Skip to content
Tiatra, LLCTiatra, LLC
Tiatra, LLC
Information Technology Solutions for Washington, DC Government Agencies
  • Home
  • About Us
  • Services
    • IT Engineering and Support
    • Software Development
    • Information Assurance and Testing
    • Project and Program Management
  • Clients & Partners
  • Careers
  • News
  • Contact
 
  • Home
  • About Us
  • Services
    • IT Engineering and Support
    • Software Development
    • Information Assurance and Testing
    • Project and Program Management
  • Clients & Partners
  • Careers
  • News
  • Contact

Authentication in the age of AI spoofing

A finance manager joins a video call with familiar faces — the company’s CFO and her colleagues. They’ve been summoned via email for a confidential “M&A discussion” requiring bank transfers before the close of business. While the meeting isn’t outside the realm of possibility, the reality was just that: everyone aside from the manager was an AI-generated deepfake. Their voices, gestures and likenesses were synthesized from publicly available videos. The email and its provenance evaded system-wide detection.

This isn’t far-fetched; it was a real-life scenario for engineering company Arup in 2024, when deepfake impersonation cost the firm $25 million.

The availability of platforms that enable deepfakes-as-a-service demands that organizations adopt an AI-aware security posture. One that assumes AI-enhanced techniques are attempting to bypass traditional security systems and test the nature of human trust, escalating the AI arms race.

The result is creating a paradox for organizations with no clear long-term gains and a short-lived homefield advantage. The race is accelerating exponentially in both velocity and sophistication to the point that soon no human will be able to follow nor track AI attack/defense response cycles.

The threat of AI is here

At the start of this year, approximately two-thirds of global companies surveyed by the World Economic Forum stated that they anticipate that AI will have the “most significant impact” on cybersecurity.

Even as AI revolutionizes enterprise cybersecurity defenses, threats continue to evolve with sophistication and complexity. Unlike traditional malware, which may find its way into networks through a compromised software update or downloads, AI-powered threats utilize machine learning to analyze how employees authenticate themselves to access networks, including when they log in, from which devices, typing patterns and even mouse movements. The AI learns to mimic legitimate behavior while collecting login credentials and is ultimately deployed to evade basic detection.

The ante is raised with the deployment of text-to-video apps that can manipulate video streams, generate AI-videos and clone voices and human likeness. Real-world incidents highlight a critical gap: Building more resilient security requires additional layers to tilt the field in the direction of defenses. Ideally the additional layer is:

  • Additive and based on a completely different approach (little overlap).
  • Bypasses AI’s strengths, such as learning, manipulating, emulating, etc.
  • Extremely efficient, fast, computationally cheap, authoritative.

Fortunately, such a mechanism already exists. Unfortunately, it is often overlooked or misunderstood. My thesis is that authentication, especially one based on open standards and tied to fundamental internet infrastructure, is a proven and effective defensive layer that helps address the AI challenge.

The changing battlefield: Hyperrealism by the numbers

The AI threat is already materializing. One only needs to try out OpenAI’s Sora2 to grasp the coming wave of hyper realistic spoofs that are making it nearly impossible to distinguish the real from the fake.

In the first five months of 2025 alone, there’s been a 1,265% jump in AI-powered phishing attacks, according to DeepStrike. Microsoft’s 2025 Digital Defense Report indicates that AI-powered phishing emails achieved a 54% click-through rate, compared to 12% for traditional phishing. Deepfakes, like voice cloning and video impersonation, are doubling in frequency every six months. In a recent Darktrace survey, 78% of CISOs now see AI-powered cyberthreats significantly affect their organizations.

Beyond the statistics, AI’s effectiveness is driven by its exponentially improving abilities to social engineer humans — replicating writing style, voice cadence, facial expressions or speech with subtle nuance and adding realistic context by scanning social media and other publicly available references.

The data is striking and reflects the crucial need for a multi-layer approach to help sidestep the exponentially escalating ability for AI to trick humans. 

Here’s how a layered authentication strategy can change the outcome of an AI-powered attack:

  • At the infrastructure level, DNS-based protocols verify that communications are actually coming from legitimate sources, operating on cryptographic principles rather than pattern recognition. Critically, this side steps hyperrealistic AI attacks.
  • At the access level, security tokens, combined with biometric confirmation, create physical barriers.
  • AI-powered behavioral analytics flag anomalies, like unusual location, access time or device.

Machine learning cannot forge DNS records for domains it doesn’t control, summon physical tokens or replicate fingerprints — at least not yet.

Authentication: A critical defense layer

As adversaries leverage AI for advanced phishing campaigns, deepfake attacks and automated vulnerability exploitation, various forms of authentication have evolved from best practices to strategic imperatives.

The numbers tell a compelling story: more than 99.9% of compromised accounts lack multi-factor authentication. When MFA is enabled, 96% of bulk phishing attempts and 76% of targeted attacks are deterred.

Yet despite authentication’s effectiveness, Okta’s global workforce data indicates approximately two-thirds of organizations worldwide deploy MFA, but just 35% of global SMBs and 27% to 34% of businesses with fewer than 100 employees use MFA, according to a Cyber Readiness Institute report. Moreover, Okta also found that government organizations had a 55% MFA adoption rate. The adoption gaps create significant supply chain vulnerabilities that attackers can exploit on a large scale.

Authentication vendors need to make deployment of their services easier, more intuitive, user-friendly and seamless. And MFA needs to be a requirement across the board, especially for executives, since they are the most targeted and can cause the most damage when breached.

But support must come from the top. When board and CEO-level executives actively champion MFA education and adoption, they give CIO/CISO/InfoSec teams the authority and organizational momentum needed to enforce it successfully.

Today, most organizations that roll out MFA broadly rely on established methods, adding verification layers to traditional password-based authentication:

  • Time-based one-time passwords (TOTPs), which are generated through authenticator apps like Google Authenticator or Microsoft Authenticator and expire every 30 seconds. Software-generated codes eliminate the vulnerabilities of static credentials while remaining cost-effective and easy to deploy across large user bases.
  • Biometric authentication, like facial recognition, one-touch fingerprint scanning or voice recognition, provides unique identifiers tied to individuals. Multi-modal biometric approaches offer stronger protection, particularly against AI-generated deepfakes. Passkeys can be used with biometrics, adding several additional layers of AI-resistant security.
  • Push notifications send approval requests to registered devices, allowing users to confirm or deny authentication attempts with a single tap. While this method offers better usability than typing codes, it can be vulnerable to look-alike “prompt bombing” attacks aiming to overwhelm the target with requests.
  • SMS-based codes, though similar in delivery to notifications, remain common despite known vulnerabilities such as SIM swapping and SMS interception.

By providing multiple fast and frictionless authentication layers that exist outside the digital realm where AI operates, networks become more resistant to phishing, session hijacking and man-in-the-middle attacks.

The next generation of MFA

Passkeys are emerging as the next critical evolution of defense. Passkeys are built on the mature FIDO2 and WebAuthn standards, which address a critical gap in current authentication methods.

Just as DNS-based protocols like DMARC establish trusted identity at the infrastructure level, FIDO2-based passkeys establish cryptographic trust at the user authentication level. By making the authentication mechanism itself incapable of working with fraudulent domains, passkeys offer a fundamental shift in authentication security. Passkey use can also be authenticated itself via biometrics (i.e., touch or face ID on Apple devices or Google’s face or fingerprint unlock for Android devices).

Cryptographic protection complements biometric authentication, which verifies “Is this the right person?” at the device level, while passkeys are used to verify “Is this the right website or service?” at the network level. Multi-modal biometrics, such as facial recognition plus fingerprint scanning or biometrics plus behavioral patterns, further strengthen this approach.

As AI-powered attacks make credential theft and impersonation attacks more sophisticated, the only sustainable line of defense is a form of authentication that cannot be tricked or must be cryptographically verified. With major platforms including Apple, Google, Microsoft and GitHub already supporting passkeys, this technology is quickly evolving from emerging to essential.

Balancing AI innovation with authentication modernization

The real opportunity is not choosing between AI-powered defenses and robust authentication; it is recognizing that non-AI authentication can fundamentally shift the security equation in favor of defenders. With average breach costs at $4.44 million, according to IBM’s 2025 Cost of a Data Breach Report, the path forward requires balancing both imperatives.

Success belongs to enterprises that recognize these technologies have fundamentally different roles. AI for detection, adaptation and response speed and non-AI authentication for definitive access control that cannot be algorithmically defeated.

But to truly change the equation, organizations must prioritize authentication modernization methods that are grounded in non-AI principles and open standards, even as they embrace AI-driven security innovations.

This article is published as part of the Foundry Expert Contributor Network.
Want to join?


Read More from This Article: Authentication in the age of AI spoofing
Source: News

Category: NewsNovember 14, 2025
Tags: art

Post navigation

PreviousPrevious post:AI, without fear: An open note to ITNextNext post:10 reasons computer science degrees must change for the AI era

Related posts

Analytics capability: The new differentiator for modern CIOs
December 12, 2025
Stop running two architectures
December 12, 2025
法令だけでは足りない―医療情報ガイドラインと医療DXのリアル
December 12, 2025
SaaS price hikes put CIOs’ budgets in a bind
December 12, 2025
Don’t blame AI if the data doesn’t stack up
December 12, 2025
DigitalES alerta de la escalada de riesgos en IA y propone un marco para una adopción empresarial segura
December 12, 2025
Recent Posts
  • Analytics capability: The new differentiator for modern CIOs
  • Stop running two architectures
  • 法令だけでは足りない―医療情報ガイドラインと医療DXのリアル
  • SaaS price hikes put CIOs’ budgets in a bind
  • Don’t blame AI if the data doesn’t stack up
Recent Comments
    Archives
    • December 2025
    • November 2025
    • October 2025
    • September 2025
    • August 2025
    • July 2025
    • June 2025
    • May 2025
    • April 2025
    • March 2025
    • February 2025
    • January 2025
    • December 2024
    • November 2024
    • October 2024
    • September 2024
    • August 2024
    • July 2024
    • June 2024
    • May 2024
    • April 2024
    • March 2024
    • February 2024
    • January 2024
    • December 2023
    • November 2023
    • October 2023
    • September 2023
    • August 2023
    • July 2023
    • June 2023
    • May 2023
    • April 2023
    • March 2023
    • February 2023
    • January 2023
    • December 2022
    • November 2022
    • October 2022
    • September 2022
    • August 2022
    • July 2022
    • June 2022
    • May 2022
    • April 2022
    • March 2022
    • February 2022
    • January 2022
    • December 2021
    • November 2021
    • October 2021
    • September 2021
    • August 2021
    • July 2021
    • June 2021
    • May 2021
    • April 2021
    • March 2021
    • February 2021
    • January 2021
    • December 2020
    • November 2020
    • October 2020
    • September 2020
    • August 2020
    • July 2020
    • June 2020
    • May 2020
    • April 2020
    • January 2020
    • December 2019
    • November 2019
    • October 2019
    • September 2019
    • August 2019
    • July 2019
    • June 2019
    • May 2019
    • April 2019
    • March 2019
    • February 2019
    • January 2019
    • December 2018
    • November 2018
    • October 2018
    • September 2018
    • August 2018
    • July 2018
    • June 2018
    • May 2018
    • April 2018
    • March 2018
    • February 2018
    • January 2018
    • December 2017
    • November 2017
    • October 2017
    • September 2017
    • August 2017
    • July 2017
    • June 2017
    • May 2017
    • April 2017
    • March 2017
    • February 2017
    • January 2017
    Categories
    • News
    Meta
    • Log in
    • Entries feed
    • Comments feed
    • WordPress.org
    Tiatra LLC.

    Tiatra, LLC, based in the Washington, DC metropolitan area, proudly serves federal government agencies, organizations that work with the government and other commercial businesses and organizations. Tiatra specializes in a broad range of information technology (IT) development and management services incorporating solid engineering, attention to client needs, and meeting or exceeding any security parameters required. Our small yet innovative company is structured with a full complement of the necessary technical experts, working with hands-on management, to provide a high level of service and competitive pricing for your systems and engineering requirements.

    Find us on:

    FacebookTwitterLinkedin

    Submitclear

    Tiatra, LLC
    Copyright 2016. All rights reserved.