breaches as the No. 1 ...
6 months ago Darkreading.com
Three Key Threats Fueling the Future of Cyber Attacks - Improvements in cyber security and business continuity are helping to combat encryption-based ransomware attacks, yet the cyber threat landscape is continually evolving. Protecting an organization against intrusion remains a cat and mouse game, in ...
2 months ago Cyberdefensemagazine.com
Wargames director Jackie Schneider on why cyber is one of 'the most interesting scholarly puzzles' - In other games, we had people from Silicon Valley who were leading AI companies or cyber companies. What we found is those who had expertise in cyber operations were more likely to be more nuanced about how they used the cyber capability. On a larger ...
1 month ago Therecord.media
5 Ways to Counteract Increasing Cyber Insurance Rates - Despite this threat, only 55% of organizations have some form of cyber insurance, and only 19% have coverage for cyber events beyond $600,000. As the cybersecurity landscape continues to evolve, businesses must carefully evaluate their risk exposure ...
4 months ago Cybersecurity-insiders.com
Cyber and Physical Security Are Different, But They Must Work Together - America's critical infrastructure faces more diverse threats than ever before. The rapid digitalization of many sectors and the relatively analog operational environments that exist in others have led security specialists and analysts to develop ...
6 months ago Cybersecurity-insiders.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)