{"id":75394,"date":"2025-10-23T10:52:34","date_gmt":"2025-10-23T09:52:34","guid":{"rendered":"https:\/\/www.n-able.com\/?p=75394"},"modified":"2025-10-23T15:37:36","modified_gmt":"2025-10-23T14:37:36","slug":"podcast-beyond-the-horizon-ai-vs-cybercrime-how-generative-tech-is-changing-the-cybersecurity-landscape","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/fr\/blog\/podcast-beyond-the-horizon-ai-vs-cybercrime-how-generative-tech-is-changing-the-cybersecurity-landscape","title":{"rendered":"PODCAST | Beyond the Horizon: AI vs Cybercrime: How Generative Tech is Changing the Cybersecurity Landscape"},"content":{"rendered":"<p>In this episode, we dive deep into the intersection of artificial intelligence and cybersecurity with two industry veterans: Nicole Reineke, Senior Distinguished Product Leader and AI strategist, and Will Ledesma Director of N&#8209;able\u2019s MDR team. Together, they explore how generative AI is transforming phishing attacks, why trust remains the ultimate defence, and what organisations can do to stay ahead of increasingly sophisticated threats.<\/p>\n<p>From nostalgic tales of Nigerian Prince scams to today\u2019s AI-generated phishing emails, this conversation uncovers the alarming ease with which attackers exploit automation and social engineering. We discuss the rise of deepfake audio and video, the vulnerabilities of multi-factor authentication, and why defence-in-depth strategies are critical for SMBs and enterprises alike.<\/p>\n<p>Packed with real-world anecdotes, practical tips, and eye-opening statistics \u2013 including the staggering $16.6 billion lost to cybercrime last year \u2013 this episode is a must-listen for anyone concerned about digital security in an AI-driven world.<\/p>\n<p><a href=\"https:\/\/www.n-able.com\/resources\/threat-report-2025\" rel=\"noopener\" target=\"_blank\"><b>Click here to download the N&#8209;able 2025 Annual Threat Report \u2013 SMBs in the Cross Hairs<\/b><\/a><\/p>\n<p><strong>Topics Covered:<\/strong><\/p>\n<ul>\n<li>How generative AI is reshaping phishing tactics<\/li>\n<li>The psychology of trust and social engineering<\/li>\n<li>Deepfake audio\/video and national security risks<\/li>\n<li>MFA bypass techniques and adversary-in-the-middle attacks<\/li>\n<li>Why SMBs are prime targets for AI-powered scams<\/li>\n<li>Defence-in-depth and practical security layers<\/li>\n<li>The future of AI in cybersecurity \u2013 opportunities and threats<\/li>\n<\/ul>\n<p><iframe loading=\"lazy\" width=\"560\" height=\"315\" src=\"https:\/\/www.youtube.com\/embed\/rOINFeDjkXA?si=teLI9lBal0ehMOVm\" title=\"YouTube video player\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n<h2><span style=\"text-decoration: underline;\"><strong>Listen on your favourite streaming platform<\/strong><\/span><\/h2>\n<ul>\n<li><strong> <a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/beyond-the-horizon-future-focused-msp-insights\/id1747403359\" target=\"_blank\" rel=\"noopener\">Apple Podcasts<\/a><\/strong><\/li>\n<li><strong><a href=\"https:\/\/open.spotify.com\/episode\/57NJvmZpAO7omPUtj5ionL\" target=\"_blank\" rel=\"noopener\">Spotify<\/a><\/strong><\/li>\n<li><strong><a href=\"https:\/\/www.buzzsprout.com\/2364768\/episodes\/18062061-ai-vs-cybercrime-how-generative-tech-is-changing-the-cybersecurity-landscape\" target=\"_blank\" rel=\"noopener\">Buzzsprout<\/a><\/strong><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em>Disclaimer: This podcast provides educational information about issues that may be relevant to information technology service providers. Nothing in the podcast should be construed as any recommendation or endorsement by N\u2011able, or as legal or any other advice. The views expressed by guests are their own and their appearance on the podcast does not imply an endorsement of them or any entity they represent. Views and opinions expressed by N\u2011able employees are those of the employees and do not necessarily reflect the view of N\u2011able or its officers and directors. The podcast may also contain forward-looking statements regarding future product plans, functionality, or development efforts that should not be interpreted as a commitment from N\u2011able related to any deliverables or timeframe. All content is based on information available at the time of recording, and N\u2011able has no obligation to update any forward-looking statements.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Explore how AI is revolutionising phishing, deepfakes, and MFA attacks\u2014and what businesses can do to defend against evolving cyber threats.<\/p>\n","protected":false},"author":24,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-75394","post","type-post","status-publish","format-standard","hentry","topic-cyber-resilience","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>PODCAST | Beyond the Horizon: AI vs Cybercrime: How Generative Tech is Changing the Cybersecurity Landscape - N-able<\/title>\n<meta name=\"description\" content=\"Explore how AI is revolutionising phishing, deepfakes, and MFA attacks\u2014and what businesses can do to defend against evolving cyber threats.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/fr\/blog\/podcast-beyond-the-horizon-ai-vs-cybercrime-how-generative-tech-is-changing-the-cybersecurity-landscape\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"PODCAST | Beyond the Horizon: AI vs Cybercrime: How Generative Tech is Changing the Cybersecurity Landscape - N-able\" \/>\n<meta property=\"og:description\" content=\"Explore how AI is revolutionising phishing, deepfakes, and MFA attacks\u2014and what businesses can do to defend against evolving cyber threats.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/fr\/blog\/podcast-beyond-the-horizon-ai-vs-cybercrime-how-generative-tech-is-changing-the-cybersecurity-landscape\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2025-10-23T09:52:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-23T14:37:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"N-able\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"N-able\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/podcast-beyond-the-horizon-ai-vs-cybercrime-how-generative-tech-is-changing-the-cybersecurity-landscape#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/podcast-beyond-the-horizon-ai-vs-cybercrime-how-generative-tech-is-changing-the-cybersecurity-landscape\"},\"author\":{\"name\":\"N-able\",\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\"},\"headline\":\"PODCAST | Beyond the Horizon: AI vs Cybercrime: How Generative Tech is Changing the Cybersecurity Landscape\",\"datePublished\":\"2025-10-23T10:52:34+01:00\",\"dateModified\":\"2025-10-23T14:37:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/podcast-beyond-the-horizon-ai-vs-cybercrime-how-generative-tech-is-changing-the-cybersecurity-landscape\"},\"wordCount\":388,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/fr#organization\"},\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/podcast-beyond-the-horizon-ai-vs-cybercrime-how-generative-tech-is-changing-the-cybersecurity-landscape\",\"url\":\"https:\/\/www.n-able.com\/fr\/blog\/podcast-beyond-the-horizon-ai-vs-cybercrime-how-generative-tech-is-changing-the-cybersecurity-landscape\",\"name\":\"PODCAST | Beyond the Horizon: AI vs Cybercrime: How Generative Tech is Changing the Cybersecurity Landscape - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/fr#website\"},\"datePublished\":\"2025-10-23T10:52:34+01:00\",\"dateModified\":\"2025-10-23T14:37:36+00:00\",\"description\":\"Explore how AI is revolutionising phishing, deepfakes, and MFA attacks\u2014and what businesses can do to defend against evolving cyber threats.\",\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/fr\/blog\/podcast-beyond-the-horizon-ai-vs-cybercrime-how-generative-tech-is-changing-the-cybersecurity-landscape\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/fr#website\",\"url\":\"https:\/\/www.n-able.com\/fr\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/fr#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/fr?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/fr#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/fr\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\",\"name\":\"N-able\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"caption\":\"N-able\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"PODCAST | Beyond the Horizon: AI vs Cybercrime: How Generative Tech is Changing the Cybersecurity Landscape - N-able","description":"Explore how AI is revolutionising phishing, deepfakes, and MFA attacks\u2014and what businesses can do to defend against evolving cyber threats.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/fr\/blog\/podcast-beyond-the-horizon-ai-vs-cybercrime-how-generative-tech-is-changing-the-cybersecurity-landscape","og_locale":"fr_FR","og_type":"article","og_title":"PODCAST | Beyond the Horizon: AI vs Cybercrime: How Generative Tech is Changing the Cybersecurity Landscape - N-able","og_description":"Explore how AI is revolutionising phishing, deepfakes, and MFA attacks\u2014and what businesses can do to defend against evolving cyber threats.","og_url":"https:\/\/www.n-able.com\/fr\/blog\/podcast-beyond-the-horizon-ai-vs-cybercrime-how-generative-tech-is-changing-the-cybersecurity-landscape","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2025-10-23T09:52:34+00:00","article_modified_time":"2025-10-23T14:37:36+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg","type":"image\/jpeg"}],"author":"N-able","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"\u00c9crit par":"N-able","Dur\u00e9e de lecture estim\u00e9e":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/fr\/blog\/podcast-beyond-the-horizon-ai-vs-cybercrime-how-generative-tech-is-changing-the-cybersecurity-landscape#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/podcast-beyond-the-horizon-ai-vs-cybercrime-how-generative-tech-is-changing-the-cybersecurity-landscape"},"author":{"name":"N-able","@id":"https:\/\/www.n-able.com\/fr#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b"},"headline":"PODCAST | Beyond the Horizon: AI vs Cybercrime: How Generative Tech is Changing the Cybersecurity Landscape","datePublished":"2025-10-23T10:52:34+01:00","dateModified":"2025-10-23T14:37:36+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/podcast-beyond-the-horizon-ai-vs-cybercrime-how-generative-tech-is-changing-the-cybersecurity-landscape"},"wordCount":388,"publisher":{"@id":"https:\/\/www.n-able.com\/fr#organization"},"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/fr\/blog\/podcast-beyond-the-horizon-ai-vs-cybercrime-how-generative-tech-is-changing-the-cybersecurity-landscape","url":"https:\/\/www.n-able.com\/fr\/blog\/podcast-beyond-the-horizon-ai-vs-cybercrime-how-generative-tech-is-changing-the-cybersecurity-landscape","name":"PODCAST | Beyond the Horizon: AI vs Cybercrime: How Generative Tech is Changing the Cybersecurity Landscape - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/fr#website"},"datePublished":"2025-10-23T10:52:34+01:00","dateModified":"2025-10-23T14:37:36+00:00","description":"Explore how AI is revolutionising phishing, deepfakes, and MFA attacks\u2014and what businesses can do to defend against evolving cyber threats.","inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/fr\/blog\/podcast-beyond-the-horizon-ai-vs-cybercrime-how-generative-tech-is-changing-the-cybersecurity-landscape"]}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/fr#website","url":"https:\/\/www.n-able.com\/fr","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/fr#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/fr?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/fr#organization","name":"N-able","url":"https:\/\/www.n-able.com\/fr","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/fr#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b","name":"N-able","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","caption":"N-able"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/posts\/75394","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/comments?post=75394"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/posts\/75394\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/media?parent=75394"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}