logo
The Transaction That Never Happened: How Fraud Stifles Our Economy

The Transaction That Never Happened: How Fraud Stifles Our Economy

Forbes28-05-2025

Hacker and laptop made of binary code. Ones and zeros. With copy space.
Across industries, economies, and every digital touchpoint in between, fraud is quietly compounding costs, not just by stealing money, but by stopping legitimate transactions before they even happen.
While fraud attempts make headlines when a heist lands, there's a much more insidious problem right under the surface: the transaction that never happened because of our attempts to stop fraud before it happens.
These are the losses you can't always see in your quarterly report: the customers you turned away because your system flagged them as risky, the potential revenue you missed by setting your fraud filters too tight, and the businesses that slowly destroy the trust between themselves and their consumers because a few bad actors shaped how they treat everyone.
And it's only getting worse. Fraud is now multimodal.
It doesn't show up just as stolen credit cards or phishing emails like it used to. Today, fraud arrives through fake IDs, deepfaked voices, spoofed IP addresses, social engineering over messaging apps, and increasingly, through AI-generated personas that can pass casual scrutiny Any app, voice, or face can be weaponized through any channel imaginable.
According to recent estimates from Juniper Research, merchants are projected to lose over $362 billion globally to online payment fraud between 2023 and 2028.
Meanwhile, the systems designed to catch this fraud are often blocking legitimate transactions as well with false positives routinely outnumbering actual fraud.
The question that beckons an answer is simple, with answers that have deep roots: how do you protect your customers without treating them like suspects?
'Fraud doesn't just take the money in your account,' says Forter CEO and co-founder Michael Reitblat. 'It takes the trust in your system. And in trying to protect against it, too many companies go too far. They build walls so high that even their best customers can't climb over them.'
He would know.
Reitblat co-founded Forter with the belief that the future of fraud prevention shouldn't be focused solely on tightening the filters, but applying them smarter. That means knowing your customers deeply enough to recognize them when they show up, even if their device, location, or behavior looks slightly different than last time.
'We need to start by flipping the mental model companies approach fraud with,' Michael begins. 'Instead of assuming guilt and proving innocence, we should assume the customer is legitimate and be fast and smart enough to catch when they're not.'
The reason why we don't see this approach being the norm is that it requires data, huge volumes of it, and systems that can learn over time. Forter's platform, for example, sits on top of a global network of merchants, letting it see patterns no single merchant could identify on their own. It's a distributed immune system for the digital economy.
Much of the tech that modern fraud-detection relies on wasn't available just a few short years ago, and the industry is evolving faster than ever. While the tech is a key drive, Michael argues that the key to handling fraud better lies within consumer and vendor psychology. Simply put, we need to reframe what success in fraud prevention looks like.
'Everyone measures fraud prevented. But what about sales saved?' he asks. 'If your system blocks 99% of fraud but also turns away 10% of good customers, that's not success. That's loss. And it's often invisible, as is the lack of trust that underpins it all.'
Zoom out from payments, and the same principles of trust apply across cybersecurity.
Gil Geron, co-founder and CEO of Orca Security, has spent years helping companies secure their cloud environments. But for him, the real challenge is psychological as much as it is technological.
'Too much of cybersecurity is built around fear,' Geron says. 'Fear of breaches, fear of compliance issues. But when you lead with fear, you create friction. You slow down developers, frustrate employees, and erode trust internally.'
The new wave of cybersecurity professionals often argue that when everything is cloud-first and developer-led, security can't be a blockade, it has to be a partner. Geron agrees and notes that the best security is invisible: it runs in the background, integrates seamlessly, and empowers teams rather than policing them.
'What we need is secure velocity,' he explains. 'Move fast, but safely. Don't just scan the environment once a month, understand what's happening in real time, with context. This way we ladder up to trust organically, and remove the sources of friction that keep good actors from transacting on the platforms they want.'
The idea of context over details is a critical one. In fact, it can be transformative when weaponized on behalf of the consumer.
Whether you're approving a payment or flagging a risky container in the cloud, the system needs to know what normal looks like in order to detect what's not.
That requires machine learning, behavioral baselines, and yes, trust in your users who sometimes order flights to Aruba at 2am right after rejoining Netflix and ordering take-out from a Nepalese restaurant for the first time with the same credit card.
'Security isn't about saying no as the default,' Geron says. 'It's about having the necessary trust to say yes to the right people, in the right way, at the right time.'
Thomas Brunner, CEO of Gigapay, sees the consequences of broken trust up close.
His platform helps creators and freelancers get paid across borders. But in a world where fraudsters can fake identities and automate scams, the burden of trust has never been higher.
'In the creator economy, you don't have time to run a KYC check manually or hold payments for weeks,' Brunner explains. 'If you don't trust the user instantly, the whole model falls apart.'
Gigapay uses a mix of real-time risk scoring and user behavior analysis to spot anomalies. But the key, Brunner says, is not punishing everyone for the mistakes of a few.
'Fraud is the exception, not the rule,' he says. 'If we design our systems assuming everyone is trying to cheat, we break the experience for the 99% who are just trying to earn a living.'
The stakes are especially high in the gig economy, where payouts can make or break someone's rent. A missed transaction is a data point of deep actuarial interest for sure, but it's much more than that for those who it impacts. In fact, it's often a livelihood.
'Trust is the platform,' Brunner says. 'Without it, the economy doesn't move.'
Sometimes, the block comes from a lack of trust in the tools we use themselves.
Brooke Hartley Moy, CEO of Infactory, is building an AI insights engine designed for enterprises. Her platform helps companies find answers they can trust, pulling not just from the open web, but from verified datasets and curated sources.
'We make billion-dollar decisions based on AI,' Moy says. 'But the foundation of that AI is often unclear. Where did this answer come from? Who vetted it? Can I trust it?'
That uncertainty, she argues, is its own form of friction. Friction we should work hard to minimize.
Companies hesitate to deploy AI not because it doesn't work, but because they don't know when it will, or whether it might do something entirely different than tasked.
'Accuracy can't be an afterthought,' Moy explains. 'Having trust in your tools and the answers they give you is the difference between action and paralysis. If you can't trust the output, you won't move forward. And that's another kind of transaction that never happens.'
For her, solving this trust gap is about structure and standards. We start with what the AI says, and we trust it based on how transparently and reliably it says it.
'The future of decision-making requires not just intelligence,' Moy adds. 'It requires provenance.'
At Nightwing, an intelligence solutions company spun out of RTX, Chief Technology and Data Officer Chris Jones is thinking of fraud, trust and everything above on a bigger scale.
His job is to figure out how to protect critical systems, not just from fraud, but from coordinated attacks on the scale of the digital infrastructure of entire countries.
'There isn't a more poignant set of threat vectors than the ones we're seeing now,' Jones says. 'And it's not just about stopping bad actors. It's about making sure the good ones can still operate.'
He sees a future where cyber offense and defense break through their silos and blossom into strategic complements that build the foundations for trust across the entire economy.
'We've been playing defense for years,' he notes. 'But if we want to maintain a global digital order, we have to think about sustainability, resilience, and sometimes, deterrence.'
In other words: just like in commerce, the real cost of a breach isn't just what's stolen. It's what's prevented. In the end, friction grinds the strongest of gears down to a halt.
If attacks deter innovation, stifle engagement, or shake public confidence, they succeed without breaching a single firewall.
'The blue team can win,' Jones says. 'But we have to scale them faster than the red team evolves. That means tools, talent, and trust. It means reducing friction for the people doing the right thing.'
Fraud captures our attention and it is easy to over-index on it just because of how often it is the signal that breaks through the noise.
But its most dangerous form is quiet.
It hides in checkout forms that never get filled, apps that go unopened, accounts that never activate. It sits in the unseen shadows of the economy. The almost-purchases, the never-hires, the frozen budgets and the client who never returns.
Preventing this form of friction is first and foremost a design challenge. Those who want to surmount this challenge need to build systems that can treat trust as the default instead of the reward for perfect compliance.
In the end, what drives growth isn't just the blue team's defense or a tighter fraud-filter. Instead, it's a firm belief that the system will work as intended. That the transaction will go through. That the other side is who they say they are.
And when that belief is protected, the economy doesn't just survive.
It thrives.

Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

What Cybersecurity Teams Can Learn From Product Management
What Cybersecurity Teams Can Learn From Product Management

Forbes

time28 minutes ago

  • Forbes

What Cybersecurity Teams Can Learn From Product Management

Dan DeCloss is the founder and CTO of PlexTrac and has over 20 years of experience in cybersecurity. What does it take to be a successful entrepreneur? The most obvious answers are passion, determination and a clear vision. But humility and a willingness to listen and accept feedback are just as—if not more—important. In fact, many successful entrepreneurs will tell you that there's nothing more important than customer feedback. Getting a continuous flow of feedback is a great scenario; however, it presents a big challenge: What do you prioritize first? This is the exact question that product teams ask every day. Just as entrepreneurs look to make the biggest impact on their product in the shortest amount of time, product teams want to maximize efforts. The challenge is determining what is actually going to move the needle while also taking into account which customer requests must be addressed first, which bugs and defects are make-or-break and what new features will outweigh the cost of technical debt. Other teams, like cybersecurity, can also learn a lot from product teams. Prioritization challenges are common among product teams, which is why they've developed mature processes and frameworks to manage them effectively. If you take these same challenges and apply them to cybersecurity teams, the similarities are striking. Both disciplines ultimately share the same mission: to enable the business to succeed and serve its customers. This alignment means both product and cybersecurity teams must base their plans and priorities on how best to support business goals. While cybersecurity program management is still maturing, product management (PM) offers a well-established playbook to learn from. By drawing these parallels, security teams can uncover valuable insights and adopt proven practices to advance and streamline their own operations. Let's dive into some of the challenges in cybersecurity and identify ways that product management is solving them. Cybersecurity teams are always responding to alerts, leaving them in a constant state of reaction. This can lead to a common sense of 'alert fatigue' and burnout. Security teams also tend to get inundated with vulnerabilities and findings from proactive scans and assessments. This problem has a direct correlation to the prioritization challenges within product management. Product management teams manage this with a systematic approach, using sprints, capacity planning and backlog grooming to plan for work. Each sprint is loaded with work for the team and a dedicated buffer to allow for any unplanned work, such as critical bugs, etc. Security teams can make great strides in their journey to accomplish more work and move to a proactive state by following similar principles. If a security team operates in a sprint model, they can load planned work while leaving room for unplanned work. This feeds directly into the prioritization discussion. Establishing a clear process around planning work is the foundation for meaningful prioritization discussions. In cybersecurity, this is especially vital as teams are inundated with all kinds of vulnerabilities, compliance items, alerts, etc. By taking a page from the PM playbook, security teams can build a roadmap of initiatives based on their priority. One effective method is scoring each initiative based on its relative importance and impact on the business. Applying this framework helps security teams assess risk and prioritize efforts in the context of broader business goals. Of course, prioritization becomes challenging when urgent injections or alerts arise. That's where a defined escalation process—similar to an incident response plan—becomes essential, enabling teams to handle interruptions in a structured and consistent manner. Once you have defined your roadmap and established your work cadences, you're fully operational. But are you successful? This is where metrics come into play. PM teams measure how long it takes to get a feature or product to market as well as the adoption rate of the features. They also measure the allocation of time within each sprint. Security teams should adopt a similar mindset, dedicating 60% of sprint time to proactive security measures and 40% to reactive tasks. Additional metrics should be used to track mean time to resolution, meant time to detection and risk reduction over time. There are many other metrics to consider, but the goal is to ensure you're able to show progress in achieving KPIs and reducing risk exposure. Prioritization remains one of the toughest challenges for nearly everyone, from entrepreneurs sifting through customer feedback to cybersecurity leaders triaging vulnerabilities, alerts, compliance requirements and managing risks. Product teams have spent years refining their approaches to prioritization—turning feedback overload into focused roadmaps and aligning work with business goals. It's time for cybersecurity to steal from that playbook. By borrowing the frameworks, mindset and strategic discipline of product management, security teams can navigate complexity with greater clarity, build more impactful programs and, ultimately, drive better outcomes for the business. The blueprint already exists—are you bold enough to use it? Forbes Technology Council is an invitation-only community for world-class CIOs, CTOs and technology executives. Do I qualify?

Zscaler Buying Red Canary: A Canary In The Cybersecurity Coalmine?
Zscaler Buying Red Canary: A Canary In The Cybersecurity Coalmine?

Forbes

time33 minutes ago

  • Forbes

Zscaler Buying Red Canary: A Canary In The Cybersecurity Coalmine?

Zscaler Acquires Red Canary in $675 Million Deal, Signaling a New Chapter in Cybersecurity Services ... More Integration. Hot on the heels of Google's eye-popping acquisition of Wiz for a rumored $23 billion valuation, the cybersecurity market is once again making headlines, this time with Zscaler's announcement that it will acquire Red Canary, a leading Managed Detection and Response firm. While the numbers may be smaller, the strategic implications may prove just as significant. This is not just another consolidation play in the crowded MSSP and MSP space. It's something different. For the first time at this scale, a cloud-native firewall vendor is acquiring a services-first cybersecurity company. It reflects a broader shift in a turbulent market, where traditional boundaries between software, platforms and services are collapsing in favor of integrated, outcome-driven solutions. Zscaler, a cloud-native security leader processing over 500 billion transactions daily, serves ... More nearly half of the Fortune 500 through its Zero Trust Exchange platform. Zscaler, founded in 2007, built its reputation as a pioneer in secure cloud connectivity. It operates a global security cloud with more than 150 data centers and processes over 500 billion transactions per day. Nearly half of the Fortune 500 relies on Zscaler's Zero Trust Exchange platform to securely connect users, devices and applications. Its focus has long been on scalable, identity-based access controls and policy enforcement — not services. Until now. Red Canary, founded in 2013 and based in Denver, has become one of the most respected names in MDR. Its platform offers around-the-clock detection, investigation and response for enterprise customers, helping fill the growing gap in skilled security operations talent. With an estimated $140 million in annual recurring revenue and a reputation for precision threat analytics, Red Canary is a natural bolt-on for a company looking to deliver turnkey threat protection. Zscaler is acquiring Red Canary to accelerate its roadmap for an AI-powered, full-stack Security Operations Center. This includes not just technology, but skilled services, an area where most firewall vendors have historically stayed out. By combining Red Canary's MDR capabilities with Zscaler's deep cloud visibility, the deal promises: It's not just an expansion. It's a signal that the lines between infrastructure vendors and cybersecurity service providers are vanishing. The reported deal size is approximately $675 million, split between cash and equity. That places the transaction at roughly 5.7x Red Canary's $140 million ARR, in line with market expectations for high-growth cybersecurity firms. The deal is expected to close in August 2025, pending regulatory approval. By comparison, recent MDR acquisitions have either been quiet roll-ups or smaller tuck-ins. This one is different. Zscaler is a publicly traded, platform-first company paying a premium to bring a services company in-house. It sets a precedent. We have already seen early signs of this convergence. SonicWall acquired MDR firm Solutions Granted in late 2023. Fortinet has made moves toward managed SASE offerings. Cisco, Palo Alto Networks, Check Point and others are undoubtedly watching closely. But Zscaler's Red Canary deal may be the moment this trend breaks into the mainstream. It challenges the old notion that firewall and network security companies should stay product-focused and leave services to the MSSPs. That barrier is officially gone. This is a compelling moment in the evolution of cybersecurity. With AI, cloud and geopolitical risk accelerating enterprise security needs, customers are demanding outcomes not just tools. That means companies like Zscaler will increasingly have to deliver both software and services, seamlessly integrated. The Zscaler–Red Canary acquisition may be remembered not just for its price tag, but for what it represents: the beginning of a new era where cloud security platforms and service providers are no longer distinct categories. And this may just be the beginning.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into the world of global news and events? Download our app today from your preferred app store and start exploring.
app-storeplay-store