• 2026
  • May - 10 articles
  • April - 28 articles
  • March - 21 articles
  • February - 16 articles
  • January - 16 articles
  • 2025
  • December - 18 articles
  • November - 13 articles
  • October - 15 articles
  • September - 17 articles
  • August - 16 articles
  • July - 18 articles
  • June - 17 articles
  • May - 16 articles
  • April - 19 articles
  • March - 14 articles
  • February - 16 articles
  • January - 15 articles
  • 2024
  • December - 15 articles
  • November - 15 articles
  • October - 20 articles
  • September - 17 articles
  • August - 20 articles
  • July - 18 articles
  • June - 20 articles
  • May - 22 articles
  • April - 12 articles
  • March - 14 articles
  • February - 13 articles
  • January - 11 articles
  • 2023
  • December - 12 articles
  • November - 12 articles
  • October - 16 articles
  • September - 11 articles
  • August - 13 articles
  • July - 13 articles
  • June - 13 articles
  • May - 12 articles
  • April - 11 articles
  • March - 15 articles
  • February - 12 articles
  • January - 13 articles
  • 2022
  • December - 14 articles
  • November - 12 articles
  • October - 11 articles
  • September - 12 articles
  • August - 13 articles
  • July - 13 articles
  • June - 13 articles
  • May - 12 articles
  • April - 12 articles
  • March - 14 articles
  • February - 12 articles
  • January - 13 articles
  • 2021
  • December - 15 articles
  • November - 12 articles
  • October - 14 articles
  • September - 11 articles
  • August - 15 articles
  • July - 12 articles
  • June - 14 articles
  • May - 12 articles
  • April - 14 articles
  • March - 15 articles
  • February - 11 articles
  • January - 11 articles
  • 2020
  • December - 14 articles
  • November - 11 articles
  • October - 13 articles
  • September - 11 articles
  • August - 9 articles
  • July - 11 articles
  • June - 16 articles
  • May - 13 articles
  • April - 13 articles
  • March - 17 articles
  • February - 10 articles
  • January - 12 articles
  • 2019
  • December - 12 articles
  • November - 11 articles
  • October - 12 articles
  • September - 12 articles
  • August - 14 articles
  • July - 11 articles
  • June - 12 articles
  • May - 14 articles
  • April - 12 articles
  • March - 14 articles
  • February - 14 articles
  • January - 17 articles
  • 2018
  • December - 14 articles
  • November - 13 articles
  • October - 17 articles
  • September - 14 articles
  • August - 14 articles
  • July - 19 articles
  • June - 17 articles
  • May - 18 articles
  • April - 20 articles
  • March - 18 articles
  • February - 18 articles
  • January - 19 articles
  • 2017
  • December - 19 articles
  • November - 16 articles
  • October - 19 articles
  • September - 21 articles
  • August - 22 articles
  • July - 17 articles
  • June - 19 articles
  • May - 20 articles
  • April - 18 articles
  • March - 20 articles
  • February - 13 articles
  • January - 6 articles
  • 2016
  • December - 10 articles
  • November - 9 articles
  • October - 8 articles
  • September - 10 articles
  • August - 10 articles
  • July - 8 articles
  • June - 11 articles
  • May - 8 articles
  • April - 11 articles
  • March - 11 articles
  • February - 11 articles
  • January - 9 articles
  • 2015
  • December - 13 articles
  • November - 13 articles
  • October - 14 articles
  • September - 13 articles
  • August - 11 articles
  • July - 12 articles
  • June - 14 articles
  • May - 11 articles
  • April - 12 articles
  • March - 12 articles
  • February - 12 articles
  • January - 9 articles
  • 2014
  • December - 10 articles
  • November - 9 articles
  • October - 13 articles
  • September - 12 articles
  • August - 13 articles
  • July - 14 articles
  • June - 10 articles
  • May - 14 articles
  • April - 15 articles
  • March - 17 articles
  • February - 14 articles
  • January - 18 articles
  • 2013
  • December - 20 articles
  • November - 18 articles
  • October - 21 articles
  • September - 19 articles
  • August - 21 articles
  • July - 22 articles
  • June - 20 articles
  • May - 23 articles
  • April - 26 articles
  • March - 24 articles
  • February - 29 articles
  • January - 24 articles
  • 2012
  • December - 22 articles
  • November - 24 articles
  • October - 27 articles
  • September - 27 articles
  • August - 25 articles
  • July - 22 articles
  • June - 20 articles
  • May - 28 articles
  • April - 24 articles
  • March - 28 articles
  • February - 24 articles
  • January - 24 articles
  • 2011
  • December - 24 articles
  • November - 18 articles
  • October - 21 articles
  • September - 21 articles
  • August - 21 articles
  • July - 20 articles
  • June - 23 articles
  • May - 27 articles
  • April - 22 articles
  • March - 22 articles
  • February - 16 articles
  • January - 20 articles
  • 2010
  • December - 21 articles
  • November - 18 articles
  • October - 20 articles
  • September - 13 articles
  • August - 11 articles
  • July - 9 articles
  • June - 8 articles
  • May - 9 articles
  • April - 11 articles
  • March - 12 articles
  • February - 10 articles
  • January - 10 articles
  • 2009
  • December - 11 articles
  • November - 9 articles
  • October - 11 articles
  • September - 10 articles
  • August - 10 articles
  • July - 10 articles
  • June - 10 articles
  • May - 11 articles
  • April - 13 articles
  • March - 13 articles
  • February - 7 articles
  • January - 10 articles
  • 2008
  • December - 12 articles
  • November - 8 articles
  • October - 16 articles
  • September - 11 articles
  • August - 13 articles
  • July - 13 articles
  • June - 14 articles
  • May - 13 articles
  • April - 13 articles
  • March - 9 articles
  • February - 14 articles
  • January - 11 articles
  • 2007
  • December - 11 articles
  • November - 12 articles
  • October - 12 articles
  • September - 4 articles
  • August - 4 articles
  • July - 4 articles
  • June - 2 articles
  • May - 6 articles
  • April - 5 articles
  • March - 1 article
  • Monday, May 11, 2026

    Green Sheet interviews Mitek's Keivan Bahmani

    As artificial intelligence reshapes the fraud landscape, the race to build and maintain trust has become one of the payments industry's defining challenges. Fraudsters are using AI to create more convincing scams, deepfakes and synthetic identities, while security teams are deploying increasingly sophisticated defenses to detect and stop them in real time.

    In this Q&A, Keivan Bahmani, Ph.D., director of machine learning and AI integrity at Mitek, discusses how organizations can stay ahead in an environment where both innovation and risk are accelerating, and why layered defenses, real-time adaptation and customer trust are now deeply interconnected.

    Green Sheet: With AI now empowering both attackers and defenders, what does it mean to win the trust race, and how can organizations measure whether they're ahead or behind?

    Keivan Bahmani: Winning the trust race comes down to maintaining strong fraud protections while preserving fast, low friction experiences for real customers, even as AI enables scams to become more realistic and scalable. When customers can onboard, transact and recover accounts smoothly while fraud attempts are consistently blocked, trust becomes an operational advantage rather than a tradeoff between security and growth. 

    Organizations can measure whether they're ahead or behind by looking beyond traditional fraud‑loss metrics. Signals like attack presentation classification error rate, customer drop‑off during authentication or onboarding, response time to emerging fraud patterns and the speed at which new attack techniques are detected all offer insight into trust performance. 

    Teams that adapt defenses continuously and intervene earlier in the fraud lifecycle gain a clear advantage, while teams that rely on reactive controls or introduce unnecessary friction will fall behind. 

    GS: AI-driven scams are becoming more human and scalable. What specific tactics are you seeing that represent a meaningful shift from traditional fraud methods?

    KB: Several AI-enabled tactics are changing the landscape of how fraud is carried out compared to traditional methods. Document template attacks now allow fraudsters to generate high-quality forged IDs that replicate layouts, fonts and security features. This method can bypass basic verification checks at scale.

    Deepfakes have also become more advanced. They make it possible to impersonate real customers or executives convincingly enough to defeat traditional biometric and liveness controls. Additionally, phishing attacks have grown more sophisticated. AI is now used to develop personalized context aware messages that adapt in real time based on the victim's responses.   These tactics are increasingly combined across the identity lifecycle rather than used in isolation. Fraudsters may use synthetic identities to bypass onboarding, then rely on deepfake impersonation, injection attacks or social engineering to escalate access or authorize high value transactions later.

    This multi-layered approach represents a departure from traditional fraud attempts. It underscores why static single layer defenses are no longer sufficient in an AI-driven threat environment.

    GS: Deepfakes and synthetic identities are often discussed at a high level—where are they already having the most tangible impact on businesses today?

    KB: The most tangible impact is being felt in digital onboarding, account takeovers and high-value transactions. In these instances, identity verification traditionally service as the gateway to trust. Deepfake audio and video are now capable of bypassing basic biometric checks. Synthetic identities, often created by blending real and fabricated data, can also pass initial verification with alarming ease.

    These attacks go beyond direct financial losses. They also undermine confidence in digital channels by challenging the assumption that identity checks can reliably distinguish legitimate users from fraudsters. Once fraudulent identity is established, the activity often persists for long periods of time and gradually accumulates trust, access and transaction history before being leveraged for larger attacks.

    GS: Security teams are deploying AI to counter these threats, but what are the biggest gaps or limitations in current AI-driven fraud defenses?

    KB: A major limitation of today's AI‑driven fraud defenses is that they are applied to systems never built to handle adaptive AI threats. Fraudsters are learning how detection models behave through techniques like model probing and testing system responses. This gives attackers insights into which signals trigger defenses, and which do not.

    Because of this, they can adjust their tactics to avoid detection. When AI models are not regularly stress-tested or trained, they can become very predictable.

    Another major gap is the growing mismatch between how quickly AI-generated fraud evolves and how quickly defenses can respond. Deepfakes, synthetic identities and AI social engineering are improving in realism and speed. Many security teams still depend on models that update too slowly or operate alone.

    Even the most advanced AI tools can fall behind if teams lack layered defenses, real time monitoring and strong governance over model training and data integrity. AI can be a powerful defense, but only if it is evolving at the same pace as the threats, t's meant to stop.

    GS: You've emphasized early detection and real-time intervention. What does an effective layered defense look like in practice for organizations at different levels of maturity?

    KB: An effective layered defense starts with the recognition that fraud is no longer happening at a single moment or channel. For organizations that are less mature, the foundation is strengthening digital onboarding with AI-driven document verification, biometrics and liveness checks that are supported by data sources to confirm that a real person is present from the start.

    These tactics work together and establish identity confidence while filtering out common forgeries and synthetic identities before any fraud takes place.

    As programs mature, defenses expand across the entire identity lifecycle and adapt in real time based on risk. This includes continuous authentication by using biometrics and behavioral signals, step up verification during high-risk actions like password resets or large transactions and secure recovery processes that prevent account takeovers. 

    More advanced organizations also apply the same layered logic to physical channels, such as physical locations, and use dynamic orchestration to introduce "good friction" only when risk warrants it. At every stage, the goal should be the same, which is detecting AI driven threats early, intervening in real time and maintaining trust without degrading the customer experience.

    GS: As AI models continue to advance, how should organizations balance innovation with risk, particularly when the same technologies driving growth are also enabling more sophisticated fraud? 

    KB: As AI models advance, innovation is accelerating faster than governance, with 94 percent of CEOs citing AI‑driven innovation but only 24 percent confident they can balance risk with value. The most effective approach is to assume that any AI capability driving growth will be tested out by fraudsters and to build defense methods that evolve at the same pace.

    Organizations need to invest in continuous model improvement like dynamic training and adversarial testing, so defenses are constantly exposed to new attack patterns instead of optimized only for known threats. Accuracy alone is not enough anymore, and models must be resilient to manipulation, adaptable in real time and maintain performance as fraud tactics change.

    Additionally, high quality data, strong oversight and clear accountability are essential to ensuring AI systems remain trustworthy as they scale. Organizations need to pair real-time detection and automated responses with rigorous compliance frameworks that will keep pace with AI-driven decision making.

    When innovation is paired with strong governance and layered defenses, organizations can move quickly without sacrificing customer trust. This balance is crucial, especially as the same technologies are powering growth and are being used to enable more sophisticated fraud.

    Notice to readers: These are archived articles. Contact information, links and other details may be out of date. We regret any inconvenience.

    skyscraper ad