{"id":206297,"date":"2025-03-28T04:30:00","date_gmt":"2025-03-28T04:45:14","guid":{"rendered":"https:\/\/www.cyberark.com\/podcasts\/ep-4-ai-powered-fraud-redefining-the-identity-threat-landscape\/"},"modified":"2026-05-03T07:09:14","modified_gmt":"2026-05-03T11:09:14","slug":"ep-4-ai-powered-fraud-redefining-the-identity-threat-landscape","status":"publish","type":"podcast","link":"https:\/\/www.cyberark.com\/ko\/podcasts\/ep-4-ai-powered-fraud-redefining-the-identity-threat-landscape\/","title":{"rendered":"EP 4 &#8211; AI-Powered Fraud: Redefining the Identity Threat Landscape"},"content":{"rendered":"<p>Imagine receiving an urgent email from your bank that looks perfectly legitimate. It warns you of a suspicious transaction and prompts you to verify your identity. You hesitate but click, and suddenly, your credentials are compromised. This scenario, crafted by AI-powered fraud-as-a-service, is happening now.<\/p>\n<p>In this episode of the Security Matters podcast, host David Puner is joined by Blair Cohen, Founder and President of AuthenticID, to discuss the evolving identity threat landscape. They explore the rise of synthetic fraud, the role of biometric authentication and how AI-driven security is reshaping the fight against cybercrime. Blair shares insights on the challenges of detecting deepfakes, the advancements in biometric authentication and the impact of generative AI on security measures.<\/p>\n<p>Tune in to learn how security leaders can stay ahead in this rapidly changing environment and what organizations can do to prepare for the next generation of cyberthreats.<\/p>\n","protected":false},"featured_media":213810,"template":"","class_list":["post-206297","podcast","type-podcast","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>EP 4 - AI-Powered Fraud: Redefining the Identity Threat Landscape | CyberArk<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/ko\/podcasts\/ep-4-ai-powered-fraud-redefining-the-identity-threat-landscape\/\" \/>\n<meta property=\"og:locale\" content=\"ko_KR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"EP 4 - AI-Powered Fraud: Redefining the Identity Threat Landscape\" \/>\n<meta property=\"og:description\" content=\"Imagine receiving an urgent email from your bank that looks perfectly legitimate. It warns you of a suspicious transaction and prompts you to verify your identity. You hesitate but click, and suddenly, your credentials are...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/ko\/podcasts\/ep-4-ai-powered-fraud-redefining-the-identity-threat-landscape\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-03T11:09:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/03\/ZThmNi5qcGc-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1400\" \/>\n\t<meta property=\"og:image:height\" content=\"1400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04\" \/>\n\t<meta name=\"twitter:data1\" content=\"1\ubd84\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/ko\/podcasts\/ep-4-ai-powered-fraud-redefining-the-identity-threat-landscape\/\",\"url\":\"https:\/\/www.cyberark.com\/ko\/podcasts\/ep-4-ai-powered-fraud-redefining-the-identity-threat-landscape\/\",\"name\":\"EP 4 - AI-Powered Fraud: Redefining the Identity Threat Landscape | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/ko\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/ko\/podcasts\/ep-4-ai-powered-fraud-redefining-the-identity-threat-landscape\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/ko\/podcasts\/ep-4-ai-powered-fraud-redefining-the-identity-threat-landscape\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/03\/ZThmNi5qcGc-1.jpg\",\"datePublished\":\"2025-03-28T04:45:14+00:00\",\"dateModified\":\"2026-05-03T11:09:14+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/ko\/podcasts\/ep-4-ai-powered-fraud-redefining-the-identity-threat-landscape\/#breadcrumb\"},\"inLanguage\":\"ko-KR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/ko\/podcasts\/ep-4-ai-powered-fraud-redefining-the-identity-threat-landscape\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/www.cyberark.com\/ko\/podcasts\/ep-4-ai-powered-fraud-redefining-the-identity-threat-landscape\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/03\/ZThmNi5qcGc-1.jpg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/03\/ZThmNi5qcGc-1.jpg\",\"width\":1400,\"height\":1400},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/ko\/podcasts\/ep-4-ai-powered-fraud-redefining-the-identity-threat-landscape\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/ko\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"EP 4 &#8211; AI-Powered Fraud: Redefining the Identity Threat Landscape\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/ko\/#website\",\"url\":\"https:\/\/www.cyberark.com\/ko\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/ko\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/ko\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ko-KR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/ko\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/ko\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/www.cyberark.com\/ko\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/ko\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"EP 4 - AI-Powered Fraud: Redefining the Identity Threat Landscape | CyberArk","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/ko\/podcasts\/ep-4-ai-powered-fraud-redefining-the-identity-threat-landscape\/","og_locale":"ko_KR","og_type":"article","og_title":"EP 4 - AI-Powered Fraud: Redefining the Identity Threat Landscape","og_description":"Imagine receiving an urgent email from your bank that looks perfectly legitimate. It warns you of a suspicious transaction and prompts you to verify your identity. You hesitate but click, and suddenly, your credentials are...","og_url":"https:\/\/www.cyberark.com\/ko\/podcasts\/ep-4-ai-powered-fraud-redefining-the-identity-threat-landscape\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2026-05-03T11:09:14+00:00","og_image":[{"width":1400,"height":1400,"url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/03\/ZThmNi5qcGc-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04":"1\ubd84"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/ko\/podcasts\/ep-4-ai-powered-fraud-redefining-the-identity-threat-landscape\/","url":"https:\/\/www.cyberark.com\/ko\/podcasts\/ep-4-ai-powered-fraud-redefining-the-identity-threat-landscape\/","name":"EP 4 - AI-Powered Fraud: Redefining the Identity Threat Landscape | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/ko\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/ko\/podcasts\/ep-4-ai-powered-fraud-redefining-the-identity-threat-landscape\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/ko\/podcasts\/ep-4-ai-powered-fraud-redefining-the-identity-threat-landscape\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/03\/ZThmNi5qcGc-1.jpg","datePublished":"2025-03-28T04:45:14+00:00","dateModified":"2026-05-03T11:09:14+00:00","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/ko\/podcasts\/ep-4-ai-powered-fraud-redefining-the-identity-threat-landscape\/#breadcrumb"},"inLanguage":"ko-KR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/ko\/podcasts\/ep-4-ai-powered-fraud-redefining-the-identity-threat-landscape\/"]}]},{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/www.cyberark.com\/ko\/podcasts\/ep-4-ai-powered-fraud-redefining-the-identity-threat-landscape\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/03\/ZThmNi5qcGc-1.jpg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/03\/ZThmNi5qcGc-1.jpg","width":1400,"height":1400},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/ko\/podcasts\/ep-4-ai-powered-fraud-redefining-the-identity-threat-landscape\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/ko\/"},{"@type":"ListItem","position":2,"name":"EP 4 &#8211; AI-Powered Fraud: Redefining the Identity Threat Landscape"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/ko\/#website","url":"https:\/\/www.cyberark.com\/ko\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/ko\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/ko\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ko-KR"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/ko\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/ko\/","logo":{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/www.cyberark.com\/ko\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/ko\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/ko\/wp-json\/wp\/v2\/podcast\/206297","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/ko\/wp-json\/wp\/v2\/podcast"}],"about":[{"href":"https:\/\/www.cyberark.com\/ko\/wp-json\/wp\/v2\/types\/podcast"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/ko\/wp-json\/wp\/v2\/media\/213810"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/ko\/wp-json\/wp\/v2\/media?parent=206297"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}