In a conference room at a recent cybersecurity training, I found myself squinting at a screen, playing a high-stakes game of “real or fake.” The assignment was straightforward—sort out which images projected in front of us were authentic and which were AI-generated. Most in the room, myself included, struggled to tell the difference.