Advisor

A New Enterprise Cybersecurity Threat: Deep Fakes

Posted August 17, 2022 | Technology |
deep fake
Examples of deep fakes range from videos of politicians or celebrities saying or doing things they never actually said or did and so-called “revenge porn” to fake photos of soldiers appearing to commit atrocities they didn't commit. However, as we explore in this Advisor, this trend is changing: hackers now use deep fake techniques to target commercial enterprises and government agencies for nefarious purposes.
About The Author
Curt Hall
Curt Hall is a Cutter Expert and a member of Arthur D. Little’s AMP open consulting network. He has extensive experience as an IT analyst covering technology and application development trends, markets, software, and services. Mr. Hall's expertise includes artificial intelligence (AI), machine learning (ML), intelligent process automation (IPA), natural language processing (NLP) and conversational computing, blockchain for business, and customer… Read More
Don’t have a login? Make one! It’s free and gives you access to all Cutter research.