TechNadu<p>TechNadu interviewed François Deruty, Chief Intelligence Officer of <span class="h-card" translate="no"><a href="https://infosec.exchange/@sekoia_io" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>sekoia_io</span></a></span> to get answers about innovations observed in cybercrime operations, challenges faced by CIOs, and adjustments to intelligence programs.</p><p>Deruty spoke about organizations tailoring red-team scenarios to the precise threats they face. He emphasized how Generative AI–powered deepfakes and hyper-realistic phishing lures force CTI teams towards dynamic behavior modeling.</p><p>This interview discusses the following and more:<br>🟣Cybersecurity isn’t just tech; it’s about understanding geopolitical risks<br>🟣Generative AI playing a pivotal role in Security Operation Centers<br>🟣Thwarting real-world threats beyond borders with a collaborative effort</p><p>🔗Read the interview: <a href="https://www.technadu.com/exploiting-vulnerabilities-using-ai-at-machine-speed-the-alarming-number-of-unpatched-devices-and-anticipating-how-adversaries-think/600534/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">technadu.com/exploiting-vulner</span><span class="invisible">abilities-using-ai-at-machine-speed-the-alarming-number-of-unpatched-devices-and-anticipating-how-adversaries-think/600534/</span></a></p><p>🔔 👉 Follow <span class="h-card" translate="no"><a href="https://infosec.exchange/@technadu" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>technadu</span></a></span> for more Expert Insights and share your views in the comments below.</p><p><a href="https://infosec.exchange/tags/Sekoia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sekoia</span></a> <a href="https://infosec.exchange/tags/TechNadu" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TechNadu</span></a> <a href="https://infosec.exchange/tags/Interviews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Interviews</span></a> <a href="https://infosec.exchange/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/GenerativeAI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GenerativeAI</span></a> <a href="https://infosec.exchange/tags/SocialEngineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SocialEngineering</span></a> <a href="https://infosec.exchange/tags/CyberThreats" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberThreats</span></a> <a href="https://infosec.exchange/tags/CyberResilience" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberResilience</span></a> <a href="https://infosec.exchange/tags/CTI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CTI</span></a></p>